Snort2c attempts to be a improved version of snort2pf wrote by
Stephan
Schmieder in perl [0] with some advantages:
It contents snort2c (daemon) and mons2c (snort2c's table management tool).
Hey! Now avaliable snort2c into snort like an output-plugin see [!] or spoink.sourceforge.net |
Snort2c works monitoring snort's alertfile using a kqueue
filter and blocking any attacker's ip that not were in our
whitelist file.
It uses a (persist) table and a (block in) rule
that blocks any access against our network.
Snort2c can be called in several forms, using -s (start)
option, it will add table and rule at the end of
your pf rules.
A rc.local example:
if [ -x "$path_to_snort2c" ]; then $path_to_snort2c -w $path_to_whitelist -s echo -n " snort2c" fi |
Adding snort2c's table manually:
# pf.conf ext_if="rl0" int_if="rl1" trusted_ip="{192.168.1.15}" internal_net="192.168.2.0/24" public_tcp="{https, cvspserver,www, ssh, smtp}" set block-policy return table <snort2c> persist ... pass in on $int_if from $int_if:network to any keep state block in from <snort2c> to any # end |
NOTE: when snort2c is called without -s option assumes
snort2c's table and rule exists, in other case, it quits.
You must use a whitelist file for snort2c, including your ip
and others than you want to protect against snort decisions.
It can be done using -w option and specifying a whitelist
file similar to:
192.168.21.1 192.168.21.4 192.168.21.8 |
Snort2c runs in daemon mode per default, use debug option
(-d)
to view decisions and parsing stuff when it is working.
Listing blocked ips.
vm@mescaline# mons2c -l 192.168.1.40 192.168.1.115
Using mons2c to flush snort2c's table.
vm@mescaline# mons2c -f vm@mescaline# mons2c -l
Using mons2c to delete IP's in snort2c's table.
vm@mescaline# mons2c -d 192.168.1.115 vm@mescaline# mons2c -l 192.168.1.40
It lacks "autodisable blocks" support for blocked ips.
Its not recommended use snort2c in production environments
or critical systems.
SNORT2C(8) OpenBSD System Manager's Manual SNORT2C(8) NAME snort2c - action tool against attackers based in snort alerts SYNOPSIS snort2c [-hsd] [-w WhiteListFile] [-a AlertFile] DESCRIPTION snort2c analyzes snort output and blocks attackers using pf. It's based in orignal snort2pf wrote by Stephan Schmieder. The options are as follows: -h Show help. -s Run in init mode. It create for you a persist table (snort2c) and a "block return" rule for it. It useful when you run snort2c at boot and you don't want to edit your pf.conf. -d Run in debug mode. Daemon mode is disabled. -w WhiteListFile whitelist file for protected hosts. -a AlertFile snort alert file, default is /var/log/snort/alert. SEE ALSO pf(4), pfctl(8), snort(8) AUTHORS Antonio Benojar January 29, 2005 1 |
MONS2C(8) OpenBSD System Manager's Manual MONS2C(8) NAME mons2c - snort2c monitor SYNOPSIS mons2c [-lf] [-d ip] DESCRIPTION mons2c prints out IPs blocked by snort2c The options are as follows: -l prints out blocked IPs. -f flush snort2c table. -d ip delete "ip" ip from snort2c table. SEE ALSO pf(4), pfctl(8), snort2c(8), snort(8) AUTHORS Antonio Benojar January 30, 2005 1 |
- autorevoke blocks per time.
contact at zz |dot| stalker |at| gmail |dot| com public key id: 0x1E0D5A2A