Re: iptables promisc mode

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On Wed, 15 Nov 2006, Magnus Månsson wrote:

Hi, it seems like a couple of people have asked for this before but I havent seen any answers.

I want iptables to get packages that do not belong to the machine, packages that are directed to others but came to me due to promisc mode. I have found a patch from November 2001 that seems to do what I want but after manually trying to patch it in my userspace utils segfaults. I am not a programmer so no surprise I didnt manage. The old patch is here: http://idea.hosting.lv/a/iptables-promisc/


So, why do I want this? (maybe you can tell me that I should do it in another way) I am having a routing switch that is mirroring the internet traffic into 2 interfaces in a linux machine, this machine is for example running ntop to look at what people are doing (that they shouldnt do). One of the things I/we are interested to find out is if people uses peer to peer protocols like Direct Connect / Bittorrent. My idea was to solve this with iptables layer7 filter (l7-filter.sourceforge.net), ulogd and mysql. But since I cant build ULOG rules that catch the packages I am stuck.

The reason to choose iptables is that I can store all the information about the protocols I am interested in. Ntop doesnt have the history that I want.


I am very thankful for whatever help/directions I can get.



As long as the firewall machine that runs iptables is the gateway from the lan to the internet and vice versa, this is already happening, iptables sees all the traffic in both directions, and can act on it was well, layer 4 and above. Nothing to add, no patch required. But, to have details in the logs of what is passing requires that you build and configure your rules properly, with log statements in your case being well defined and covering a number of common protocol ports. One issue you will face is that most of the traffic you are trying to monitor, is not well defined nor restricted to any common ports, which is whyyou have faced issues in preventing the traffic and even with a layer 7 module.

Plan on having at least one person devoted to nothing but monitoring traffic and logs for sometime to get a handle on what your users are abusing.

Of course common theory is that this kind of abuse is best handled at the HR level, a frewall is not the best place to hadle this kind of policy issue.

Thanks,

Ron DuFresne
- -- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
        admin & senior security consultant:  sysinfo.com
                        http://sysinfo.com
Key fingerprint = 9401 4B13 B918 164C 647A  E838 B2DF AFCC 94B0 6629

...We waste time looking for the perfect lover
instead of creating the perfect love.

                -Tom Robbins <Still Life With Woodpecker>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)

iD8DBQFFW3Ttst+vzJSwZikRAqJzAKDVILcPhWyOSbHKYGhpUHEO63noPwCfXWu9
sjOHDE6m31Vg2OX4EyIP5UE=
=nVCS
-----END PGP SIGNATURE-----

[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux