From: Stefan Schantl <stefan.schantl@ipfire.org>
To: development@lists.ipfire.org
Subject: Re: IPFire meets Suricata - Call for tester
Date: Mon, 17 Dec 2018 20:08:50 +0100 [thread overview]
Message-ID: <1f2821bc88afa25b10917a144d82ab19fefe3557.camel@ipfire.org> (raw)
In-Reply-To: <8F49EFF1-9FF8-489D-84BE-085756C89C67@ipfire.org>
[-- Attachment #1: Type: text/plain, Size: 4537 bytes --]
> What is the bypass mark for? At least that should be set to nothing
> instead of one, because that will again conflict with the SNAT fix
> rule.
>
> Best,
> -Michael
>
Hello Michael,
taken from the official suricata.yaml documentation:
bypass mark and mask can be used to implement NFQ bypass. If bypass
mark is set then the NFQ bypass is activated. Suricata will set the
bypass mark/mask on packet of a flow that need to be bypassed. The
Nefilter ruleset has to directly accept all packets of a flow once a
packet has been marked.
In my commit, I've disabled the bypass options to exactly prevent from
any issuse again with the SNAT packet mark.
Best regards,
-Stefan
> > On 17 Dec 2018, at 14:21, Stefan Schantl <stefan.schantl(a)ipfire.org
> > > wrote:
> >
> > Am Sonntag, den 16.12.2018, 21:28 +0100 schrieb Peter Müller:
> > > Hello Stefan,
> > >
> > > to be a bit more precise about the NAT issue:
> > >
> > > My setup is the IPFire Suricata test VM running in KVM, with
> > > two clients (Debian and OpenBSD) directly attached to it.
> > >
> > > The Debian machine is located in GREEN, OpenBSD in ORANGE.
> > > RED interface is connected via bridge to my actual testing LAN;
> > > for the first testing, any outgoing traffic to the internet
> > > was allowed (I will test upstream proxy behaviour later).
> > >
> > > While GREEN was using IPv4 range 192.168.100.0/24, with IPFire
> > > as 192.168.100.1, enabling Suricata caused packets coming from
> > > GREEN not to be NATted anymore: Instead of using the firewall's
> > > RED IP for destination, it was the internal GREEN IP.
> > >
> > > Let me know whether is is useful or not. :-)
> > >
> > > Thanks, and best regards,
> > > Peter Müller
> > >
> > > > Hello Stefan,
> > > >
> > > > back again. :-)
> > > >
> > > > The new IDS WebUI looks quite good so far - enabling/disabling
> > > > Suricata works as well as selecting the rule source and the
> > > > operation mode (IDS/IPS).
> > > >
> > > > I was also able to download the "Snort/VRT Community" ruleset.
> > > > Trying to switch to the "Emerging Threats" ruleset is possible,
> > > > but downloading its ruleset afterwards is not: The GUI simply
> > > > stalls, printing a message that "Snort (!) is performing a
> > > > task".
> > > >
> > > > The WebUI services page still shows IDS status for each
> > > > interface,
> > > > which does not seem to work anymore (everything is stopped, but
> > > > Suricata was active on RED and GREEN).
> > > >
> > > > Further, a client located in GREEN behind the test firewall
> > > > instance is unable to browse the internet as soon as Suricata
> > > > is
> > > > enabled. If disabled, downloading ET rulesets work as well as
> > > > internet traffic. At the moment, I am flying blind here, but it
> > > > looks
> > > > like packets are not NATted anymore if Suricata is active.
> > > >
> > > > Any outgoing connection is in state "SYN_SENT" if Suricata is
> > > > active.
> > > >
> > > > A portscan against the firewall (GREEN interface) is not
> > > > detected,
> > > > even though ET SCAN ruleset is enabled (used nmap with NSE
> > > > active).
> > > >
> > > > Especially the outgoing connection/NAT/? issue mentioned above
> > > > breaks things in my scenario. Anything else are minor issues
> > > > (of
> > > > course, a portscan should be detected, this needs further
> > > > investigation
> > > > indeed). WebUI works fine so far.
> > > >
> > > > Thanks again for your work; I hope the feedback can appreciate
> > > > it
> > > > somehow. :-)
> > > >
> > > > Let me know if there are questions.
> > > >
> > > > Thanks, and best regards,
> > > > Peter Müller
> > > >
> > Hello Peter,
> >
> > thanks for testing and your feedback.
> >
> > I've setup a test environment and was able to re-produce your NAT
> > issue
> > very easy. After some research and help of Michael, we were able to
> > find the real issue.
> >
> > It was located in a identical mark on the packets which already
> > have
> > been scanned by suricata and packets which should be modified for
> > SNAT
> > in the "Mangle" table of the routing logic by the kernel.
> >
> > The changes can be found in my git repository:
> >
> > https://git.ipfire.org/?p=people/stevee/ipfire-2.x.git;a=commit;h=f5ad510e3c0f416a1507999f5ad20ab171df9c07
> >
> > I'll upload a fixed image very soon - please keep on testing.
> >
> > Best regards,
> >
> > -Stefan
[-- Attachment #2: signature.asc --]
[-- Type: application/pgp-signature, Size: 833 bytes --]
next prev parent reply other threads:[~2018-12-17 19:08 UTC|newest]
Thread overview: 53+ messages / expand[flat|nested] mbox.gz Atom feed top
2018-11-29 19:43 Stefan Schantl
2018-12-11 20:53 ` Peter Müller
2018-12-12 20:54 ` Peter Müller
2018-12-16 20:28 ` Peter Müller
2018-12-17 14:21 ` Stefan Schantl
2018-12-17 17:05 ` Michael Tremer
2018-12-17 19:08 ` Stefan Schantl [this message]
2018-12-19 16:30 ` Michael Tremer
2018-12-20 13:03 ` Stefan Schantl
2018-12-20 14:05 ` Michael Tremer
2018-12-21 16:03 ` Tim FitzGeorge
2018-12-25 19:17 ` Stefan Schantl
2018-12-25 21:56 ` Michael Tremer
2018-12-25 19:03 ` Stefan Schantl
2019-01-01 13:32 ` Stefan Schantl
2019-01-02 15:54 ` Michael Tremer
2019-02-06 8:58 ` Stefan Schantl
2019-02-14 14:28 ` Stefan Schantl
2019-02-14 15:20 ` ummeegge
2019-02-14 18:01 ` Matthias Fischer
2019-02-14 21:49 ` Stefan Schantl
2019-02-14 23:16 ` Matthias Fischer
2019-02-14 23:36 ` Mentalic
2019-02-15 7:51 ` Stefan Schantl
2019-02-15 0:03 ` Mentalic
2019-02-15 7:54 ` Stefan Schantl
2019-02-17 11:58 ` Stefan Schantl
2019-02-17 12:59 ` Michael Tremer
2019-02-17 19:57 ` Stefan Schantl
2019-02-18 11:44 ` Michael Tremer
2019-02-18 13:09 ` Stefan Schantl
2019-03-03 11:37 ` ummeegge
2019-03-03 18:48 ` Stefan Schantl
2019-03-04 6:28 ` ummeegge
2019-02-18 13:16 ` Stefan Schantl
2019-02-18 22:11 ` Mentalic
2019-02-19 11:33 ` Stefan Schantl
2019-02-19 22:12 ` Mentalic
2019-02-19 23:22 ` Mentalic
2019-02-20 7:55 ` Stefan Schantl
2019-02-21 21:56 ` Mentalic
2019-02-22 10:21 ` Michael Tremer
2019-02-22 11:08 ` Stefan Schantl
2019-02-22 10:59 ` Stefan Schantl
2019-02-22 18:40 ` Mentalic
2019-02-20 7:19 ` Stefan Schantl
2019-03-03 14:39 ` Stefan Schantl
2019-03-03 17:33 ` Mentalic
2019-03-04 19:54 ` Mentalic
2019-03-05 9:31 ` Michael Tremer
[not found] <E1gf64O-0003zJ-Kt@smtprelay03.ispgateway.de>
2019-01-06 13:26 ` IPFire meets Suricata - Call for Tester Stefan Schantl
[not found] <79FF884C-B36B-42F5-A620-F2636E3706FC@gmail.com>
2019-02-06 9:57 ` IPFire meets Suricata - Call for tester Stefan Schantl
2019-02-06 10:43 ` Michael Tremer
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=1f2821bc88afa25b10917a144d82ab19fefe3557.camel@ipfire.org \
--to=stefan.schantl@ipfire.org \
--cc=development@lists.ipfire.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox