On Jun 06, 2013, Jeremiah Rothschild wrote:

> Hi Michael!

Hello Jeremiah,

> I am trying to tie some fwsnort-generated rules into psad
> so that, after their Netfilter log entry is encountered, an
> automatic block is applied.

Understood.

> I've done a lot of troubleshooting, as well as read and
> re-read the relevant sections in your "Linux Firewalls" book
> (nice work on that, BTW!), but I can't seem to get it to
> happen. Perhaps with your assistance I can get it to work
> (or it can be tossed on a bug list). Thanks in advance!
> 
> To begin with, I let fwsnort inject this SID237-based test
> rule into my iptables policy:
> 
> -A FWSNORT_FORWARD -p udp -m udp --dport 27444 -m string
> --string "l44adsl" --algo bm -m comment --comment "sid:237;
> msg:DDOS Trin00 Master to Daemon default password attempt;
> classtype:attempted-dos; reference:arachnids,197; rev:2;
> FWS:1.6.3;" -j LOG --log-ip-options --log-prefix "[10] SID237 "
> 
> I then, remotely, exercise the rule and the appropriate
> log entry is created (most notably we see the "[9] SID237"
> log-prefix):
> 
> [root@firewall ~]# grep SID237 /var/log/messages
> Jun  6 11:11:11 firewall kernel: [80224.827665] [9] SID237 IN=eth1 OUT=
> MAC=00:40:e8:c4:4a:f2:00:0b:b7:ef:4a:60:08:00 SRC=123.222.111.222
> DST=111.222.33.44 LEN=36 TOS=0x00 PREC=0x00 TTL=45 ID=65214 DF PROTO=UDP
> SPT=45320 DPT=27444 LEN=16 

That looks good - the iptables policy is working and string matching is
happening based on the translated snort rule.

> Further, because I have:
> 
> SNORT_SID_STR               SID;
> 
> defined in psad.conf, psad also generates its own entries:
> 
> Jun  6 11:11:43 fw1 psad: src: 124.213.66.97 signature match: "DDOS Trin00
> Master to Daemon default password attempt" (sid: 237) udp port: 27444 fwsnort
> chain: FWSNORT_INPUT rule: 9

This looks good too since psad detects the snort rule match in the
iptables log message.

> Jun  6 11:11:43 fw1 psad: scan detected: 124.213.66.97 -> 61.111.111.16 udp:
> [27444] udp pkts: 2 DL: 2
> 
> That all seems fine. However, even with psad.conf configured as so:
> 
> ENABLE_AUTO_IDS             Y;
> AUTO_IDS_DANGER_LEVEL       4;
> AUTO_BLOCK_TIMEOUT          86400;
> ENABLE_AUTO_IDS_REGEX       Y;
> AUTO_BLOCK_REGEX            SID;  ### from fwsnort logging prefixes
> 
> I cannot get psad to initiate any banning action (unless I explicitly
> add an entry to snort_rule_dl (which is not how I wish to handle
> management)).
> 
> Any thoughts on what might be going on would be greatly appreciated!

I believe the issue is that the AUTO_IDS_DANGER_LEVEL is too high for
what you want here.  The scan log message above shows that psad has
assigned a danger level of 2 as a result of the Snort rule match.  But,
the AUTO_IDS_DANGER_LEVEL variable provides a way for you to set the
minimum danger level that a scan or attack must reach before the source
IP is blocked.  If you set this variable to 2, then I think it should
work.

Thanks,

--Mike

> Regards,
> 
> j

------------------------------------------------------------------------------
How ServiceNow helps IT people transform IT departments:
1. A cloud service to automate IT design, transition and operations
2. Dashboards that offer high-level views of enterprise services
3. A single system of record for all IT processes
http://p.sf.net/sfu/servicenow-d2d-j
_______________________________________________
psad-discuss mailing list
psad-discuss@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/psad-discuss

Reply via email to