Taming the beasts… aka suricata blueprint
-
Good day folks!
I've had to hold off on my progress, but actually got through the script part not long after my last post. I broke it all to hell, so had to start over. I'm not worried as I learned some stuff along the way and that feels good.
As I come back to get it going again I see pfsense 2.2 has been released. Will this release affect this +year old thread's contents? Should I hold off until a revision is made? Is there one I haven't seen yet (I honestly have been cruising these forums to keep an eye out).
Thank you in advance for your answers and time, I hope everyone's New Year has gotten off to a great start.
-
As I come back to get it going again I see pfsense 2.2 has been released. Will this release affect this +year old thread's contents? Should I hold off until a revision is made? Is there one I haven't seen yet (I honestly have been cruising these forums to keep an eye out).
Go for it… Shouldn't make a difference at all
-
I'm now setting up my aliases after running the script initially.
For the part where I 'point' them at their respective addresses, does the port number matter? "Let's say X=43.." gives the impression it can be any port or perhaps a specific port particular to the system.
I got this far already once and blew everything up again after doing about five of the aliases, so I figured it'd be best to check first before getting to that point again.
Thank you (and you and you) in advance for your time o/
-
I'm assuming you are talking about the port to point the alias in order to "download" the IP list. In that case yes, the port matters. It's the same port as pfsense's webgui, and it's used like this: pfsenseIP:port/directory_where_you_put_the_lists
If you are talking on the ports in the rules, then set it to any, since you don't want to talk to those IPs on any port.
-
@jflsakfja:
I'm assuming you are talking about the port to point the alias in order to "download" the IP list. In that case yes, the port matters. It's the same port as pfsense's webgui, and it's used like this: pfsenseIP:port/directory_where_you_put_the_lists
If you are talking on the ports in the rules, then set it to any, since you don't want to talk to those IPs on any port.
Thanks jflsakfja! Yes, the first part is exactly what I was looking for. Now to wait 8 hours to get home and get back to it, haha. ;D
-
Well, luckily I'm not a quitter.
Last night I blew up my box up after running the script the first time.
So a quick fresh install (4th one now I think) and some steps later and I'm back to the aliases. I get all the ones I find after doing the "ls /usr/local/www/badips/" command and do a jig.
Now I'm on to the two floating rules per alias created. I start with ALIENSHIELD instead of dshield in the example. I finish the first half on WAN and read 'mouse over and a pop up will show some IPs in it'. Nope. It shows the address I put in: 127.0.0.1:275/badips/ALIENVAULT.txt. No IPs and no 1.1.1.1.
Of course I managed to go outside of the lines once again.
Okay, maybe I jacked up the part where it says to set the userfolder and pfdir in the script? Nope, they're set exactly as stated.
In the address 127.0.0.1:275/badips/ALIENVAULT.txt' is this referencing the badips folder in the usr/local/www directory, or the /home/badips? Did I mix them up perhaps?
Oh, and after I ran the script there were no tier rules of any kind auto built or created. Should I just stop now?
Thank anyone in advance for your time :)
-
Hi Matt… I hope to have pfBlockerNG released as a package which will do what my original script was doing and more... Its actually been so long since I looked at that script :) I would have to review and see what steps you missed :)
-
Hi Matt… I hope to have pfBlockerNG released as a package which will do what my original script was doing and more... Its actually been so long since I looked at that script :) I would have to review and see what steps you missed :)
Thanks for the reply BB, I appreciate it. I look forward to that package :)
After the part under (tip when using carp) I followed the numbered steps to get everything set up.
I popped open the script and made the 2 changes that were given (userfolder=/home/badips and pfdir=/usr/www/badips/).
I actually read it this time and saw there were two dependencies, grepcidr and geoIP. I figured out that pkg add -r grepcidr of course doesn't work for me and grabbed it using pkg install grepcidr. I"m not sure if that makes a difference as I couldn't figure out what the -r was, on mine the help blurb says there's a -R.
I set the bypass to yes for the first run also and then set it back after running it.
Attached is a copy of what I have currently.
[current pfiprep config.txt](/public/imported_attachments/1/current pfiprep config.txt)
-
I've sort of backed off staying up to date on the Suricata news as I've had way too many other projects going on, my pfSense box has just been humming along and I was waiting for some things in 2.2.
So, ready to start looking at moving to a 2.2 build and going with Suricata over SNORT. I know the information is all here but this thread has really grown…. really grown. Will there be a sticky with the install/setup essentials as was done with SNORT?
Thanks,
Rick -
I'm pretty fresh at this and started recently with this thread. The content is top notch. However, and this is just my opinion, it seems the methods could use a little tidying up perhaps. Most of the ideas are obviously still valid and the fun lies in trying to get it to work regardless of the state of the path.
The folks in this thread are very helpful also, so there's that to keep you pumped :) jflsakfja has stated he intends on updating it eventually and BBcan177 is working on a package that will take out the script portion mentioned at the 2nd step of the guide.
I hope this isn't too jibber jabber :)
-
Everything (in life) is a work in progress.
-
However, and this is just my opinion, it seems the methods could use a little tidying up perhaps. Most of the ideas are obviously still valid and the fun lies in trying to get it to work regardless of the state of the path.
The folks in this thread are very helpful also, so there's that to keep you pumped :) jflsakfja has stated he intends on updating it eventually and BBcan177 is working on a package that will take out the script portion mentioned at the 2nd step of the guide.
I hope this isn't too jibber jabber :)
Not at all ;D
And you are right, it has become a long thread. I printed it some months ago, it was 65 pages. That takes 1 week of analysis and cross checking if you aren't as skilled (such as I am in these matters). JFL has said he will write a new tutorial, and, like you said, he will probably wait until BB is done with pfBlockerNG to incorporate parts of that package in the tuto too (I think). And he will add to the tuto (if I understood correctly) how to do mass maintenance of rules using the SID-config files Bill so kindly added to Snort.
JFL has one prominent problem: he is loaded with work and doesn't have much time ATM :-[
-
Yea, apologies to everyone for taking so long, but I've been busy with work as Mr. Jingles has stated. One can only do so much with one head, two arms and two legs. I'm not an octopus :P
-
Believe me, I understand busy. Thanks for the responses guys! Really. I'll just be patient and wait for the new items. At least I'm back to a little free time to even post on the forum.
Rick
-
With the upgrade to 2.2 and ubound being able to contact other DNS servers freely, a few FPs might have cropped up in your blocked hosts list.
Rules 2200075, 2240003 and 2102329 need to go.
-
Hi, will you update the blue prnt to set PfBlockerNG as list blocker?
Thank You
-
Of course, wasn't that why pfBlockerNG was created for in the first place? (to make lists easier to manage) ;)
The updated guide is coming. But if everybody could ease up on the "are we there yet?" questions I would appreciate it ;D
As soon as the new version is out, both topics (snort and suricata) will be updated to show where to find the new version, and a topic dedicated to discussing the new guide will be created.
-
Since I like transparency, just letting anyone know that I'm waiting for permission to go ahead and start public work on the guide. Some parts of the guide have been completed offline, waiting to be pushed when the time comes.
Here's the relevant topic. https://forum.pfsense.org/index.php?topic=88244. An email has been sent to the mentioned address as well.
Edit: brain-farting-typo
-
Thanks for the guide jflsakfja, it's obvious that you've put a lot of work into it and I look forward to seeing it completed. I have one suggestion though, when you publish the guide it might be better to use pictures (maybe pics showing the firewall rules on all the interfaces) or indenting, similar to what you did with configuring the "pfsense ports". For example, the "outgoing ports" rule creation gets a little lost in a paragraph format in my opinion.
"Head over to an interface's tab and set up a an allow rule. Source should be the interface's subnet. The destination should be any, and for the ports use the outgoing ports alias created above. Destination should be any. Otherwise identical to the webgui rule."
-
That's exactly what I'm planning to do eventually, hence github, hence github pages (a little less known feature of github) ;)
Something along the lines of: http://jflsakfja.github.io/test-page
It's gonna be good, I promise that :-)