public inbox for development@lists.ipfire.org
 help / color / mirror / Atom feed
* DRAFT: Suricata services
@ 2022-07-24 13:26 Stefan Schantl
  2022-07-29 16:09 ` Stefan Schantl
  0 siblings, 1 reply; 2+ messages in thread
From: Stefan Schantl @ 2022-07-24 13:26 UTC (permalink / raw)
  To: development

[-- Attachment #1: Type: text/plain, Size: 1057 bytes --]

Hello list followers,

after some reports on our community portal about a flooded IDS log
in case the tor addon is installed and activated, I tried to solve this
issue.
(https://community.ipfire.org/t/tor-and-ips-conflict-suricata-rulset-where-does-it-come-from/)

The desired solution would be to load additional suricata rules to
silence the noisy rules when tor is used. This worked pretty well so I
extended the code to be more general and such rules for any kind of
service can be written and loaded.

I collected all the changes on my personal git repository:

https://git.ipfire.org/?p=people/stevee/ipfire-2.x.git;a=shortlog;h=refs/heads/suricata-services

For an easy testing I created a test tarball, which can
be found here:

https://people.ipfire.org/~stevee/ids-services/

As usual a README file gives deeper information and guides through
the installation process.

Please share your opinions about this approach and in case you are
testing please provide your feedback here.

A big thanks in advance,

-Stefan


^ permalink raw reply	[flat|nested] 2+ messages in thread

end of thread, other threads:[~2022-07-29 16:09 UTC | newest]

Thread overview: 2+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2022-07-24 13:26 DRAFT: Suricata services Stefan Schantl
2022-07-29 16:09 ` Stefan Schantl

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox