Snort mailing list archives

Re: How to run multiple instances of snort inline and daq and multiple interfaces (firewall)


From: James Lay <jlay () slave-tothe-box net>
Date: Thu, 30 Mar 2017 15:55:43 -0600

Yes...just test test test before you go production...make sure you're 
firewall is dropping what it's supposed to be.

On 2017-03-30 15:52, Stanford Prescott wrote:
Thanks for the links, James. I want snort to filter (block) "the bad 
stuff"
at the firewall but let the rest proceed on through the rest of the
firewall iptables rules. Will your use of the MANGLE table allow this?

On Thu, Mar 30, 2017 at 4:35 PM, James Lay <jlay () slave-tothe-box net> 
wrote:

It is but be careful...look at this thread:

http://marc.info/?l=snort-users&m=141850470323610&w=2

You'll want to use the MANGLE table, otherwise your firewall rules 
won't
function like you think.  Also this more recent one:

http://marc.info/?l=snort-users&m=147768752101473&w=2

James

On 2017-03-30 15:20, Stanford Prescott wrote:
Maybe snort and NFQ is worth seriously considering. Thanks, Ward.

On Thu, Mar 30, 2017 at 11:35 AM, Ward Sladek <wsladekjr () hotmail com>
wrote:

Isn't NFQ an option here?  Couldn't he just run snort w/ NFQ on each
LAN
iface and call it a day (assuming everything else is configured
properly)?



________________________________
From: Stanford Prescott <stan.prescott () gmail com>
Sent: Thursday, March 30, 2017 8:59 AM
To: wkitty42 () windstream net
Cc: snort-users () lists sourceforge net
Subject: Re: [Snort-users] How to run multiple instances of snort
inline
and daq and multiple interfaces (firewall)

Security onion sounds like a very nice option but is beyond the scope
of
what I am trying to do which is what can I reasonably do on our
firewall
distribution?

I would like to be able to use snort inline on the firewall and use
DAQ to
enable the converting of sids from alerts to drops which seems more
efficient to me than our present implementation of placing the IPs
from
alerts into an ipblock file.

On Wed, Mar 29, 2017 at 9:12 PM, <wkitty42 () windstream net> wrote:

On 03/29/2017 07:14 PM, Stanford Prescott wrote:
Maybe I am going about this all wrong. If snort is going to monitor
each
LAN
interface is it really necessary for snort to also monitor the WAN
interface?

if you don't monitor the WAN interface, how can you catch inbound
attacks
before
they get into the firewall mechanisms? is it not best to stop the cr4p
/before/
it can enter the system? why waste resources transporting it all over
your
LAN(s) before flushing it?

If all traffic goes from the WAN interface to one or the other of
the
LAN
interfaces it seems that monitoring the WAN interface, too would be
"double"
monitoring the same traffic?

with what you appear to be attempting to do, it will absolutely be
double
monitoring... that's understandable and expected... however, if you
are
monitoring the LAN side and catch something there, you can stop it
from
getting
out (eg: phone home malware or the exfiltration of identity
information)... same
for monitoring inbound traffic on the WAN interface... using bridging
is
only to
put snort in the position of gendarme and eliminate "our" active
response
system...

aside: why do you think that i've not carried "our" snort/active
response
implementation on "our" firewall product any further over all these
years?
it
gets really deep really quickly and it is much easier to implement
another
solution for this monitoring rather than to put it all on the
perimeter
firewall... especially when solutions like Security Onion already and
are
easily
implemented in another dedicated device like ""our"" perimeter
firewall...
trying to use snort for the same purpose as "our" active response
system
is
going to be rough for one interface (the tuning and reactions are not
able
to be
the same [eg: timed blocking]) but when you start trying to tie up to
four
interfaces into the monitoring, all hades rises up...

from my previous example, you can see where a four interface setup
(WAN,
LAN1,
LAN2, LAN3) easily becomes an eight interface setup (two per main
pipe so
that
snort can be in the middle of them for its monitoring and dropping of
unwanted
traffic) and the whole thing is now four times as complicated... just
build a
security onion box with its own five interfaces (management plus one
for
each
network connection to be monitored) and let it ride on the side
passively
sniffing the traffic and stuffing it into whatever database with
analytical
software is available... /then/ come up with some way for SO to talk
to
the
perimeter firewall device so that it can adjust its traffic rules to
block
(or
allow after some period of time) traffic to/from bad players... OR
whenever it
happens and the VMs that have been spoken about finally come to
reality,
have
one of them as a SO VM but there's still the needed communication
from SO
to the
perimeter firewall product to tell it to block or remove a block...


On Wed, Mar 29, 2017 at 3:46 PM, Stanford Prescott <
stan.prescott () gmail com>
wrote:

Yes, I figured you would see me, wkitty42. Thank you for trying to
help. ;)

I did see that reference about the interfaces in colon separated
pairs
when using DAQ for inline mode. I am having trouble conceptualizing
how
that bridging works on a Linux firewall where one interface is the
WAN
and
up to three additional interfaces are each a separate LAN in its
own
distinct non-overlapping private subnet. As with a typical NAT
router
firewall all WAN traffic is NATd to the appropriate LAN.

My limited understanding is in order to have snort sniff and alert
on
traffic at each interface that multiple instances of snort running
inline
are required in order to have "bidirectional" monitoring.

The present setup I am dealing with is that snort is installed on
the
firewall box and only sniffs traffic arriving on the WAN interface
from
the
ISP or incoming traffic. Snort is unable to sniff outgoing traffic
from
the
internal LANs and be able to tell where the traffic is coming from
because
by the time traffic from the internal LANs arrives on the WAN
interface,
snort does not have access to where the originating outgoing
traffic
is
from.  I know that is a poor explanation, sorry.

Anyway, perhaps a diagram of the flow of traffic using multiple
instances
of snort running on a firewall distro would help describe how the
interfaces need to be bridged. Does anyone know where a diagram
like
that
might be?



On Wed, Mar 29, 2017 at 3:07 PM, James Lay <
jlay () slave-tothe-box net>
wrote:

On 2017-03-29 13:27, wkitty42 () windstream net wrote:
On 03/29/2017 02:15 PM, Stanford Prescott wrote:
I need to know if the  multiple interfaces can all be bridged to
the
WAN
interface such that:
 WAN eth0 <---inline snort 1 -->LAN eth1

WAN eth0 <---inline snort 2 -->LAN eth2

etc.

Can it be done?

i don't think it can be done like that... likely it should be
more
like
this...

WAN0(eth0) -> snort0 -> WAN0(eth1) -> current path for WAN0 to
LANs
LAN0(eth2) -> snort1 -> LAN0(eth3) -> current path for LAN0 to
LANs
&
WAN0
LAN1(eth4) -> snort2 -> LAN1(eth5) -> current path for LAN1 to
LANs
&
WAN0
LAN2(eth6) -> snort3 -> LAN2(eth7) -> current path for LAN2 to
LANs
&
WAN0

each snort instance has to have its own two interfaces to
bridge...
remember,
each bridge is a dedicated tunnel from one entry point to the
exit
point with
snort processing the data traveling through the tunnel...

something else to think about: each snort should also have its
own
configs...
some parts of the configs can be common and shared between all
snort
instances
while others must be discrete and separate... one should also
consider
the need
for different rules to be in effect for the different snort
instances...

eg: LAN0 may allow TOR traffic but TOR is denied on LAN1 and
LAN2...


PS: i see you ;)



On Tue, Mar 28, 2017 at 1:20 PM, Stanford Prescott
<stan.prescott () gmail com>
wrote:

I am trying to learn some of the ins and outs of snort. Is
there a
tutorial somewhere that outlines how to setup snort in inline
mode
using
daq on a Linux netfilter firewall. It is a typical firewall
setup
with
interfaces of, for example:

eth0 -> WAN interface with public IP address
eth1 -> 1st protected LAN interface with unique subnet
eth2 -> 2nd protected LAN interface with unique subnet
etc....

I would need multiple instances of snort with

instance1 eth0 <---> eth1 (bidirectional)
instance2 eth0 <---> eth2        "
etc.

Thank you!

And per the daq README:

AFPACKET Module
===============

afpacket functions similar to the pcap DAQ but with better
performance:

     ./snort --daq afpacket -i <device>
             [--daq-var buffer_size_mb=<#MB>]
             [--daq-var debug]

If you want to run afpacket in inline mode, you must craft the
device
string as
one or more interface pairs, where each member of a pair is
separated
by
a
single colon and each pair is separated by a double colon like
this:

     eth0:eth1

or this:

     eth0:eth1::eth2:eth3

This applies to PF_RING as well.

James

------------------------------------------------------------
------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
_______________________________________________
Snort-users mailing list
Snort-users () lists sourceforge net
Go to this URL to change user options or unsubscribe:
https://lists.sourceforge.net/lists/listinfo/snort-users
Snort-users Info Page - SourceForge - Download, Develop ...<
https://lists.sourceforge.net/lists/listinfo/snort-users>
lists.sourceforge.net
This list is for general discussion of Snort usage, problems, design,
etc.
Do not use this list, or the members of this list to market your or
any
other products to.


Snort-users list archive:
http://sourceforge.net/mailarchive/forum.php?forum_
name=snort-users

Please visit http://blog.snort.org to stay current on all the
latest
Snort Blog<http://blog.snort.org/>
blog.snort.org
Just released: Snort Subscriber Rule Set Update for 03/23/2017 We
welcome
the introduction of the newest rule release from Talos. In this
release we
introduced 26 new ...


Snort news!



------------------------------------------------------------
------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
_______________________________________________
Snort-users mailing list
Snort-users () lists sourceforge net
Go to this URL to change user options or unsubscribe:
https://lists.sourceforge.net/lists/listinfo/snort-users
Snort-users list archive:
http://sourceforge.net/mailarchive/forum.php?forum_name=snort-users

Please visit http://blog.snort.org to stay current on all the
latest
Snort news!



--
  NOTE: No off-list assistance is given without prior approval.
        *Please keep mailing list traffic on the list* unless
        private contact is specifically requested and granted.

------------------------------------------------------------
------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
_______________________________________________
Snort-users mailing list
Snort-users () lists sourceforge net
Go to this URL to change user options or unsubscribe:
https://lists.sourceforge.net/lists/listinfo/snort-users
Snort-users list archive:
http://sourceforge.net/mailarchive/forum.php?forum_name=snort-users

Please visit http://blog.snort.org to stay current on all the latest
Snort news!

------------------------------------------------------------
------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
_______________________________________________
Snort-users mailing list
Snort-users () lists sourceforge net
Go to this URL to change user options or unsubscribe:
https://lists.sourceforge.net/lists/listinfo/snort-users
Snort-users list archive:
http://sourceforge.net/mailarchive/forum.php?forum_name=snort-users

Please visit http://blog.snort.org to stay current on all the latest
Snort news!
------------------------------------------------------------
------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
_______________________________________________
Snort-users mailing list
Snort-users () lists sourceforge net
Go to this URL to change user options or unsubscribe:
https://lists.sourceforge.net/lists/listinfo/snort-users
Snort-users list archive:
http://sourceforge.net/mailarchive/forum.php?forum_name=snort-users

Please visit http://blog.snort.org to stay current on all the latest
Snort news!

------------------------------------------------------------
------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
_______________________________________________
Snort-users mailing list
Snort-users () lists sourceforge net
Go to this URL to change user options or unsubscribe:
https://lists.sourceforge.net/lists/listinfo/snort-users
Snort-users list archive:
http://sourceforge.net/mailarchive/forum.php?forum_name=snort-users

Please visit http://blog.snort.org to stay current on all the latest
Snort news!

------------------------------------------------------------
------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
_______________________________________________
Snort-users mailing list
Snort-users () lists sourceforge net
Go to this URL to change user options or unsubscribe:
https://lists.sourceforge.net/lists/listinfo/snort-users
Snort-users list archive:
http://sourceforge.net/mailarchive/forum.php?forum_name=snort-users

Please visit http://blog.snort.org to stay current on all the latest
Snort news!

------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
_______________________________________________
Snort-users mailing list
Snort-users () lists sourceforge net
Go to this URL to change user options or unsubscribe:
https://lists.sourceforge.net/lists/listinfo/snort-users
Snort-users list archive:
http://sourceforge.net/mailarchive/forum.php?forum_name=snort-users

Please visit http://blog.snort.org to stay current on all the latest 
Snort news!

------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
_______________________________________________
Snort-users mailing list
Snort-users () lists sourceforge net
Go to this URL to change user options or unsubscribe:
https://lists.sourceforge.net/lists/listinfo/snort-users
Snort-users list archive:
http://sourceforge.net/mailarchive/forum.php?forum_name=snort-users

Please visit http://blog.snort.org to stay current on all the latest Snort news!


Current thread: