On 06/04/18 13:28, Stuart Longland wrote:
>> If you have data on the traffic (netflow comes to mind) it might be
>> worth the effort to see if there's a pattern where the traffic
>> originated. It could be down to some common misconfiguration, maybe even
>> too many naive followers of a slightly misguidedly written HOWTO somewhere.
> 
> This is something I'm looking to investigate, some sort of traffic
> accounting so I can track per IP/protocol/port, how much traffic passes
> through my router.  I did something similar on Linux a year or two back,
> I just have to research how to do the equivalent in OpenBSD.
> 
> A quick Google search suggests netflow is a Cisco router feature.
> https://hackaday.io/project/10529/log/146422-new-router shows the
> installation of the APU2, no Cisco kit here, it's basically a patch
> cable between the ADSL2 modem and the APU2's `em1` port.  If there is an
> equivalent on OpenBSD, I'll gladly have a look.
> 
> My guide was `man pf.conf`, perhaps skimmed over too quickly.  I'm not
> willing to blame the OpenBSD team just yet, more probable I
> misunderstood something, hence the query of whether this line of
> investigation is worth pursuing.

You're in luck, we have pflow(4) which requires only minimal pf.conf
surgery and a collector somewhere. I wrote about that at one point (with
the essentials also in The Book of PF):
https://bsdly.blogspot.com/2014/02/yes-you-too-can-be-evil-network.html
- but do note that once you have 'keep state' or similar with specific
options on a rule, remember to append pflow to the list of options.

- Peter

-- 
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit on all malicious network traffic"
delilah spamd[29949]: 85.152.224.147: disconnected after 42673 seconds.

Reply via email to