Taming the beasts… aka suricata blueprint
-
Great! ;D
I was not sure what the appropriate response to those situations would be.
Disable the rule it is!
Dan
-
bmeeks,
Thanks for the info! That is what I was looking for. Just wanted to make sure I was not missing a spot in the GUI.
Has anyone had any issues with Pass Lists in Suricata? WebEx keeps triggering a certain rule so I thought I would use a pass list for the WebEx subnets and leave the rule in place. I created the list with the appropriate subnets and restarted Suricata on the appropriate interface. I am still seeing alerts and blocks on those IPs.
Is there a step I am missing?
Dan
While jflsakfja's advice is sound, it could be that you missed a step with the PASS LIST. Once you create the list and save it, you then need to go to the INTERFACE SETTTINGS tab for the interface where you want to use the Pass List and down near the bottom of that page select the new Pass List in the drop-down box next to PASS LIST. Save it, and then restart Suricata on the interface.
Bill
-
bmeeks,
That is what I missed! Thanks for pointing that out. I knew I had to be missing a setting somewhere.
Dan
-
bmeeks,
That is what I missed! Thanks for pointing that out. I knew I had to be missing a setting somewhere.
Dan
Suricata and Snort work the same in the area of Pass Lists. Once you have a custom list created and saved, you then must go to the INTERFACE SETTINGS tab and select that list in the drop-down selection for PASS LIST. Then you save the change and restart that interface.
Bill
-
Hello!
First, I registered and stopped lurking specifically for this thread. I humbly recognize it's weight and wanted to say thank you to its originator and all of the people involved in keeping it going.
Second, I have never felt more mentally challenged in my life! I would love to regale you all of my trials and hardships simply getting the box running (its been an experience), but there's other times and places for this (say no to usb ethernet adapters).
I did write what could have been mistaken for a blog post on where I got hung up on, but after reading all 25 pages of this thread I think I'm back on track. I got stuck on the floating rule shuffle, but will hopefully defeat it before I go to bed! :)
Thank you all so much for this rich and in depth guide. Not just the software related stuff but the insightful commentary as well, it has all be very fascinating to read.
Thank you!
-
Good day folks!
I've had to hold off on my progress, but actually got through the script part not long after my last post. I broke it all to hell, so had to start over. I'm not worried as I learned some stuff along the way and that feels good.
As I come back to get it going again I see pfsense 2.2 has been released. Will this release affect this +year old thread's contents? Should I hold off until a revision is made? Is there one I haven't seen yet (I honestly have been cruising these forums to keep an eye out).
Thank you in advance for your answers and time, I hope everyone's New Year has gotten off to a great start.
-
As I come back to get it going again I see pfsense 2.2 has been released. Will this release affect this +year old thread's contents? Should I hold off until a revision is made? Is there one I haven't seen yet (I honestly have been cruising these forums to keep an eye out).
Go for it… Shouldn't make a difference at all
-
I'm now setting up my aliases after running the script initially.
For the part where I 'point' them at their respective addresses, does the port number matter? "Let's say X=43.." gives the impression it can be any port or perhaps a specific port particular to the system.
I got this far already once and blew everything up again after doing about five of the aliases, so I figured it'd be best to check first before getting to that point again.
Thank you (and you and you) in advance for your time o/
-
I'm assuming you are talking about the port to point the alias in order to "download" the IP list. In that case yes, the port matters. It's the same port as pfsense's webgui, and it's used like this: pfsenseIP:port/directory_where_you_put_the_lists
If you are talking on the ports in the rules, then set it to any, since you don't want to talk to those IPs on any port.
-
@jflsakfja:
I'm assuming you are talking about the port to point the alias in order to "download" the IP list. In that case yes, the port matters. It's the same port as pfsense's webgui, and it's used like this: pfsenseIP:port/directory_where_you_put_the_lists
If you are talking on the ports in the rules, then set it to any, since you don't want to talk to those IPs on any port.
Thanks jflsakfja! Yes, the first part is exactly what I was looking for. Now to wait 8 hours to get home and get back to it, haha. ;D
-
Well, luckily I'm not a quitter.
Last night I blew up my box up after running the script the first time.
So a quick fresh install (4th one now I think) and some steps later and I'm back to the aliases. I get all the ones I find after doing the "ls /usr/local/www/badips/" command and do a jig.
Now I'm on to the two floating rules per alias created. I start with ALIENSHIELD instead of dshield in the example. I finish the first half on WAN and read 'mouse over and a pop up will show some IPs in it'. Nope. It shows the address I put in: 127.0.0.1:275/badips/ALIENVAULT.txt. No IPs and no 1.1.1.1.
Of course I managed to go outside of the lines once again.
Okay, maybe I jacked up the part where it says to set the userfolder and pfdir in the script? Nope, they're set exactly as stated.
In the address 127.0.0.1:275/badips/ALIENVAULT.txt' is this referencing the badips folder in the usr/local/www directory, or the /home/badips? Did I mix them up perhaps?
Oh, and after I ran the script there were no tier rules of any kind auto built or created. Should I just stop now?
Thank anyone in advance for your time :)
-
Hi Matt… I hope to have pfBlockerNG released as a package which will do what my original script was doing and more... Its actually been so long since I looked at that script :) I would have to review and see what steps you missed :)
-
Hi Matt… I hope to have pfBlockerNG released as a package which will do what my original script was doing and more... Its actually been so long since I looked at that script :) I would have to review and see what steps you missed :)
Thanks for the reply BB, I appreciate it. I look forward to that package :)
After the part under (tip when using carp) I followed the numbered steps to get everything set up.
I popped open the script and made the 2 changes that were given (userfolder=/home/badips and pfdir=/usr/www/badips/).
I actually read it this time and saw there were two dependencies, grepcidr and geoIP. I figured out that pkg add -r grepcidr of course doesn't work for me and grabbed it using pkg install grepcidr. I"m not sure if that makes a difference as I couldn't figure out what the -r was, on mine the help blurb says there's a -R.
I set the bypass to yes for the first run also and then set it back after running it.
Attached is a copy of what I have currently.
[current pfiprep config.txt](/public/imported_attachments/1/current pfiprep config.txt)
-
I've sort of backed off staying up to date on the Suricata news as I've had way too many other projects going on, my pfSense box has just been humming along and I was waiting for some things in 2.2.
So, ready to start looking at moving to a 2.2 build and going with Suricata over SNORT. I know the information is all here but this thread has really grown…. really grown. Will there be a sticky with the install/setup essentials as was done with SNORT?
Thanks,
Rick -
I'm pretty fresh at this and started recently with this thread. The content is top notch. However, and this is just my opinion, it seems the methods could use a little tidying up perhaps. Most of the ideas are obviously still valid and the fun lies in trying to get it to work regardless of the state of the path.
The folks in this thread are very helpful also, so there's that to keep you pumped :) jflsakfja has stated he intends on updating it eventually and BBcan177 is working on a package that will take out the script portion mentioned at the 2nd step of the guide.
I hope this isn't too jibber jabber :)
-
Everything (in life) is a work in progress.
-
However, and this is just my opinion, it seems the methods could use a little tidying up perhaps. Most of the ideas are obviously still valid and the fun lies in trying to get it to work regardless of the state of the path.
The folks in this thread are very helpful also, so there's that to keep you pumped :) jflsakfja has stated he intends on updating it eventually and BBcan177 is working on a package that will take out the script portion mentioned at the 2nd step of the guide.
I hope this isn't too jibber jabber :)
Not at all ;D
And you are right, it has become a long thread. I printed it some months ago, it was 65 pages. That takes 1 week of analysis and cross checking if you aren't as skilled (such as I am in these matters). JFL has said he will write a new tutorial, and, like you said, he will probably wait until BB is done with pfBlockerNG to incorporate parts of that package in the tuto too (I think). And he will add to the tuto (if I understood correctly) how to do mass maintenance of rules using the SID-config files Bill so kindly added to Snort.
JFL has one prominent problem: he is loaded with work and doesn't have much time ATM :-[
-
Yea, apologies to everyone for taking so long, but I've been busy with work as Mr. Jingles has stated. One can only do so much with one head, two arms and two legs. I'm not an octopus :P
-
Believe me, I understand busy. Thanks for the responses guys! Really. I'll just be patient and wait for the new items. At least I'm back to a little free time to even post on the forum.
Rick
-
With the upgrade to 2.2 and ubound being able to contact other DNS servers freely, a few FPs might have cropped up in your blocked hosts list.
Rules 2200075, 2240003 and 2102329 need to go.