snort_inline

Link   http://snort-inline.sourceforge.net/oldhome.html

What is snort_inline?

snort_inline is basically a modified version of Snort that accepts packets from iptables andIPFW via libipq(linux) or divert sockets(FreeBSD), instead of libpcap. It then uses new rule types (drop, sdrop, reject) to tell iptables/IPFW whether the packet should be dropped, rejected, modified, or allowed to pass based on a snort rule set.  Think of this as an Intrusion Prevention System (IPS) that uses existing Intrusion Detection System (IDS) signatures to make decisions on packets that traverse snort_inline.

Contact Info

The code is currently maintained by William Metcalf and Victor Julien. Major contributions have also come from Dave Remien and Nick Rogness. Check out the monitored snort_inline mailing list for discussions on bugs and enhancements.  You must become a member in order to be able to send and receive messages to and from this mailing list.  This was done in order to reduce the amount of spam.  Click hereand follow the directions to become a member.

Downloads

snort_inline comes in three forms: source code, statically compiled binary, and patch.

https://sourceforge.net/projects/snort-inline/files/

https://sourceforge.net/projects/snort-inline/files/snort_inline%20source%20%282.6.x%29/snort_inline-2.6.1.5/snort_inline-2.6.1.5.tar.gz/download

https://sourceforge.net/projects/snort-inline/files/snort_inline%20patch%20%282.6.x%29/snort_inline-2.6.1.5/snort_inline-2.6.1.5.diff.tar.gz/download

FAQ

Mailing List

snort-inline-users

The code is currently maintained by William Metcalf.

Links

Related information that may help with the deployment of snort_inline.

    • Ebtables: The bridging firewall kernel patch may be required if you intend to use snort_inline on a bridge.
    • Honeynet Project: Contains information regarding the deployment of snort_inline in a honeynet environment.
    • iptables: This is how snort_inline receives packets.
    • Libnet: This library allows snort_inline to reject packets.
    • libpcap: This is the packet capture library used to by snort, snort_inline, and many other network analyzers.
    • Snort: The core of snort_inline.
    • snort_inline:  The SourceForge project page.
    • snort_inline blog:  The snort_inline blog page.

-----------------------------------------------

http://www.clamav.net/documents/clamav-virus-database-faq

I’m running ClamAV on a lot of clients on my local network. Can I serve the cvd files from a local server so that each client doesn’t have to download them from your servers?

Sure, you can find more details on our Mirror page.

  • If you want to take advantage of incremental updates, install a proxy server and then configure your freshclam clients to use it (watch for the HTTPProxyServer parameter in man freshclam.conf).

  • The second possible solution is to:

  • Configure a local webserver on one of your machines (say machine1.mylan)

  • Let freshclam download the *.cvd files from http://database.clamav.net to the webserver’s DocumentRoot.

  • Finally, change freshclam.conf on your clients so that it includes:

    DatabaseMirror machine1.mylan

    ScriptedUpdates off

    First the database will be downloaded to the local webserver and then the other clients on the network will update their copy of the database from it.

    Important: For this to work, you have to add ScriptedUpdates off on all of your machines!

Virus Database

For ClamAV to work properly, both the ClamAV engine and the ClamAV Virus Database (CVD) must be kept up to date.

Freshclam should perform these updates automatically. Instructions for setting up Freshclam can be found in the documentation section. 
If your network is segmented or the end hosts are unable to reach the Internet, you should investigate setting up a private local mirror. If this is not viable, you may use these direct download links:  main.cvd | daily.cvd | bytecode.cvd

http://database.clamav.net/main.cvd
http://database.clamav.net/daily.cvd
http://database.clamav.net/bytecode.cvd

------------------------------------------

Snort-Inline + ClamAV

来源  https://ssorc.tw/273

整合snort-inline與掃毒程式clamav

snort-line會去讀clamav的資料庫病毒碼來過濾所傳送的封包,並擋掉有病毒的封包,但snort-inline+clamav無法擋掉壓縮檔、email附件,及OLE2 病毒

以上來說明來自 README.clamav
 

[1.] apt-get install clamav-db clamav-devel clamav

[2.] 編譯時加入clamav
         ./configure – -enable-clamav

make

make install
 

[3.] vi /etc/snort_inline/snort_inline.conf

preprocessor clamav: ports all !22 !443, action-drop, dbdir /var/clamav, dbreload-time 43200

# preprocessor clamav: ports all !22 !443, toclientonly, dbdir /usr/share/clamav, dbreload-time 43200, file-descriptor-mode

預設定檔中clamav項目中的file-descriptor-mode參數在新版中已不用了。

設定只要 "preprocessor clamav: ports all !22 !443, dbdir /var/clamav, dbreload-time 43200" 即可,試驗結果它已直接 action-drop了,或者你要將連線一直重置就設定為 action-reset。
            toclientonly只對 gateway後面的作 drop,而 toserveronly則只對 gateway,而 toclientonly與 toserveronly都不用,則雙方應該是都作 drop。

[4.] 下載 eicar測試
         wget http://www.eicar.org/download/eicar.com

病毒

http://www.gfos.hr/~dragovic/nest/

 

[5.] log記錄訊息

[**] [122:1:1] (spp_clamav) Virus Found: Eicar-Test-Signature [**]
12/09-11:18:40.345607 81.3.3.133:80 -> 10.10.1.100:44902
TCP TTL:50 TOS:0x0 ID:2639 IpLen:20 DgmLen:478 DF
***AP*** Seq: 0x7A232F0D Ack: 0x462705E2  Win: 0x1920 TcpLen: 32
TCP Options (3) => NOP NOP TS: 63382852 259450410

重要引用:

From: Will Metcalf <william@gm…>
 Eicar and ClamAV
2005-03-12 14:47
 It seems as if the clam guy"s updated the signature database with a new definition for Eicar, and it is no longer detected in the same manner. I was wrong, about Clam being broken as it still seems to pick-up other virii ok. In addition, it appears as if Victor thinks
 he has figured out a way to scan file descriptors via writing packet contents to tmp files. We actually should be able to detect more virii using this method.
 Regards,
 Will

Clamav官方改變了定義,所以測試eicar.com病毒,是失敗的

不過在2006/04/22測試新版的Snort-Inline時,clamav已working

 

註: 2006/04/22

clamav配合 preprocessor stickydrop-timeouts: sfportscan 3000, portscan2 3000, clamav 3000

的時後,一開始的連線是被drop的沒錯,不過要等3000秒後,對目的端的全部連線才能再次溝通。

-------------------------------------

snort_inline with clamav on pfsense

============ End

snort_inline的更多相关文章

随机推荐

  1. Apache Rewrite 静态配置

    1.mod_rewrite 简介和配置 Rewirte主要的功能就是实现URL的跳转和隐藏真实地址,基于Perl语言的正则表达式规范.平时帮助我们实现拟静态,拟目录,域名跳转,防止盗链等如一个普通访问 ...

  2. lintcode 394. Coins in a Line 、leetcode 292. Nim Game 、lintcode 395. Coins in a Line II

    变型:如果是最后拿走所有石子那个人输,则f[0] = true 394. Coins in a Line dp[n]表示n个石子,先手的人,是必胜还是必输.拿1个石子,2个石子之后都是必胜,则当前必败 ...

  3. [错误处理]no matches found: connexion[swagger-ui] ?

    问题原因: [ ] 中括号会影响shell脚本的执行 安装的时候在包名扩上双引号"" pip install "connexion[swagger-ui]" w ...

  4. sklearn使用高斯核SVM显示支持向量

    import graphviz import mglearn from mpl_toolkits.mplot3d import Axes3D from sklearn.datasets import ...

  5. 【tshark tcpdump】linux网络排查

    抓包: 1.tcpdump 2.tshark是wireshark的命令行版. tshark使用示例: ,实时打印当前http请求的url # tshark -s -i eth0 -n -f 'tcp ...

  6. [转]Xmind 8 pro 软件破解版

    链接地址:https://blog.csdn.net/qq_16093323/article/details/80967867 作者博客:http://www.carrotchou.blog/

  7. lodop和c-lodop通过打印状态和任务不在队列获取打印成功

    之前的博文有通过判断pirnt的返回值,判断加入队列算打印成功,建议使用这种简单的判断方法.此外还有其他判断方法,例如通过PRINT_STATUS_OK判断,但是这个状态不是所有打印机能支持这种判断成 ...

  8. 【Tools】PDF编辑软件-pdfelement 6.8 官网文件中文+破解版本

    试用了下,感觉还不错分享给大家. 有币的求赏,小弟下载缺币.没币的从附件下载. 赏币地址:https://download.csdn.net/download/qq_18187161/10744059 ...

  9. MySQL语句增加字段,修改字段名,修改类型,修改默认值

    原文地址:https://blog.csdn.net/kimgoo/article/details/54630257 增加字段:alter table 表名 ADD 字段 类型 约束 [默认值 注释] ...

  10. 开源软件“meld”-替代beyond compare -- & 放在linux命令后面真好用

    1, 使用技巧 命令行直接对比文件 meld dir1 dir2 & 亦可以直接打开界面进行类似beyondCompare的操作. { & 放在命令后面表示设置此进程为后台进程 默认情 ...