IDS mailing list archives
Re: Sniffing split connections
From: rusty chiles <rustychiles () gmail com>
Date: Thu, 14 Apr 2005 11:51:21 -0700
You could always use the linux kernels bonding feature. It will take 2 ethernet interfaces and trunk the traffic flowing through them into a virtual interface that you can tell snort to listen on. Example All traffic from eth1 and eth2 will be combined to a virtual interface device called bond0. To set this up you would do something similar to this: #load the bonding kernel module modprobe bonding #bring up your interfaces that can see the traffic in promiscous mode ifconfig eth1 promisc -arp up ifconfig eth2 promisc -arp up #bring up the bonding interface ifconfig bond0 promisc -arp up #enslave eth1 and eth2 to the bond0 interface ifenslave bond0 eth1 ifenslave bond0 eth2 Now instead of telling snort to run on eth1 or eth2 etc you will need to tell it to run on bond0. If all works you should see all traffic from eth1 and eth2 on bond0. Hope this helps. -Rusty On 4/11/05, Chris Mills <securinate () gmail com> wrote:
Hi all- Here's the problem I'm having: I have a client site that has two physical connections from its ATM switch that connect to two different providers. The ATM switch uses both connections all the time (not set up as a failover.) The ATM switch at the site will not let me mirror the ports so I can't sniff there... and after the two providers, the connection is too fast for my equipment. I am using Snort 2.3.2 on PowerEdge 1750's. If I place a sniffer at both provider A and provider B, is there a way I can reassemble the traffic so I can see complete sessions? The two providers are on different sides of town. |--------|PROVIDER A|\ Client Site| |-----------|INTERNET| |--------|PROVIDER B|/ Thanks very much, Chris -------------------------------------------------------------------------- Stop hurting your network! The NeVO passive vulnerability sensor continuously finds vulnerabilities, applications and new hosts without the need for network scanning. It also finds compromised systems with application-based intrusion detection. Go to http://www.tenablesecurity.com/products/nevo.shtml to learn more. --------------------------------------------------------------------------
-------------------------------------------------------------------------- Stop hurting your network! The NeVO passive vulnerability sensor continuously finds vulnerabilities, applications and new hosts without the need for network scanning. It also finds compromised systems with application-based intrusion detection. Go to http://www.tenablesecurity.com/products/nevo.shtml to learn more. --------------------------------------------------------------------------
Current thread:
- Sniffing split connections Chris Mills (Apr 13)
- Re: Sniffing split connections Richard Bejtlich (Apr 15)
- Re: Sniffing split connections Tony Carter (Apr 15)
- Re: Sniffing split connections rusty chiles (Apr 15)
- Re: Sniffing split connections Chris Mills (Apr 15)
- Re: Sniffing split connections Adam Powers (Apr 20)
- <Possible follow-ups>
- RE: Sniffing split connections Geff Ambrose (Apr 15)
- Re: Sniffing split connections Barrett G . Lyon (Apr 20)
- Re: Sniffing split connections Johann_van_Duyn (Apr 19)