Online Book Reader

Home Category

Linux Firewalls - Michael Rash [69]

By Root 390 0
you about administrative activities performed by psad, such as importing configuration files and scan information from a previous psad execution.

For example, psad writes the following messages to syslog at startup:

Jul 10 13:58:07 iptablesfw psad: imported valid icmp types and codes

Jul 10 13:58:07 iptablesfw psad: imported p0f-based passive OS fingerprinting

signatures

Jul 10 13:58:07 iptablesfw psad: imported TOS-based passive OS fingerprinting

signatures

Jul 10 13:58:07 iptablesfw psad: imported Snort classification.config

Jul 10 13:58:07 iptablesfw psad: imported original Snort rules in /etc/psad/snort_

rules/ for reference info

Jul 10 13:58:07 iptablesfw psad: imported 205 psad Snort signatures from /etc/psad/

signatures

Scan and Signature Match Messages

The most important class of syslog messages informs you about scans and other suspicious traffic. These messages contain everything from source IP addresses to ports, protocols, and Snort rule matches, and the following syslog messages display a set of psad scan alerts. Note the inclusion of TCP flag information so that you can identify the scan type that is detected by psad:

Jul 13 14:51:48 iptablesfw psad: scan detected: 144.202.X.X -> 71.157.X.X tcp:

[15018-15095] flags: FIN tcp pkts: 10 DL: 2

Jul 13 15:22:38 iptablesfw psad: scan detected: 144.202.X.X -> 71.157.X.X tcp:

[234-40200] flags: SYN tcp pkts: 22 DL: 2

Jul 13 17:12:32 iptablesfw psad: scan detected: 144.202.X.X -> 71.157.X.X tcp:

[15018-15095] flags: NULL tcp pkts: 45 DL: 2

Auto-Response Messages

We can respond to suspicious traffic using psad by instantiating iptables blocking rules against the IP address of the traffic source. This feature is disabled by default, but here are a few syslog messages showing a blocking rule being created and destroyed:

Jul 12 00:06:37 iptablesfw psad: added iptables auto-block against 144.202.X.X for

3600 seconds

Jul 12 01:06:42 iptablesfw psad: removed iptables auto-block against 144.202.X.X

Jul 12 02:14:06 iptablesfw psad: added iptables auto-block against 22.1.X.X for

3600 seconds

Jul 12 03:14:11 iptablesfw psad: removed iptables auto-block against 22.1.X.X

These syslog messages show the number of seconds the source IP address (144.202.X.X) is added to the iptables policy with a set of DROP rules in the INPUT, OUTPUT, and FORWARD chains. Also displayed are the syslog alerts that show the DROP rules being deleted from the running iptables policy.

Note

For an extensive discussion of the response feature, see Chapter 8 and Chapter 11.

* * *

[43] 2 This does not necessarily mean any kind of automated response. As the administrator of a system that is being scanned and probed, you might want to manually pick up the telephone and talk to the upstream provider of the offending IP address.

Concluding Thoughts

This chapter provides an introduction to operational aspects of psad as it detects and reports port scans that are levied against the iptablesfw system with Nmap. Email reports are the primary psad alerting mechanism, but syslog alerts are also provided by psad. In the next chapter we will explore more advanced psad topics, such as the detection of traffic that matches Snort rules via iptables log messages.

Chapter 7. ADVANCED PSAD TOPICS: FROM SIGNATURE MATCHING TO OS FINGERPRINTING

So far we've seen that psad analyzes iptables log messages in order to detect port scans. In this chapter we will extend the theme of attack detection much further; certain attacks that match signatures in the Snort signature set can be detected, and remote operating systems can be fingerprinted in some cases. We will also show how to extract verbose status information from psad, and we'll introduce the DShield reporting capability.

Attack Detection with Snort Rules

Because the iptables logging format is so complete, psad can detect traffic that matches Snort rules that lack application layer match criteria. For example, consider the following Snort rule, which looks for TCP packets with a source port of 10101, an acknowledgment

Return Main Page Previous Page Next Page

®Online Book Reader