Taming the beasts… aka suricata blueprint
-
1.
list goes one quite a bit ;). Its not a problem its not loading or empty.2.
forwarding to alias (IP : 10.0.0.2 == internal exchange server)
The rule is applied on both WAN interfaces. Only MX record active on the VDSL interface in question (failover not yet active).
3.
Nothing but whitelist rule, rest is blocklist blocking.
The 2 blocking rules beneath whitelist are to isolate a seperate physical network to acces the main network. (basically a block all from interface x to y). Then a rule to lock down internet acces during the night for the second network.
4.
capturing WAN when rule is applied gives me :00:47:40.700800 IP 209.85.220.177.38924 > <wanip>.25: tcp 0 00:47:41.699405 IP 209.85.220.177.38924 > <wanip>.25: tcp 0 00:47:43.699672 IP 209.85.220.177.38924 > <wanip>.25: tcp 0 00:47:47.699690 IP 209.85.220.177.38924 > <wanip>.25: tcp 0</wanip></wanip></wanip></wanip>
etc
disabling floating whitelist Google rule : (recaptured, the previous IP was another sender)
00:42:47.405562 IP 209.85.220.181.42122 > <wanip>.25: tcp 0 00:42:47.405847 IP <wanip>.25 > 209.85.220.181.42122: tcp 0 00:42:47.522800 IP 209.85.220.181.42122 > <wanip>.25: tcp 0 00:42:47.523516 IP <wanip>.25 > 209.85.220.181.42122: tcp 100 00:42:47.641067 IP 209.85.220.181.42122 > <wanip>.25: tcp 0 00:42:47.641599 IP 209.85.220.181.42122 > <wanip>.25: tcp 31 00:42:47.641865 IP <wanip>.25 > 209.85.220.181.42122: tcp 191 00:42:47.759789 IP 209.85.220.181.42122 > <wanip>.25: tcp 10 00:42:47.760055 IP <wanip>.25 > 209.85.220.181.42122: tcp 29 00:42:47.878097 IP 209.85.220.181.42122 > <wanip>.25: tcp 186 00:42:47.878731 IP <wanip>.25 > 209.85.220.181.42122: tcp 1418 00:42:47.878768 IP <wanip>.25 > 209.85.220.181.42122: tcp 54 00:42:47.998797 IP 209.85.220.181.42122 > <wanip>.25: tcp 0</wanip></wanip></wanip></wanip></wanip></wanip></wanip></wanip></wanip></wanip></wanip></wanip></wanip>
And the 3 test mails I send during the floating rule active get received 5 mins later (re-attempt by gmail server).
Internal :
rule on :22:51:47.917275 IP 209.85.220.174.48733 > 10.0.0.2.25: tcp 0 22:51:47.917442 IP 10.0.0.2.25 > 209.85.220.174.48733: tcp 0 22:51:48.917181 IP 209.85.220.174.48733 > 10.0.0.2.25: tcp 0 22:51:50.917183 IP 209.85.220.174.48733 > 10.0.0.2.25: tcp 0 22:51:50.937085 IP 10.0.0.2.25 > 209.85.220.174.48733: tcp 0 22:51:54.917219 IP 209.85.220.174.48733 > 10.0.0.2.25: tcp 0 22:51:56.943003 IP 10.0.0.2.25 > 209.85.220.174.48733: tcp 0 22:52:02.917255 IP 209.85.220.174.48733 > 10.0.0.2.25: tcp 0 22:52:08.939232 IP 10.0.0.2.25 > 209.85.220.174.48733: tcp 0
209.85.220.174 is a Gmail server IP, and is present in the Google alias.
rule of : (capture running before turning it back off)
22:53:43.113162 IP 209.85.220.181.33212 > 10.0.0.2.25: tcp 0 22:53:43.113340 IP 10.0.0.2.25 > 209.85.220.181.33212: tcp 0 22:53:43.230793 IP 209.85.220.181.33212 > 10.0.0.2.25: tcp 0 22:53:43.231483 IP 10.0.0.2.25 > 209.85.220.181.33212: tcp 100 22:53:43.349044 IP 209.85.220.181.33212 > 10.0.0.2.25: tcp 0 22:53:43.349547 IP 209.85.220.181.33212 > 10.0.0.2.25: tcp 31 22:53:43.349829 IP 10.0.0.2.25 > 209.85.220.181.33212: tcp 191 22:53:43.467508 IP 209.85.220.181.33212 > 10.0.0.2.25: tcp 10 22:53:43.467741 IP 10.0.0.2.25 > 209.85.220.181.33212: tcp 29 22:53:43.589822 IP 209.85.220.181.33212 > 10.0.0.2.25: tcp 186 22:53:43.590172 IP 10.0.0.2.25 > 209.85.220.181.33212: tcp 1418 22:53:43.590213 IP 10.0.0.2.25 > 209.85.220.181.33212: tcp 54 22:53:43.710304 IP 209.85.220.181.33212 > 10.0.0.2.25: tcp 0 22:53:43.710853 IP 209.85.220.181.33212 > 10.0.0.2.25: tcp 326 22:53:43.723228 IP 10.0.0.2.25 > 209.85.220.181.33212: tcp 59 22:53:43.840808 IP 209.85.220.181.33212 > 10.0.0.2.25: tcp 69 22:53:43.841143 IP 10.0.0.2.25 > 209.85.220.181.33212: tcp 213 22:53:43.959329 IP 209.85.220.181.33212 > 10.0.0.2.25: tcp 85 22:53:43.959789 IP 10.0.0.2.25 > 209.85.220.181.33212: tcp 53 22:53:44.077556 IP 209.85.220.181.33212 > 10.0.0.2.25: tcp 69 22:53:44.080321 IP 10.0.0.2.25 > 209.85.220.181.33212: tcp 53 22:53:44.199096 IP 209.85.220.181.33212 > 10.0.0.2.25: tcp 1418 22:53:44.199126 IP 209.85.220.181.33212 > 10.0.0.2.25: tcp 11 22:53:44.199158 IP 209.85.220.181.33212 > 10.0.0.2.25: tcp 165 22:53:44.199278 IP 10.0.0.2.25 > 209.85.220.181.33212: tcp 0 22:53:44.632042 IP 10.0.0.2.25 > 209.85.220.181.33212: tcp 149 22:53:44.750021 IP 209.85.220.181.33212 > 10.0.0.2.25: tcp 37 22:53:44.750129 IP 209.85.220.181.33212 > 10.0.0.2.25: tcp 0 22:53:44.750235 IP 10.0.0.2.25 > 209.85.220.181.33212: tcp 0 22:53:44.750300 IP 10.0.0.2.25 > 209.85.220.181.33212: tcp 85 22:53:44.750437 IP 10.0.0.2.25 > 209.85.220.181.33212: tcp 0 22:53:44.867823 IP 209.85.220.181.33212 > 10.0.0.2.25: tcp 0 22:53:44.867919 IP 209.85.220.181.33212 > 10.0.0.2.25: tcp 0
test mail instant received, previous test mail 5 mins later.
So yea..- its not that it is such a disaster (I can find ways around it tbh). But I cannot stand not knowing why this is happening.
"edit" - wrong IP in first capture.
-
list goes one quite a bit ;). Its not a problem its not loading or empty.
Yeap, verified a couple of IPs, and they do indeed belong to google. So the alias does not appear to be the problem.
@foetus:forwarding to alias (IP : 10.0.0.2 == internal exchange server)
The rule is applied on both WAN interfaces. Only MX record active on the VDSL interface in question (failover not yet active).Port forwarding rule verified and is correct.
@foetus:Nothing but whitelist rule, rest is blocklist blocking.
The 2 blocking rules beneath whitelist are to isolate a seperate physical network to acces the main network. (basically a block all from interface x to y). Then a rule to lock down internet acces during the night for the second network.General list rules look correct. Love the "GTFO during nighttime" rule. Are you sure the pass rule is applied to the correct interfaces? Careful with those rules. Putting yourself in pfsense's place: What does this rule tell me to do? Pass any traffic destined or sourced from Google, without any further processing. See where I'm going with it? Applying it to the wrong interfaces could open up your network to a spoofed (or originating from Google, who knows?) attacker.
@foetus:capturing WAN when rule is applied gives me :
00:47:40.700800 IP 209.85.220.177.38924 > <wanip>.25: tcp 0 00:47:41.699405 IP 209.85.220.177.38924 > <wanip>.25: tcp 0 00:47:43.699672 IP 209.85.220.177.38924 > <wanip>.25: tcp 0 00:47:47.699690 IP 209.85.220.177.38924 > <wanip>.25: tcp 0</wanip></wanip></wanip></wanip>
Only incoming traffic. No return traffic which is interesting.
@foetus:disabling floating whitelist Google rule : (recaptured, the previous IP was another sender)
00:42:47.405562 IP 209.85.220.181.42122 > <wanip>.25: tcp 0 00:42:47.405847 IP <wanip>.25 > 209.85.220.181.42122: tcp 0 00:42:47.522800 IP 209.85.220.181.42122 > <wanip>.25: tcp 0 00:42:47.523516 IP <wanip>.25 > 209.85.220.181.42122: tcp 100 00:42:47.641067 IP 209.85.220.181.42122 > <wanip>.25: tcp 0 00:42:47.641599 IP 209.85.220.181.42122 > <wanip>.25: tcp 31 00:42:47.641865 IP <wanip>.25 > 209.85.220.181.42122: tcp 191 00:42:47.759789 IP 209.85.220.181.42122 > <wanip>.25: tcp 10 00:42:47.760055 IP <wanip>.25 > 209.85.220.181.42122: tcp 29 00:42:47.878097 IP 209.85.220.181.42122 > <wanip>.25: tcp 186 00:42:47.878731 IP <wanip>.25 > 209.85.220.181.42122: tcp 1418 00:42:47.878768 IP <wanip>.25 > 209.85.220.181.42122: tcp 54 00:42:47.998797 IP 209.85.220.181.42122 > <wanip>.25: tcp 0</wanip></wanip></wanip></wanip></wanip></wanip></wanip></wanip></wanip></wanip></wanip></wanip></wanip>
Traffic both ways as expected.
@foetus:Internal :
rule on :22:51:47.917275 IP 209.85.220.174.48733 > 10.0.0.2.25: tcp 0 22:51:47.917442 IP 10.0.0.2.25 > 209.85.220.174.48733: tcp 0 22:51:48.917181 IP 209.85.220.174.48733 > 10.0.0.2.25: tcp 0 22:51:50.917183 IP 209.85.220.174.48733 > 10.0.0.2.25: tcp 0 22:51:50.937085 IP 10.0.0.2.25 > 209.85.220.174.48733: tcp 0 22:51:54.917219 IP 209.85.220.174.48733 > 10.0.0.2.25: tcp 0 22:51:56.943003 IP 10.0.0.2.25 > 209.85.220.174.48733: tcp 0 22:52:02.917255 IP 209.85.220.174.48733 > 10.0.0.2.25: tcp 0 22:52:08.939232 IP 10.0.0.2.25 > 209.85.220.174.48733: tcp 0
Traffic both ways. Replies are leaving the internal server but get choked somewhere on pfsense.
@foetus:rule off : (capture running before turning it back off)
22:53:43.113162 IP 209.85.220.181.33212 > 10.0.0.2.25: tcp 0 22:53:43.113340 IP 10.0.0.2.25 > 209.85.220.181.33212: tcp 0 22:53:43.230793 IP 209.85.220.181.33212 > 10.0.0.2.25: tcp 0 22:53:43.231483 IP 10.0.0.2.25 > 209.85.220.181.33212: tcp 100 22:53:43.349044 IP 209.85.220.181.33212 > 10.0.0.2.25: tcp 0 22:53:43.349547 IP 209.85.220.181.33212 > 10.0.0.2.25: tcp 31 22:53:43.349829 IP 10.0.0.2.25 > 209.85.220.181.33212: tcp 191 22:53:43.467508 IP 209.85.220.181.33212 > 10.0.0.2.25: tcp 10 22:53:43.467741 IP 10.0.0.2.25 > 209.85.220.181.33212: tcp 29 22:53:43.589822 IP 209.85.220.181.33212 > 10.0.0.2.25: tcp 186 22:53:43.590172 IP 10.0.0.2.25 > 209.85.220.181.33212: tcp 1418 22:53:43.590213 IP 10.0.0.2.25 > 209.85.220.181.33212: tcp 54 22:53:43.710304 IP 209.85.220.181.33212 > 10.0.0.2.25: tcp 0 22:53:43.710853 IP 209.85.220.181.33212 > 10.0.0.2.25: tcp 326 22:53:43.723228 IP 10.0.0.2.25 > 209.85.220.181.33212: tcp 59 22:53:43.840808 IP 209.85.220.181.33212 > 10.0.0.2.25: tcp 69 22:53:43.841143 IP 10.0.0.2.25 > 209.85.220.181.33212: tcp 213 22:53:43.959329 IP 209.85.220.181.33212 > 10.0.0.2.25: tcp 85 22:53:43.959789 IP 10.0.0.2.25 > 209.85.220.181.33212: tcp 53 22:53:44.077556 IP 209.85.220.181.33212 > 10.0.0.2.25: tcp 69 22:53:44.080321 IP 10.0.0.2.25 > 209.85.220.181.33212: tcp 53 22:53:44.199096 IP 209.85.220.181.33212 > 10.0.0.2.25: tcp 1418 22:53:44.199126 IP 209.85.220.181.33212 > 10.0.0.2.25: tcp 11 22:53:44.199158 IP 209.85.220.181.33212 > 10.0.0.2.25: tcp 165 22:53:44.199278 IP 10.0.0.2.25 > 209.85.220.181.33212: tcp 0 22:53:44.632042 IP 10.0.0.2.25 > 209.85.220.181.33212: tcp 149 22:53:44.750021 IP 209.85.220.181.33212 > 10.0.0.2.25: tcp 37 22:53:44.750129 IP 209.85.220.181.33212 > 10.0.0.2.25: tcp 0 22:53:44.750235 IP 10.0.0.2.25 > 209.85.220.181.33212: tcp 0 22:53:44.750300 IP 10.0.0.2.25 > 209.85.220.181.33212: tcp 85 22:53:44.750437 IP 10.0.0.2.25 > 209.85.220.181.33212: tcp 0 22:53:44.867823 IP 209.85.220.181.33212 > 10.0.0.2.25: tcp 0 22:53:44.867919 IP 209.85.220.181.33212 > 10.0.0.2.25: tcp 0
Traffic both ways as expected.
- its not that it is such a disaster (I can find ways around it tbh). But I cannot stand not knowing why this is happening.
Dunno why it's not working tbh. Forgive my notes above, they were needed to follow the "flow" ;D
It should work as is, but can you try changing the gateway in the floating rules to the default gateway? (manually select it instead of it being any)
Other than that I don't see anything being wrong. It could be that it's too early, but at least I tried :P -
Sidenote: Last night suricata banned an entire /24 with an incoming unwanted SSH connection alert. Yes, 254 alerts. SSH servers show increased pre-auth terminated sessions from all over the world. Either the Chinese are ramping up their script kiddie attacks, or a 0-day SSH exploit (possibly OpenSSH) has been found. Just letting everyone know, lock down your SSH servers.
-
Hey jflsakfja, or anyone else for that matter….
First off please forgive my ignorance as i am still very much trying to learn all this.
As stated by jflsakfja and on the pfSense Firewall:Rules section, "Everything that isn't explicitly passed is blocked by default. "
Well i followed the guidelines for creating rules and added only rules for ports that my home network uses.
I intentionally did not create rules for Samba shares and ICMP but i could still access my windows network shares and i could still ping internally (but not externally).
I realised that there was a couple of auto created rules in my firewall:NAT:Outbound, most likely created using the pfSense startup wizard and the OpenVPN server wizard.| WAN 10.0.1.0/24 * * 500 WAN address * YES Auto created rule for ISAKMP - LAN to WAN
WAN 10.0.1.0/24 * * * WAN address * NO Auto created rule for LAN to WAN
WAN 127.0.0.0/8 * * * WAN address 1024:65535 NO Auto created rule for localhost to WAN
WAN 10.0.8.0/24 * * * WAN address * NO Auto created rule for OpenVPN server |What's your advice on these rules? should i disable them? can the rules be fine-tuned to be "less vague"? My assumption is that these rules could circumvent the more fine-tuned floating and interface rules created using this thread guidelines?
-
NAT rules shouldn't have an impact on the effect of other rules, as long as the NAT rules didn't automatically create other allow rules (the case for port forwarding for example).
If you didn't create any rules for samba+ICMP, but you can still use those internally, then a rule exists somewhere that allows it. I've seen a couple of posts lately that pfsense allows things it shouldn't allow. That always comes down to misconfiguration issues.
When trying to troubleshoot pfsense, please put yourself into pfsense's place. What would you do with a packet if you followed the rules below:
- floating rules first
- per interface rules next
- NAT rules
- general block everything rule
Follow the rules through that order, and I'm sure you can find out what the problem is.
-
@jflsakfja:
NAT rules shouldn't have an impact on the effect of other rules, as long as the NAT rules didn't automatically create other allow rules (the case for port forwarding for example).
If you didn't create any rules for samba+ICMP, but you can still use those internally, then a rule exists somewhere that allows it. I've seen a couple of posts lately that pfsense allows things it shouldn't allow. That always comes down to misconfiguration issues.
When trying to troubleshoot pfsense, please put yourself into pfsense's place. What would you do with a packet if you followed the rules below:
- floating rules first
- per interface rules next
- NAT rules
- general block everything rule
Follow the rules through that order, and I'm sure you can find out what the problem is.
I will do that, thanks jflsakfja!
-
So I've setup the pfIPRep rules per Cino's method here https://forum.pfsense.org/index.php?topic=78062.msg427132#msg427132
Testing an outbound rule, for example 141.101.116.122 is in IR_SEC1 and I can still ping it even though my LAN and DMZ are selected
If I select WAN then it gets dropped accordingly, why is this?
Ticking Quick also drops it, do I need to have quick ticked for all the rules?
-
Check Quick. I forgot to update the screenshots with that.. Without it check, it will compare the rest of your rules and the last one will win.. Which is probably the default allow all lan rule. When Quick is checked, and there is a match; it will apply that rule and stop processing the rest for that packet.
-
Check Quick. I forgot to update the screenshots with that.. Without it check, it will compare the rest of your rules and the last one will win.. Which is probably the default allow all lan rule. When Quick is checked, and there is a match; it will apply that rule and stop processing the rest for that packet.
Cool, thanks for that. You're right, I just have the default LAN to ANY rule so that makes sense.
Should I have quick checked for inbound rules or just the outgoing ones?
-
Quick for all. This way, once there is a match (inbound or outbound) the rule will block/reject the packet right a way.
-
Quick for all. This way, once there is a match (inbound or outbound) the rule will block/reject the packet right a way.
Sweet, that's what I've done, thanks for that.
Now to tackle Suricata.
Just of note, I initially tried this with 2.2-BETA but every time you modify firewall rules or aliases the tables seem to clear. At the time I didn't have quick checked so I'm unsure if it was just a gui problem (as I could still ping that same IP so assumed it was broken) but the only way to get the tables back was to run pfiprep killdb
I also had problems with downloading lists from some https sites with fetch, similar to another user a few pages back yet unsure what a self signed pfsense cert had to do with it. I had ca_root_nss installed and /etc/ssl/certs.pm was symlinked to ca_root_nss.crt from memory
-
Been having fun with Suricata (sarcasm)
Whenever I'm using Astrill VPN to stream Netflix I get these alerts:
SURICATA IPv4 invalid checksum - 09/29/2014-22:44:21
GPL SHELLCODE x86 setuid 0 - 10/02/2014-20:39:23Ended up adding the VPN IP to a pass list
Trying to download the Windows 10 Tech Preview ISO's from Microsoft today and I got these alerts:
ET INFO EXE - Served Attached HTTP - 10/01/2014-01:10:39
ET POLICY PE EXE or DLL Windows file download HTTP - 10/02/2014-01:10:38
ET POLICY Download Windows Help File CHM 2 - 10/02/2014-11:42:05They were .iso files downloading via http so I don't understand those alerts
Then once I'd upgraded my Windows 8.1 -> 10 it failed to connect to my microsoft account because of this alert:
ET POLICY Internet Explorer 6 in use - Significant Security RiskFun and games, haha.
-
You didn't ask suricata nicely, that's why it's behaving badly. Most of those alerts are known FPs, as per the list linked to in this thread. Never add something that gives up an alert to a passlist. A passlist should only contain systems under your home net and DNS servers. Not a single host more than that. In other words, it should contain the bare minimum of systems that should NOT be banned, under any circumstance. Can you imagine what would happen if suricata decided to ban the DNS servers?
If a rule repeatedly gives a bad alert on known good traffic, suricata isn't the one that must be blamed. It's the rule writer that must be blamed and held accountable. Bug him until he changes the rule. Judging by ET's past record, it's not going to happen any time soon, but one can only hope.
Please remove the host from the passlist and disable the rules following instructions in this thread.
-
Appears I missed one alert that was in your list, however these aren't in your list:
SURICATA IPv4 invalid checksum
GPL SHELLCODE x86 setuid 0
ET POLICY Download Windows Help File CHM 2
ET INFO EXE - Served Attached HTTP
ET POLICY Internet Explorer 6 in useAlso this is another alert I was getting downloading those iso's
ET EXPLOIT Windows Media Player parsing BMP file with 0 size offset to start of imageI'm certainly not blaming suricata, I completely agree with you that some of these rules are absolutely ludicrous..
I've removed the passlist and disabled the rules instead
-
Too long night, too short day ;D
Those not on my list doesn't necessarily mean they are not false positives. Don't remember if it was in this thread, or the other (snort blueprint) that someone mentioned the ipv4 checksum one.
My list is the starting point, I can't possibly cover all the use cases out there. Adding to the list rules that come from external sources (other than me) means adding yet another layer of management to the list, something I currently do not have time for. For example I promised a new thread using the new auto management files, and guess what, haven't had time to even begin typing it yet.
This thread described the process of identifying FP rules, and how to deal with them. I'm not attacking you in any way, I'm just saying that a passlist is not the solution for this specific problem. Disabling the rules if you know the alerts are coming from a trusted source, is. If a rule is repeatedly found to be an FP rule, then the rule maintainer has the obligation to correct it, if everyone bugged them about it. He can't correct something that he doesn't even know is wrong. He must correct it though, if others tell him that it's wrong. As was mentioned, don't hold your breath on it when dealing with the ET rules. There are 10 year old rules in there that I have been personally screaming at the writers to remove, for years.
Then there are the "write once, never maintain rules", eg: NT 6.1. As mentioned, directed at ET, "FFS windows 7 IS 6.1, get it into your thick skulls and delete the rule already". Windows 7 was RTM'd on August 6 2009. That's 5 years of a rule FPing, and still counting, since as far as I can tell, they don't plan to correct it. 5 years of people telling you "you are doing it wrong", yet you still don't correct it. :o
-
Haha tell me about it.
Don't worry, I'm not taking offence and know you weren't attacking me. I'm thankful for this thread and the work that you've done with your list.
Cheers for pointing out that I should be disabling rules if I'm certain its legit traffic, rather than using a pass list
-
I have finally found a bit of time to work on the next part of this guide.
Roadmap:
-
Provide an easy way to upload minimal configurations to pfsense and get it going. Thanks to bmeeks for implementing the behind the scenes work needed for this. What would everyone's suggestion be as to the absolute bare minimum rules? Rules that generally cause mayhem when used, or add even more "delicate" rules (rules that might trigger an FP from akamai for example).
-
Provide the customizations recommended in this topic as an easily uploaded file/s
-
Start work on custom rules for the typical pfsense+suricata usage (network gateway). This came as an inspiration after having been bitten countless times by rules not making any sense at all. That and the push towards more encryption everywhere, which renders most ET rules invalid (not saying a bug, saying that suricata can't see inside the SSL traffic). Not saying that it will be the end-all-be-all configuration, it's just a minimal configuration that will do a hell of a lot more than what the default rules do. YMMV
-
Since this is also a taming pfsense topic, start work on an easy way to push server banned IPs to pfsense for immediate addition to a blocked alias (or an alias to direct traffic to a "YOU HAVE BEEN A BAD, BAD BOY" page). I don't like the way I'm currently implementing this, because I believe it's dangerous to pfsense's security (you need ssh access to it from the servers, even on limited access things can go wrong), and so I want the community's input on how to best implement it. poke poke if only the pfsense devs would add a customizable update schedule to the URL tables…poke poke
I'm willing to put up with a few seconds delay if pulling in the updates instead of them getting pushed forcefully to pfsense is easier (and it should be a lot safer). -
Undecided, but we do have to burn a bit of company time if they are sponsoring me working on all of these, so anyone that wishes to add something they would like to see, feel free to do so.
The way forward I believe is to publish the "main" topics on github, and keep discussions here. That makes it easy to keep track of changes (and actually see the changes) and keeps the topics well, on topic (discussions about pfsense+suricata). Anyone objecting to this should speak up now or forever hold their silence.
Sorry to disappoint certain people by not insulting anyone, but I'm tired :-\
-
-
@jflsakfja:
Sorry to disappoint certain people by not insulting anyone, but I'm tired :-\
;D ;D ;D ;D ;D
@jflsakfja:
The way forward I believe is to publish the "main" topics on github, and keep discussions here. That makes it easy to keep track of changes (and actually see the changes) and keeps the topics well, on topic (discussions about pfsense+suricata). Anyone objecting to this should speak up now or forever hold their silence.
Message copied, Roger, I do not object, not at all, but I am to shut up in the future anyway I read ( ??? ;D )
(I don't object at all, aux contraire, because now the information has been shattered over more than 1 thread - other people adding to your work too - and I had planned a couple of hours to find out where is what these days in the first place)
@jflsakfja:
- Undecided, but we do have to burn a bit of company time if they are sponsoring me working on all of these, so anyone that wishes to add something they would like to see, feel free to do so.
Yes, I have, but I have to find the note where I wrote I down.
-
The main problem I see is that you can't edit the old posts. I would love to add more information to the topic as things move forward/things change, but I simply can't do so in an organized way. Expecting everyone to go through 100 pages of posts is not exactly user intuitive ;)
I also enjoy seeing people take over the "technical support"/troubleshooting for other users. It means at least a few understood what the topic is trying to do, how to do it, and are willing to contribute to it ;D. The downside to that, is that updates to the topic get pushed further back in the thread, which takes us back to the "trying to keep things organized" subject. Having the main topic be outside the thread would (IMHO) help with keeping discussions/insulting-"innocent"-passers-by organized. For example, we could have a "ridicule the industry leaders week" (*see note) without affecting the actual guides.
- I'm looking at you Google, time to take your own advise** and migrate away from SHA-1 certificates on your selected sites, eg www.google.com.cy (at time of writing:PKCS #1 SHA-1 With RSA Encryption). Especially when you yourself are a CA and can just sign a new certificate with no cost, other than the 2 minutes it takes to generate/re-issue/sign a new certificate and change/revoke the old certificate. Or you can take my advice, if you think that your depreciation policy is adequate. I've been screaming since March (this year) that everybody had plenty of time to migrate away from the old (and weak) certificates, time to force everyone to move on. As usual, no industry leader should listen to the "who-the-f***-are-you" random bloke on the Internet.
**http://googleonlinesecurity.blogspot.com/2014/09/gradually-sunsetting-sha-1.html which brings us to ***
***9 years is indeed a lot of time. That's why for the past few months I've been literally (not just using the word without any context), literally SCREAMING at the CAs to force everyone off the old certificates already FFS (my exact words). which takes us to ****
**** Comodo just recently (after the Heartbleed security feature*****, and after 2 all round re-issues) has finally decided to force SHA-2 certificates.
***** In open source, bugs are not bugs. They are features. A bug introduced in the most respected (previous to the Heartbleed bug, now (as the Cypriot saying goes) not even dogs will piss on it) cryptographic software would imply that someone was directly paid to put it there. Especially when the ZOMGWTFNEW1337FEATURE is not needed. We wouldn't go around accusing anyone of getting paid to subvert security software now, would we? Of course not, don't be silly. The bloke accidentally introduced a "spil your guts out" feature. See? Only open source can offer you 2in1 features****(something, lost count)
****(something, lost count) to RMS and gang: I'm a die-hard open source supporter.
-
Here's a laugh for you…
So I'm browsing around http://suricata-ids.org and click on their News - Planet link http://planet.suricata-ids.org/
TCP Potentially Bad Traffic 96.43.130.12 80 x.x.x.x 38263 1:2100498 GPL ATTACK_RESPONSE id check returned root
gotta love it