DaemonForums  

Go Back   DaemonForums > OpenBSD > OpenBSD Security

OpenBSD Security Functionally paranoid!

Reply
 
Thread Tools Display Modes
  #1   (View Single Post)  
Old 8th September 2015
Peter_APIIT Peter_APIIT is offline
Shell Scout
 
Join Date: Jun 2008
Posts: 121
Default Snort IPS IPFW

Hello to all,

Anyone here had successfully deploy a fully functional Snort IPS using IPFW on OpenBSD?

Please share some thought. Thanks.
Reply With Quote
  #2   (View Single Post)  
Old 8th September 2015
jggimi's Avatar
jggimi jggimi is offline
More noise than signal
 
Join Date: May 2008
Location: USA
Posts: 7,984
Default

This is not possible. IPFW requires FreeBSD or Linux.
Reply With Quote
  #3   (View Single Post)  
Old 9th September 2015
sacerdos_daemonis's Avatar
sacerdos_daemonis sacerdos_daemonis is offline
Real Name: Will forever be a secret.
Spam Deminer
 
Join Date: Sep 2014
Posts: 283
Default

Quote:
What are the other method (daq) to deploy a fully functional Snort IPS on OpenBSD?
If this is true:
Quote:
Originally Posted by jggimi View Post
This is not possible. IPFW requires FreeBSD or Linux.
What would be the "other" methods? Not possible means there is no first method. You appear to be asking the same question twice.

How can this be done?
It is not possible.
But how can I do it?


EDIT
I am assuming "fully functional Snort IPS" means including IPFW.
Reply With Quote
  #4   (View Single Post)  
Old 9th September 2015
Peter_APIIT Peter_APIIT is offline
Shell Scout
 
Join Date: Jun 2008
Posts: 121
Default

IPFW has similar functionality in terms of divert packet. I though this can achieve on OpenBSD pf packet filter too.

What are the other method (daq) to deploy a fully functional Snort IPS on OpenBSD?

AFAIK, all daq are applicable to Linux netfilter and FreeBSD IPFW only.
Reply With Quote
  #5   (View Single Post)  
Old 9th September 2015
jggimi's Avatar
jggimi jggimi is offline
More noise than signal
 
Join Date: May 2008
Location: USA
Posts: 7,984
Default

OpenBSD does not have IPFW, and there are no plans to add IPFW.

However, a skilled administrator can use Snort in inline mode, using pf(4) and divert(4).

http://marc.info/?t=137004380800001&r=1&w=2
Reply With Quote
  #6   (View Single Post)  
Old 9th September 2015
denta denta is offline
Shell Scout
 
Join Date: Nov 2009
Location: Sweden
Posts: 95
Default

Out of curiosity, what services are you running that shall be "protected" with this snort installation?
Reply With Quote
  #7   (View Single Post)  
Old 13th September 2015
Peter_APIIT Peter_APIIT is offline
Shell Scout
 
Join Date: Jun 2008
Posts: 121
Default

Quote:
Originally Posted by denta View Post
Out of curiosity, what services are you running that shall be "protected" with this snort installation?
General protection. I don't have any web server, database server not ftp or sshd.
Reply With Quote
  #8   (View Single Post)  
Old 13th September 2015
denta denta is offline
Shell Scout
 
Join Date: Nov 2009
Location: Sweden
Posts: 95
Default

Quote:
Originally Posted by Peter_APIIT View Post
General protection. I don't have any web server, database server not ftp or sshd.
So basically, it sounds like the packets that would trigger snort alerts would have been blocked by pf anyway. Perhaps an alternative is the pf overload <table> statement, which allows you to automatically block certain IP:s, without the added effort and security risks of running snort on your external interface(s).
Reply With Quote
  #9   (View Single Post)  
Old 14th September 2015
Peter_APIIT Peter_APIIT is offline
Shell Scout
 
Join Date: Jun 2008
Posts: 121
Default

Quote:
Originally Posted by denta View Post
Perhaps an alternative is the pf overload <table> statement, which allows you to automatically block certain IP:s, without the added effort and security risks of running snort on your external interface(s).
Any concrete examples?
How to fill out the table with list of blocked ips?
My current pf block syntax is:
block drop log

By the way, this is my pf block log.
Quote:
Sep 14 20:52:56.301290 rule 4/(match) block in on pppoe0: 108.168.174.5.443 > 60.53.42.92.36431: FP 0:31(31) ack 1 win 514 <nop,nop,timestamp 2051785347 10995349> (DF)

Sep 14 20:53:33.017906 rule 4/(match) block in on pppoe0: 1.9.56.40.80 > 60.53.42.92.51352: F 2616242450:2616242450(0) ack 4124174253 win 494 (DF)
Sep 14 20:53:33.305442 rule 4/(match) block in on pppoe0: 1.9.56.40.80 > 60.53.42.92.51352: F 0:0(0) ack 1 win 494 (DF)
Sep 14 20:53:33.615651 rule 4/(match) block in on pppoe0: 1.9.56.40.80 > 60.53.42.92.51352: F 0:0(0) ack 1 win 494 (DF)
Sep 14 20:53:34.234846 rule 4/(match) block in on pppoe0: 1.9.56.40.80 > 60.53.42.92.51352: F 0:0(0) ack 1 win 494 (DF)
Quote:
The Email chain referenced included an example to test functionality, using ICMP traffic initiated from a test system.
The email chain from Lawrence showing there is pf inbound packet using pass in syntax but i don't have any pass in traffic to serve in my environment. I just want to check for every packet of outbound to the equivalent inbound packet for virus scanning and etc.

EDIT:
Layer 7 protocol inspection
policy filtering (or packet marking), TCP flag state filtering,

Thanks.

Last edited by Peter_APIIT; 14th September 2015 at 01:40 PM.
Reply With Quote
Old 13th September 2015
Peter_APIIT Peter_APIIT is offline
Shell Scout
 
Join Date: Jun 2008
Posts: 121
Default

Quote:
Originally Posted by jggimi View Post
OpenBSD does not have IPFW, and there are no plans to add IPFW.

However, a skilled administrator can use Snort in inline mode, using pf(4) and divert(4).

http://marc.info/?t=137004380800001&r=1&w=2
Any concrete examples or explanation would be good?
Reply With Quote
Old 13th September 2015
jggimi's Avatar
jggimi jggimi is offline
More noise than signal
 
Join Date: May 2008
Location: USA
Posts: 7,984
Default

The Email chain referenced included an example to test functionality, using ICMP traffic initiated from a test system.
Reply With Quote
Reply


Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off

Forum Jump

Similar Threads
Thread Thread Starter Forum Replies Last Post
Snort Install from Source no configuration Peter_APIIT OpenBSD Packages and Ports 2 18th August 2015 07:02 AM
Snort Daemon not running Peter_APIIT OpenBSD Packages and Ports 7 30th June 2015 12:32 PM
Snort 2.9.1 improves protocol handling J65nko News 0 30th August 2011 12:26 AM
PF + SNORT on one machine WeakSauceIII OpenBSD Security 5 30th July 2009 09:02 AM
snort install error ijk FreeBSD Installation and Upgrading 1 11th August 2008 10:53 AM


All times are GMT. The time now is 06:04 PM.


Powered by vBulletin® Version 3.8.4
Copyright ©2000 - 2024, Jelsoft Enterprises Ltd.
Content copyright © 2007-2010, the authors
Daemon image copyright ©1988, Marshall Kirk McKusick