Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    A funny thing about IDS/IPS.... /DNS related

    Scheduled Pinned Locked Moved IDS/IPS
    17 Posts 3 Posters 1.2k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • bmeeksB
      bmeeks @Cool_Corona
      last edited by

      @cool_corona said in A funny thing about IDS/IPS.... /DNS related:

      @bmeeks

      Running Legacy Mode.

      A peculiar oberservation. Some of the blocks are related to AAA Adult sites and the servers blocked is Root DNS servers.

      I bet that running for sometime, the entire Root DNS ecosystem is blocked one by one until Unbound cant make any lookups.

      Blocks are never removed.

      1b8a8799-e165-4375-af2e-758eecaaf3a0-billede.png

      What you are describing appears to have zero to do with IDS/IPS. Why did you put IDS/IPS in the title?

      If nothing is showing in the ALERTS or BLOCKS tabs for the blocked IP addresses, then the IDS/IPS is not responsible for the blocking. You likely have something else going on.

      And I don't understand the purpose of the screenshot of the IDS INTERFACES tab in your last post. How is that relevant at all to the discussion? Not yelling at you, but just confused how it relates.

      Cool_CoronaC 1 Reply Last reply Reply Quote 0
      • Cool_CoronaC
        Cool_Corona @bmeeks
        last edited by

        @bmeeks Its Suricata related since when I clear the blocks, then all is fine.

        I usually happens overnight. I cant find anything related to DNS in the logs

        Cool_CoronaC 1 Reply Last reply Reply Quote 0
        • Cool_CoronaC
          Cool_Corona @Cool_Corona
          last edited by

          @bmeeks

          07419b96-9725-46ca-9946-c80c06aa7a2e-image.png

          Over time I bet I will see the root servers blocked that unbound uses to resolve queries.

          I have manually added 5 root servers to the DNS to see of that changes behaviour.

          1 Reply Last reply Reply Quote 0
          • NogBadTheBadN
            NogBadTheBad @Cool_Corona
            last edited by NogBadTheBad

            @cool_corona and your WAN by the looks of the screenshot.

            Disable ET DNS if you don’t host a DNS server, what’s happening is hosts with a .top, .su, .to etc ... are hitting the WAN interface, pfBlocker is then doing a lookup of the ip address for reporting, then its blocking the servers resolver is trying to get the fqdn from.

            I had a the same type issue and after looking at a packet capture from snort I set up a snort rule to capture dns requests to ns.hetsptt.net.cn, guess what not a single host on my LAN did a request.

            # pcap udp any any ->  any 53 ( msg:"ns.hetsptt.net.cn"; flow:to_server; byte_test:1,!&,0xF8,2; \
            # content: "|02|ns|07|hetsptt|03|net|02|cn|00|"; nocase; sid:20000010; rev:001;classtype:string-detect;)
            

            Andy

            1 x Netgate SG-4860 - 3 x Linksys LGS308P - 1 x Aruba InstantOn AP22

            Cool_CoronaC 1 Reply Last reply Reply Quote 1
            • Cool_CoronaC
              Cool_Corona @NogBadTheBad
              last edited by

              @nogbadthebad Done and thanks :)

              bmeeksB 1 Reply Last reply Reply Quote 0
              • bmeeksB
                bmeeks @Cool_Corona
                last edited by bmeeks

                @cool_corona said in A funny thing about IDS/IPS.... /DNS related:

                @nogbadthebad Done and thanks :)

                Ah, I think I understand now. You were running the ET DNS rules on your WAN. Your screen shot earlier showed blocking disabled on the WAN, but apparently you changed it from blocking to "not blocking", but you were having the trouble when it was blocking ??

                pfBlockerNG will do DNS lookups on things in its logs in order to show domain names. So that activity is going to show up as a "host" performing a lookup against malware domains. That "host" is the firewall itself in the persona of unbound. It's not really malicious traffic. The host is not looking up the domain in order to communicate or download more malware. It is simply checking for the name and/or associated IP. That's not malicious. But Suricata's rules don't know that and don't care.

                So two things you should do. First, only run the IDS/IPS on your internal LAN interfaces (LAN, DMZ if you have one, WLAN, etc.). Don't run the IDS/IPS on the WAN. Second, you never need all the rules enabled. You certainly don't need the server rules if you do not have publicly exposed servers on your network. So don't run web server rules, mail server rules, DNS server rules, etc., unless you have those servers on your networks exposed to the Internet via port forwards.

                @NogBadTheBad gave you good advice about those ET DNS rules. They need to be used only when you are able to use Inline IPS Mode and those rules can then more selectively police traffic with packet drops instead of hard blocks of all traffic for a given IP. The Legacy Blocking Mode is a very large hammer. Once it puts an IP in the firewall table, all subsequent traffic for that IP is blocked. With Inline IPS Mode, individual "bad" packets are dropped while other non-malicious traffic is allowed to pass. Thus a much more fine-grained hammer.

                NogBadTheBadN Cool_CoronaC 2 Replies Last reply Reply Quote 1
                • NogBadTheBadN
                  NogBadTheBad @bmeeks
                  last edited by

                  @bmeeks Yup it had me baffled for ages as I couldn't see any lookups from my LAN interface to the offending FQDNS.

                  Andy

                  1 x Netgate SG-4860 - 3 x Linksys LGS308P - 1 x Aruba InstantOn AP22

                  Cool_CoronaC bmeeksB 2 Replies Last reply Reply Quote 1
                  • Cool_CoronaC
                    Cool_Corona @bmeeks
                    last edited by

                    @bmeeks Thanks man :)

                    Yes I have pbulic facing servers ( a lot ) but no DNS.

                    So disabled the rule. And yes I have tried a lot of things changing the blocking mode to disable (alert only) on different interfaces to trace the culprit.

                    Regaring Inline mode, I run Vmxnet3 interfaces so inline mode is not possible with netmap.

                    1 Reply Last reply Reply Quote 0
                    • Cool_CoronaC
                      Cool_Corona @NogBadTheBad
                      last edited by

                      @nogbadthebad Exactly my issue.

                      1 Reply Last reply Reply Quote 0
                      • bmeeksB
                        bmeeks @NogBadTheBad
                        last edited by bmeeks

                        @nogbadthebad said in A funny thing about IDS/IPS.... /DNS related:

                        @bmeeks Yup it had me baffled for ages as I couldn't see any lookups from my LAN interface to the offending FQDNS.

                        Yes, the firewall itself sources the connection for the DNS lookup, and that traffic will exit the WAN on the way to either the DNS root servers or whatever DNS forwarder might be configured. So the IDS rules on the WAN see the traffic and alert. Since it's on the WAN, and the IDS sits beyond the firewall, the IDS sees your firewall's public WAN IP as the "source". The natural inclination is to assume the traffic originated on your LAN, but it actually did not.

                        1 Reply Last reply Reply Quote 1
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.