[SOLVED] So I enabled Suricata - what now?

Started by Patrick M. Hausen, November 29, 2021, 10:01:47 PM

Previous topic - Next topic
November 29, 2021, 10:01:47 PM Last Edit: November 30, 2021, 11:26:31 AM by pmhausen
Hi all,

as some might be aware I am rather experienced with FreeBSD and quickly got onto the OPNsense bandwagon.

At home I have one VLAN for "everything family", all the mobile devices, the Apple TV, the NAS ... all the things that do access the Internet - but only outbound.
And I have a second VLAN for Internet facing services like the Minecraft server my son uses, two VMs running Confluence that are publicly accessible and the like.

Yesterday I booked the "ET Telemetry" subscription and enabled IDS on that second VLAN. Seems to be active, there are hundreds of rules in the UI that I could micromanage if I intended to.

But what now? The last log file entry is from yesterday reading:
2021-11-28T21:51:07 suricata[69591] [100651] <Notice> -- all 1 packet processing threads, 4 management threads initialized, engine started.

Where in the UI am I supposed to see all those "IDS alerts"?

Kind regards,
Patrick
Deciso DEC750
People who think they know everything are a great annoyance to those of us who do. (Isaac Asimov)

Spoiler: It's not in -> LogFile :-D

See Services -> Intrusion Detection -> Administration and there the tab "Alerts"

If you don't really need it, it's imho currently like asking for trouble to run suricata (IPS). If interfaces go south, turn it off...


PS: VLANs need promisc mode enabled for suricata
kind regards
chemlud
____
"The price of reliability is the pursuit of the utmost simplicity."
C.A.R. Hoare

felix eichhorns premium katzenfutter mit der extraportion energie

A router is not a switch - A router is not a switch - A router is not a switch - A rou....

Quote from: chemlud on November 30, 2021, 09:30:19 AM
See Services -> Intrusion Detection -> Administration and there the tab "Alerts"
Thanks. That's where nothing is happening at the moment.

Quote from: chemlud on November 30, 2021, 09:30:19 AM
If you don't really need it, it's imho currently like asking for trouble to run suricata (IPS). If interfaces go south, turn it off...
Can't I use it in just IDS mode to get some info about what's happening with my public services?

Quote from: chemlud on November 30, 2021, 09:30:19 AM
PS: VLANs need promisc mode enabled for suricata
I understood only for IPS - IDS, too? That would explain why I don't see anything ;)
Deciso DEC750
People who think they know everything are a great annoyance to those of us who do. (Isaac Asimov)

You enabled it on WAN? Long time since I set it up from scratch, but by default only a few rule sets are enabled for alert (block?) iirc...
kind regards
chemlud
____
"The price of reliability is the pursuit of the utmost simplicity."
C.A.R. Hoare

felix eichhorns premium katzenfutter mit der extraportion energie

A router is not a switch - A router is not a switch - A router is not a switch - A rou....

No, I enabled it on the VLAN that houses my public servers. Jails, VMs, ...
Deciso DEC750
People who think they know everything are a great annoyance to those of us who do. (Isaac Asimov)

As long as you're not hacked you will basically not see much, maybe some windows machines doing funny things or kiddies doing nonsense (not in your VLAN, I guess).
kind regards
chemlud
____
"The price of reliability is the pursuit of the utmost simplicity."
C.A.R. Hoare

felix eichhorns premium katzenfutter mit der extraportion energie

A router is not a switch - A router is not a switch - A router is not a switch - A rou....

I hoped to see kiddies trying to brute-force my public services ...
Deciso DEC750
People who think they know everything are a great annoyance to those of us who do. (Isaac Asimov)

November 30, 2021, 11:14:01 AM #7 Last Edit: November 30, 2021, 11:15:38 AM by chemlud
...might be a question of the rule sets enabled. If you are in adventure-mode try WAN...

Start a package capture and see if there is traffic. No suspicious traffic, no alerts...
kind regards
chemlud
____
"The price of reliability is the pursuit of the utmost simplicity."
C.A.R. Hoare

felix eichhorns premium katzenfutter mit der extraportion energie

A router is not a switch - A router is not a switch - A router is not a switch - A rou....

Sorry, I don't get it - everything targeting my public IP address on port 80 or 443 will end up in the "SRV" VLAN ... and experience from my data centre at work shows that people are throwing URLs at public web servers searching for exploits 24x7 ...

I hoped Suricata would give me some live insight into what's going on?

Just checked again ... looks like it works. Without promiscuous mode. See screenshot. Someone's probing our Minecraft server.
Deciso DEC750
People who think they know everything are a great annoyance to those of us who do. (Isaac Asimov)

Yep:organisation:   ORG-DP125-RIPE
org-name:       Dmitriy Panchenko
org-type:       OTHER
address:        Shirokaya street 1, bld. 4, apt. 15
address:        127282, Moscow, Russian Federation


That's not one of my son's friends playing Minecraft ... ;)
Deciso DEC750
People who think they know everything are a great annoyance to those of us who do. (Isaac Asimov)

If you are protecting your server you'd want it monitoring your WAN connection not necessarily your vlan.  Since inbound and outbound traffic would still cross that interface.  This would also keep you from having to use promiscuous mode.  Although you could do both. Make sure to set your home network as well. 

Also have you created you policies? 

Quote from: FullyBorked on December 01, 2021, 03:02:41 PM
If you are protecting your server you'd want it monitoring your WAN connection not necessarily your vlan.
I don't want to monitor my family network other than basic protective measures. Too much noise. Just the network with the public servers.

Quote from: FullyBorked on December 01, 2021, 03:02:41 PM
Also have you created you policies?
Not yet, just activated IDS. Any good link to start?

Thanks,
Patrick
Deciso DEC750
People who think they know everything are a great annoyance to those of us who do. (Isaac Asimov)

Quote from: pmhausen on December 01, 2021, 04:03:14 PM
Quote from: FullyBorked on December 01, 2021, 03:02:41 PM
If you are protecting your server you'd want it monitoring your WAN connection not necessarily your vlan.
I don't want to monitor my family network other than basic protective measures. Too much noise. Just the network with the public servers.

Quote from: FullyBorked on December 01, 2021, 03:02:41 PM
Also have you created you policies?
Not yet, just activated IDS. Any good link to start?

Thanks,
Patrick

You shouldn't get much noise on the WAN interface esp if you set your home networks.  I don't and I have similar setup with a DMZ,LAN, Multi_WAN, and multiple vlans.  I have Suricata on my WAN interfaces and Sensei/Zenarmor on my internal interfaces/valans.   Also clearing up noise is part of properly tuning a IDS/IPS every system requires some tuning, if done properly you'll spend a few weeks monitoring and adjusting rules.  I've done this in my home environment and in a corp environment.  Home was much simpler lol 

I don't know of good guide on policies unfortunately.  The official doc has a brief explanation but it's pretty weak imo.  https://docs.opnsense.org/manual/ips.html

Most home networks are behind a NAT. So enabling Suricata just on the WAN interface will only show traffic after the NAT which won't tell you which system inside your network was the source.

Hence the OPNSense documentation states to enable IDS/IPS on the LAN interface. The firewall already has a default deny for inbound anyway.

With public exposed things like web servers a WAF is a better choice. But probably too much for the home user to manage.

If you work with VLANS, you need to enable Scuritata on the physical interface, enabling promiscous mode there and disabling all off-loading and the VLAN hardware filtering first (then reboot). I would run it on WAN physical (parent) interface and maybe you can also run it on the LAN physical interface.