On Fri, Aug 16, 2002 at 12:17:24AM -0500, taproot420 wrote:

> pass in quick on xl1 proto udp from 12.242.18.34/32 port = 67 to any
> port = 68 keep state
> 
> is not present, my connection to the isp gets dropped. If the latter
> happens, and I have watched this, the client will then talk to
> 12.242.18.34, without broadcast, and get a new ip. If the rule above is
> present the ip renews and stays the same. I have had the same ip for
> days now with the rule.

Why don't you run,

  # tcpdump -o /tmp/dhcp.pcap 'port 68' &

Sometime before your machine is set to renew. Check out exactly what
is happening. But again, I'll tell you what to expect, the client
should go ask the server for a renew and the server should respond.

> >Not sure what you mean here. Yes, you won't see a difference between a
> >"drop" or half-open scan versus a regular "connect" scan, but in
> >either case, you will see the scan (that initial SYN).
> 
> I was told that if ,for example, I had  "block in quick on sis1 proto
> tcp port = 21"  ....and someone tried to telnet to my ip snort would not
> pick this up because the filter dropped it. Your saying this is not the
> case, so if I have "block in on sis1 all" I can still see all the
> attempts, scans etc.. that is thrown at me?

Yes. Like I said, bpf(4) comes before ipf(8). Have you ever used
tcpdump(8) to watch packets come in that get blocked by the firewall?
If tcpdump(8) can see 'em, snort will see 'em. I have a NIDS box
that's been running for... oh, a year and a half now, with the
following rules,

  # $Id: ipf.rules,v 1.1 2001/03/26 22:08:28 root Exp $
  #
  # ipf.rules - cclark, 2001/03/26
  #
  # blossom needs more protection outside of the
  # firewall
  
  # Deny everything unless we pass it
  block in  all
  block out all
  
  # Protect loopback spoofing
  pass  in      quick on lo0 all
  pass  out     quick on lo0 all
  block in  log quick        from 127.0.0.1/8 to any
  block in  log quick        from any         to 127.0.0.1
  
  # Outgoing- allow everything, keep state when possible
  pass out quick proto tcp/udp all keep state keep frags
  pass out quick proto icmp    all keep state keep frags
  pass out quick               all
  
  # Incoming- allow only SSH, log everything else
  pass  in     quick proto tcp from aaa.bbb.ccc.ddd to any port = 22
  block in log quick           all
  
  #End

It runs Snort and SHADOW. It is not a bridge, but rather sits
listening to the wire between the border router and firewall (it's not
such a hot idea to run snort on the firewall), and it only has one
interface. Both Snort and SHADOW see everything, since both read the
packets from bpf(4), despite the 'block in log quick' rule.
-- 
Crist J. Clark                     |     [EMAIL PROTECTED]
                                   |     [EMAIL PROTECTED]
http://people.freebsd.org/~cjc/    |     [EMAIL PROTECTED]

Reply via email to