Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    crowdsec

    Scheduled Pinned Locked Moved pfSense Packages
    30 Posts 7 Posters 1.3k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • JonathanLeeJ
      JonathanLee @Zermus
      last edited by

      This post is deleted!
      1 Reply Last reply Reply Quote 0
      • w0wW
        w0w @Zermus
        last edited by

        @Zermus
        Could you provide examples and typical usage scenarios of CrowdSec on pfSense? It would help everyone here understand the context in which it would actually be used on a firewall and why it can not be used right now.

        Z 1 Reply Last reply Reply Quote 0
        • Z
          Zermus @w0w
          last edited by

          @w0w So I just want to point out I'm not associated with Crowdsec, but I am following their work, and I'm a fan.

          Crowdsec works by collecting logs on your infrastructure. You install a "Security engine" in your environment somewhere. I run it on a VM off my Proxmox. You can feed it any and all logs you want it to analyze in your footprint. It's kind of like an AI log aggregator and attack response. You can install a client on these machines to do it's own analysis or just feed it the logs.

          Crowdsec has 3 packages for pfSense. A small, medium, and large package.

          The small package basically just acts as a bouncer on pfSense. It takes block requests from the Security engine and blocks them on your firewall access list depending on what is attacking your network, yes kind of like how Fail2ban works, but it's a lot more than Fail2ban since this is all based off threat intelligence from Crowdsec and what is being attacked.

          The medium package adds the Crowdsec client to the pfSense firewall to analyze it's logs and analyze any attacks or scanning that might be occurring to feed it to it's threat intelligence feed. (IMHO this is the sweet spot)

          The large package, I'm not really a fan of personally, but I guess it works in a pinch for some people. It puts the security engine on pfSense and handles it all on the pfSense server. I can definitely see how support for this would be a headache, but hey if Crowdsec is willing to do it, why not? I'd probably never use it since I run the Security engine on it's own server.

          Firepower from Cisco and Wildfire for Palo are very similar to this and are used on their NG Firewalls.

          1 Reply Last reply Reply Quote 1
          • dennypageD
            dennypage @Zermus
            last edited by

            @Zermus said in crowdsec:

            Just from your response I can tell you've never worked in Fortune 100 or Government Network/Infosec IT.

            Please take a moment to breathe before posting. While I might not agree with everything @JonathanLee said in his post, I did find it to be a reasoned presentation. There is no benefit to being rude.

            Z 1 Reply Last reply Reply Quote 2
            • Z
              Zermus @dennypage
              last edited by

              @dennypage His whole argument was essentially he's not interested in using it and if he wasn't nobody else should. If he had a valid point that's one thing, but he kept repeating his opinion is the most important in the world over and over again like a broken record. IMHO that was much more rude but to each his own. Modern big brand firewalls offer many features like what Crowdsec is offering to use on pfSense. I mentioned Firepower and Wildfire.

              Also when he said keeping your attack surface small (which is a good thing) keeping a simple defense is almost never recommended. I've got a CISSP and plenty of experience on the Infosec side and the Neteng side. Almost every literature and my 20+ years of experience on this subject preaches a defense in depth.

              dennypageD 1 Reply Last reply Reply Quote 0
              • dennypageD
                dennypage @Zermus
                last edited by

                @Zermus said in crowdsec:

                but he kept repeating his opinion is the most important in the world over and over again like a broken record

                He isn't the only one that could be accused of this.

                FWIW, I have a great deal of experience as well, and I see valid points on both sides of the argument. Honestly, I think this discussion has completely run its course.

                Z 1 Reply Last reply Reply Quote 1
                • Z
                  Zermus @dennypage
                  last edited by

                  @dennypage We'll have to agree to disagree on "valid" on this one. 😄

                  JonathanLeeJ 1 Reply Last reply Reply Quote 0
                  • JonathanLeeJ
                    JonathanLee @Zermus
                    last edited by

                    @Zermus I appreciate the honest back-and-forth. 😄
                    Based on your experience (especially with 20 years in the field and a CISSP under your belt), I’m genuinely curious how you see the comparison between CrowdSec and something like Security Onion — particularly with its Kibana/Elastic stack.

                    • Do you see CrowdSec’s real-time, community-driven blocking as overlapping with what Security Onion does, or are they fundamentally different in purpose?

                    • Security Onion seems great for deep forensic analysis and manual threat hunting, while CrowdSec feels more automated and lightweight — maybe more of a first line of defense?

                    • From a cost and operational perspective, do you think the lighter footprint of CrowdSec brings enough value, especially in smaller environments where a full SO deployment might be overkill?

                    Not trying to stir the pot — just trying to get a clearer picture of where these tools fit best from someone who's seen a wide range of deployments.

                    Z 1 Reply Last reply Reply Quote 0
                    • Z
                      Zermus @JonathanLee
                      last edited by Zermus

                      @JonathanLee Security Onion is something I really like from what I've seen. You're right. Crowdsec is more automated while Security Onion offers that defense in depth approach and they go crazy with it. I don't have much experience with most of their stuff, but what I've tested I like.

                      I've personally only used their honeypot on my home/colo environment, and it seemed to be solid and the best well maintained honeypot product I could find, although I was just testing it out and it didn't add much to my personal environments and I stopped maintaining it. I should probably keep one running though. I need to test out more of their stuff, because I did really like what I saw, but I have other stuff running that would make it redundant, but it's worth checking out to see if it's better. Wish I had the free time lol.

                      It's a shame Elastic took their stuff in house and ELK stacks are no longer free. Tom Lawrence's (https://www.youtube.com/@LAWRENCESYSTEMS) videos convinced me that I should go over to Graylog Open on my personal stuff when that happened and I'm happy with it.

                      What I really like about Crowdsec is it is automated based on log analytics and they claim to block active attack networks based on your location. It's a good system that keeps you informed and protected without having to do much manual log correlation. In fact it seems to eliminate the need for manual log correlating for the most part. You can think of it like a fail2ban on borg collective steroids and it is always adapting new filters to catch and adapt on it's own to block threats. Instead of blocking locally it blocks on the perimeter firewall, which in most of our cases here would be pfSense. It can also use pfSense's data on blocks to build a better threat model. The more you feed it the better it gets.

                      dennypageD 1 Reply Last reply Reply Quote 1
                      • dennypageD
                        dennypage @Zermus
                        last edited by

                        @Zermus said in crowdsec:

                        It's a shame Elastic took their stuff in house and ELK stacks are no longer free. Tom Lawrence's (https://www.youtube.com/@LAWRENCESYSTEMS) videos convinced me that I should go over to Graylog Open on my personal stuff when that happened and I'm happy with it.

                        I always viewed ELK as overly complicated. Graylog is much more manageable, although the console isn't as nice. Work in progress.

                        1 Reply Last reply Reply Quote 2
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.