Download your favorite Linux distribution at LQ ISO.
Go Back > Forums > Linux Forums > Linux - Security
User Name
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.


  Search this Thread
Old 06-01-2004, 03:47 PM   #1
Registered: Apr 2003
Location: Silicon Valley East, Northern Virginia
Distribution: FreeBSD,Debian, RH, ok well most of em...
Posts: 238

Rep: Reputation: 30
strange question

I have an odd question. I have been looking for a way to make a "poor man's" Interspect. Checkpoint has a "system" that sits on a segment. It watches all traffic (at layer 2 I assume) for packet signatures and matches them to a database of virus or IDS signatures. If it sees a positive match it will block all traffic from the offending machine and disable any routes. Effectively keeping "bad" systems from infecting other non-patched systems on the LAN.

I know that I can put my firewall in bridged mode dropping it to layer 2 as a network hop basically but still filtering per my rules. I can also add Snort to beef up what is seen and alert. My question is, how could I also effectively block an offending machine?

My assumption is an auto-rule to "block any from offending ip".

snort-inline maybe???
Old 06-03-2004, 12:34 PM   #2
Registered: May 2001
Posts: 29,359
Blog Entries: 55

Rep: Reputation: 3546Reputation: 3546Reputation: 3546Reputation: 3546Reputation: 3546Reputation: 3546Reputation: 3546Reputation: 3546Reputation: 3546Reputation: 3546Reputation: 3546
Yeah, Snort can send RST's to both parties or use 3rd party apps to help blocking by firewall.
Old 06-04-2004, 12:44 PM   #3
Registered: Jun 2002
Location: USA
Distribution: Suse 8.0
Posts: 247

Rep: Reputation: 30
Originally posted by unSpawn
Yeah, Snort can send RST's to both parties or use 3rd party apps to help blocking by firewall.
Can you possible provide a link to docs on implementing snort sending rst's? I found this but was unable to grasp exactly what it is saying

One other question; since snort just watches the traffic, not route it, wouldn't it be possible for a host to be infected/compromised before snort could process the rule and send back a rst packet?


Thread Tools Search this Thread
Search this Thread:

Advanced Search

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off

Similar Threads
Thread Thread Starter Forum Replies Last Post
strange question 8-) uncle_fungus1 Linux - General 1 03-22-2004 03:07 PM
heres a strange question.... zenji General 7 01-05-2004 05:50 PM
strange question pHoeNIgS Linux - Software 2 09-09-2003 11:23 AM
Strange Question NamedRisk Slackware 3 05-18-2003 02:01 PM
A Strange Question !!! hhegab Linux - Distributions 3 07-31-2002 05:36 PM > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 05:44 AM.

Main Menu
Write for LQ is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Facebook: linuxquestions Google+: linuxquestions
Open Source Consulting | Domain Registration