Hi all,

On my previous Snort sensor, built on an Endace DAG, I had a BPF for Snort to 
exclude certain types of traffic. The BPF worked fine; Snort 2.9.5.1 and some 
previous versions.

When I changed my Snort sensor to an X520 + PF_RING / DNA, that BPF stopped 
working. I can tell that Snort is loading it - it says as much in syslog - but 
it will still happily alert on traffic matching those exclusions.

I’ve tried various iterations (I posted more detail on the snort-users list if 
anybody wants to look, or I can re-paste it here), but succinctly:

1) I don’t think it’s Snort itself - it did work on my previous platform. I 
tried differing versions of Snort just to be sure - 2.9.5.1, 2.9.6.0, 2.9.6.1.

2) I built tcpdump from the PF_RING distribution, and handed it the same BPF - 
it worked just fine, or at least, tcpdump didn’t complain about the BPF. I did 
a trivial test:
tcpdump -i dna1@0 -n -w test.lpc not net 10.0.0.1/24
tcpdump -r test.lpc net 10.0.0.1/24
and got the expected output (nothing). So I *think* that this means libpcap 
(also built from PF_RING distribution) is fine.

3) Following the advice and some other troubleshooting on snort-users, I 
verified that I’m not seeing this traffic as a result of GRE tunnelling or VLAN 
tags.

Versions:
PF_RING 6.0.1
pfring-daq-module-dna_r2795 (I’d also tried pfring-daq-module-dna_r2521)

The Intel-based machine is not yet in production, so I can fairly easily try 
anything people might suggest.

Other details of my environment:
RHEL 6.5
Intel X520 NIC:
 06:00.1 Ethernet controller: Intel Corporation Ethernet 10G 2P X520 Adapter 
(rev 01)

/proc/net/pf_ring/info is:
PF_RING Version          : 6.0.1 ($Revision: exported$)
Total rings              : 0

Standard (non DNA) Options
Ring slots               : 16384
Slot version             : 15
Capture TX               : No [RX only]
IP Defragment            : Yes
Socket Mode              : Standard
Transparent mode         : No [mode 2]
Total plugins            : 0
Cluster Fragment Queue   : 0
Cluster Fragment Discard : 0

The X520 plugs into a tool port on an Arista 7150S. The DAG plugs into another 
tool port on the same switch; both tool ports are in the same aggregation 
group, so they should be getting identical data.

I *do* have the option of applying the BPF on the Arista switch itself, 
although I’d rather avoid that if I can.

Thanks in advance for any advice/debugging suggestions/etc.

Mike

_______________________________________________
Ntop-misc mailing list
[email protected]
http://listgateway.unipi.it/mailman/listinfo/ntop-misc

Reply via email to