Re: Promiscuous mode and xtables

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Actually, yes. I had assumed you'd need INPUT to be ACCEPT to monitor,
but of course you won't. For two reasons:

1. You're (presumably) not interested in monitoring traffic intended for
the server itself.
2. Your monitoring software sniffs the traffic using libpcap, which gets
its data before netfilter is applied.

That being the case, set all chains to DROP, and just sniff. But again,
make sure the application doing the sniffing is secure, and preferably
drops privileges as soon as the socket is open.

Regards,
Tyler

On 2011-08-04 22:57, Jonathan Tripathy wrote:
> Shouldn't I also set the input chain to DROP as well?
> 
> Thanks
> 
> On 04/08/2011 09:37, Tyler J. Wagner wrote:
>> If you intend to monitor only, set OUTPUT and FORWARD chains to DROP.
>> Otherwise you can't firewall. Make sure your monitoring software is up
>> to date, as vulnerabilities on it will be the biggest issue.
>>
>> Regards,
>> Tyler
>>
>> Jonathan Tripathy<jonnyt@xxxxxxxxxxx>  wrote:
>>
>>      Hi Everyone,
>>
>>      Currently, I use ebtables and iptables to secure my servers. It
>> would be
>>      appreciated if someone could please give me some advice on what
>> the best
>>      settings are for using a network port in promiscuous mode for
>> network
>>      monitoring *only*. I.e. I do not want any of this traffic to be
>> able to
>>      access anything on my server.
>>
>>      Thanks
>>      --
>>      To unsubscribe from this list: send the line "unsubscribe
>> netfilter" in
>>      the body of a message to majordomo@xxxxxxxxxxxxxxx
>>      More majordomo info at  http://vger.kernel.org/majordomo-info.html
>>
> 

-- 
A bad analogy is like a leaky screwdriver.
--
To unsubscribe from this list: send the line "unsubscribe netfilter" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html


[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux