OPNsense
  • Home
  • Help
  • Search
  • Login
  • Register

  • OPNsense Forum »
  • English Forums »
  • Intrusion Detection and Prevention »
  • Suricata results
« previous next »
  • Print
Pages: [1]

Author Topic: Suricata results  (Read 6073 times)

dave

  • Jr. Member
  • **
  • Posts: 74
  • Karma: 5
    • View Profile
Suricata results
« on: February 13, 2020, 04:07:48 pm »
I'm seeing results that make me wonder to what extent Suricata is really opperating.

I have PPPoE WAN, so I'm running Suricata on the LAN and WLAN:



First I tried adding FB's SHA1 fingerprint to a custom rule:



Then, using Edge, browsed to FB and it loaded without aleting; changing from alert to drop didn't help.
I did clear Edge's caches beforehand, just to make sure.

I then took a closer look at OPNsense-App-detect/media-streaming which, afaict, is a DNS filter.

I downloaded and enabled to block, restarted both OPNsense and Pi-Hole DNS services to clear their caches, then cleared Edge's caches, and was still able to browse to Netflix and YouTube.

I then enabled to block OPNsense-App-detect/test and tried downloading the Eicar test:



So that worked, but over port 80.

Do I really need to enable full MiTM SSL inspection?  I believed some of these rules worked fine without this as they inspected packet headers, or SSL fingerprints, or matched traffic against an IP or DNS blacklist?

Anyone able to shed some light on this, so I better understand how this product works?

Many thanks.
« Last Edit: February 13, 2020, 04:16:54 pm by dave »
Logged

  • Print
Pages: [1]
« previous next »
  • OPNsense Forum »
  • English Forums »
  • Intrusion Detection and Prevention »
  • Suricata results
 

OPNsense is an OSS project © Deciso B.V. 2015 - 2024 All rights reserved
  • SMF 2.0.19 | SMF © 2021, Simple Machines
    Privacy Policy
    | XHTML | RSS | WAP2