Re: [pfSense] Snort as IPS in Pfsense

2014-09-29 Thread Blake Cornell
I see no keyword match for "Bro IDS" nor "Cymru" from the previous 34
messages.

https://github.com/sethhall/bro-scripts/wiki/The-Malware-Hash-Registry-and-Bro-IDS


https://www.bro.org/

2c

-- 
Blake Cornell
CTO, Integris Security LLC
501 Franklin Ave, Suite 200
Garden City, NY 11530 USA
http://www.integrissecurity.com/
O: +1(516)750-0478 x100
M: +1(516)900-2193
PGP: CF42 5262 AE68 4AC7 591B 2C5B C34C 7FAB 4660 F572
Free Tools: https://www.integrissecurity.com/SecurityTools
Follow us on Twitter: @integrissec

On 09/29/2014 11:13 PM, Roberto Carna wrote:
> I think this is good for us:
>
>
> - Router ISP with IP 200.0.0.1
>
> - pFsense with the following interfaces:
>
>   a) WAN IP-Less
>   b) LAN IP-Less
>   c) OPT1 with IP 200.0.0.2 (management)
>   d) Bridge with WAN and LAN interfaces, and Bridge interface IP-Less
>
> - Corporate firewall with IP 200.0.0.3
>
> - Snort runs in Bridge interface
>
> Do you think this is correct ???
>
> Good night !!!
>
> Roberto
>
>
> 2014-09-29 22:09 GMT-03:00 Jeronimo L. Cabral :
>> I can say that I imagine this addresses space:
>>
>> Router / IP 200.1.1.1 --- WAN IP-Less / pFsense/ LAN IP-Less --- Firewall /
>> IP 200.1.1.2
>>OPT1 / IP
>> 200.1.1.3
>> (management)
>>
>> So, the WAN and LAN interfaces from pFsense are IP-LESS (promiscuos mode),
>> and the OPT1 interface from pFsense has a public IP as router and firewall.
>>
>> Can I do this in pfsense ???
>>
>>
>> On Mon, Sep 29, 2014 at 9:49 PM, Jeronimo L. Cabral 
>> wrote:
>>> OK Ivo, this is very helpful to meSuppose I have:
>>>
>>> Router / IP 200.1.1.1 --- WAN/pFsense/LAN --- Firewall / IP 200.1.1.2
>>>
>>> I have to maintan invariable the addressing of this scenario, so what IP
>>> addresses do I have to assign to WAN and LAN pFsense interfaces ???
>>>
>>> Thanks a lot,
>>>
>>> JeLo
>>>
>>> On Mon, Sep 29, 2014 at 9:32 PM, Ivo Tonev  wrote:
>>>> In production environment you need 3 interfaces - one for WAN, one for
>>>> LAN and one for management.
>>>>
>>>>
>>>> http://www.cisco.com/c/en/us/td/docs/security/asa/quick_start/ips/ips_qsg.html
>>>>
>>>>
>>>> On Mon, Sep 29, 2014 at 9:24 PM, compdoc  wrote:
>>>>>> But you say: one interface for WAN, a second for
>>>>>> LAN...and which interface is for managing ???
>>>>>
>>>>>
>>>>>
>>>>>
>>>>> You manage with a browser from LAN, and optional also from the WAN port.
>>>>> And with ssh from the LAN.
>>>>>
>>>>>
>>>>>
>>>>>
>>>>> ___
>>>>> List mailing list
>>>>> List@lists.pfsense.org
>>>>> https://lists.pfsense.org/mailman/listinfo/list
>>>>
>>>>
>>>>
>>>> --
>>>> Ivo R. Tonev
>>>> +55 61 8409-2642
>>>> i...@tonev.com.br
>>>>
>>>> ___
>>>> List mailing list
>>>> List@lists.pfsense.org
>>>> https://lists.pfsense.org/mailman/listinfo/list
>>>
>>
>> ___
>> List mailing list
>> List@lists.pfsense.org
>> https://lists.pfsense.org/mailman/listinfo/list
> ___
> List mailing list
> List@lists.pfsense.org
> https://lists.pfsense.org/mailman/listinfo/list

___
List mailing list
List@lists.pfsense.org
https://lists.pfsense.org/mailman/listinfo/list


Re: [pfSense] Difference between APU4 and APU1C4

2014-07-22 Thread Blake Cornell
It is my believe that we all are on this list, in this discussion,
because we have a requirement, desire and/or need of a solid network
security solution. I applaud the community as a whole for making pfSense
a product for that is available for the societal masses. #respect

"Give me your low TTL, your latent, your packets en mass yearning to be
delivered freely fore pfSense shall protect us all."

We all have bad days, none of us always use the most proper words. There
is no use for us to be divided, we are stronger together. Lest we all
put this quarrel to rest and move forward, forge ahead without complication.

We all deserve a congratulation, especially not me, for furthering a
unified vision that WE ALL have.

-- 
Blake Cornell
CTO, Integris Security LLC
501 Franklin Ave, Suite 200
Garden City, NY 11530 USA
http://www.integrissecurity.com/
O: +1(516)750-0478
M: +1(516)900-2193
PGP: CF42 5262 AE68 4AC7 591B 2C5B C34C 7FAB 4660 F572
Free Tools: https://www.integrissecurity.com/SecurityTools
Follow us on Twitter: @integrissec

On 07/22/2014 11:18 PM, Chris Bagnall wrote:
> On 23/7/14 4:11 am, Ryan Coleman wrote:
>> I may have fired off the message in a fit of frustration but you made
>> it a public statement - if you wanted to be the “mom” and handle it
>> you should have sent it privately instead of publicly.
>
> I can't work out if the above is directed at me or Jim.
>
> (I certainly don't have any intention of being anyone's mum)
>
> Kind regards,
>
> Chris

___
List mailing list
List@lists.pfsense.org
https://lists.pfsense.org/mailman/listinfo/list


Re: [pfSense] Enumerating NAT Hops - Information Disclosure - TTL++ mangle.

2014-07-12 Thread Blake Cornell
Its a TCP traceroute, not UDP nor ICMP. I need to provide TCP based
services.

I would prefer staying within the framework of the interface or nominal
BSD magic.

-- 
Blake Cornell
CTO, Integris Security LLC
501 Franklin Ave, Suite 200
Garden City, NY 11530 USA
http://www.integrissecurity.com/
O: +1(516)750-0478
M: +1(516)900-2193
PGP: CF42 5262 AE68 4AC7 591B 2C5B C34C 7FAB 4660 F572
Free Tools: https://www.integrissecurity.com/SecurityTools
Follow us on Twitter: @integrissec

On 07/12/2014 09:54 PM, Chris Buechler wrote:
> I don't see the point. If you don't want people to see the path, don't
> allow traceroute in (or stop it after the first NAT). If you do, what
> do you care if the layers of NAT can be enumerated. If anything even
> remotely useful to an attacker can be done to your network because
> someone knows how many layers of NAT you have, you have a lot bigger
> problems than showing that in a traceroute.
>
> pf scrub does have a min-ttl option but it's not one that's exposed
> anywhere in the GUI and would require changing the source to use. Not
> something I've ever seen a real need to use.
>
>
> On Thu, Jul 10, 2014 at 4:51 PM, Blake Cornell
> mailto:bcorn...@integrissecurity.com>>
> wrote:
>
> I would put it on a report as an issue.. further more...  no
> comment
>
> -- 
> Blake Cornell
> CTO, Integris Security LLC
> 501 Franklin Ave, Suite 200
> Garden City, NY 11530 USA
> http://www.integrissecurity.com/
> O: +1(516)750-0478 
> M: +1(516)900-2193 
> PGP: CF42 5262 AE68 4AC7 591B 2C5B C34C 7FAB 4660 F572
> Free Tools: https://www.integrissecurity.com/SecurityTools
> Follow us on Twitter: @integrissec
>
> On 07/10/2014 05:29 PM, Walter Parker wrote:
>> I disagree that this is a vulnerability/weakness. If this
>> is truly your only issue with the network, I'd call it good and
>> done if you are not the DOD/NSA.
>>
>>     If you are, then you need to start again with an even more secure
>> foundation.
>>
>>
>> Walter
>>
>>
>> On Thu, Jul 10, 2014 at 2:25 PM, Blake Cornell
>> > <mailto:bcorn...@integrissecurity.com>> wrote:
>>
>> There is a reason for it. It works well except for this ONE
>> issue.
>>
>> I like setting up 0 vulnerability/weakness networks. This is
>> the only
>> one minus presentation/application issues.
>>
>> Thank you both for your input. I'll touch base when I determine a
>> resolution strategy.
>>
>> --
>> Blake Cornell
>> CTO, Integris Security LLC
>> 501 Franklin Ave, Suite 200
>> Garden City, NY 11530 USA
>> http://www.integrissecurity.com/
>> O: +1(516)750-0478 
>> M: +1(516)900-2193 
>> PGP: CF42 5262 AE68 4AC7 591B 2C5B C34C 7FAB 4660 F572
>> Free Tools: https://www.integrissecurity.com/SecurityTools
>> Follow us on Twitter: @integrissec
>>
>> On 07/10/2014 01:49 PM, James Bensley wrote:
>> > Further to what Walter has said - Double NATB!
>> > ___
>> > List mailing list
>> > List@lists.pfsense.org <mailto:List@lists.pfsense.org>
>> > https://lists.pfsense.org/mailman/listinfo/list
>>
>> ___
>> List mailing list
>> List@lists.pfsense.org <mailto:List@lists.pfsense.org>
>> https://lists.pfsense.org/mailman/listinfo/list
>>
>>
>>
>>
>> -- 
>> The greatest dangers to liberty lurk in insidious encroachment by
>> men of zeal, well-meaning but without understanding.   -- Justice
>> Louis D. Brandeis
>>
>>
>> ___
>> List mailing list
>> List@lists.pfsense.org <mailto:List@lists.pfsense.org>
>> https://lists.pfsense.org/mailman/listinfo/list
>
>
> ___
> List mailing list
> List@lists.pfsense.org <mailto:List@lists.pfsense.org>
> https://lists.pfsense.org/mailman/listinfo/list
>
>
>
>
> ___
> List mailing list
> List@lists.pfsense.org
> https://lists.pfsense.org/mailman/listinfo/list

___
List mailing list
List@lists.pfsense.org
https://lists.pfsense.org/mailman/listinfo/list

Re: [pfSense] Enumerating NAT Hops - Information Disclosure - TTL++ mangle.

2014-07-10 Thread Blake Cornell
I would put it on a report as an issue.. further more...  no comment

-- 
Blake Cornell
CTO, Integris Security LLC
501 Franklin Ave, Suite 200
Garden City, NY 11530 USA
http://www.integrissecurity.com/
O: +1(516)750-0478
M: +1(516)900-2193
PGP: CF42 5262 AE68 4AC7 591B 2C5B C34C 7FAB 4660 F572
Free Tools: https://www.integrissecurity.com/SecurityTools
Follow us on Twitter: @integrissec

On 07/10/2014 05:29 PM, Walter Parker wrote:
> I disagree that this is a vulnerability/weakness. If this
> is truly your only issue with the network, I'd call it good and done
> if you are not the DOD/NSA.
>
> If you are, then you need to start again with an even more secure
> foundation.
>
>
> Walter
>
>
> On Thu, Jul 10, 2014 at 2:25 PM, Blake Cornell
> mailto:bcorn...@integrissecurity.com>>
> wrote:
>
> There is a reason for it. It works well except for this ONE issue.
>
> I like setting up 0 vulnerability/weakness networks. This is the only
> one minus presentation/application issues.
>
> Thank you both for your input. I'll touch base when I determine a
> resolution strategy.
>
> --
> Blake Cornell
> CTO, Integris Security LLC
> 501 Franklin Ave, Suite 200
> Garden City, NY 11530 USA
> http://www.integrissecurity.com/
> O: +1(516)750-0478 
> M: +1(516)900-2193 
> PGP: CF42 5262 AE68 4AC7 591B 2C5B C34C 7FAB 4660 F572
> Free Tools: https://www.integrissecurity.com/SecurityTools
> Follow us on Twitter: @integrissec
>
> On 07/10/2014 01:49 PM, James Bensley wrote:
> > Further to what Walter has said - Double NATB!
> > ___
> > List mailing list
> > List@lists.pfsense.org <mailto:List@lists.pfsense.org>
> > https://lists.pfsense.org/mailman/listinfo/list
>
> ___
> List mailing list
> List@lists.pfsense.org <mailto:List@lists.pfsense.org>
> https://lists.pfsense.org/mailman/listinfo/list
>
>
>
>
> -- 
> The greatest dangers to liberty lurk in insidious encroachment by
> men of zeal, well-meaning but without understanding.   -- Justice
> Louis D. Brandeis
>
>
> ___
> List mailing list
> List@lists.pfsense.org
> https://lists.pfsense.org/mailman/listinfo/list

___
List mailing list
List@lists.pfsense.org
https://lists.pfsense.org/mailman/listinfo/list

Re: [pfSense] Enumerating NAT Hops - Information Disclosure - TTL++ mangle.

2014-07-10 Thread Blake Cornell
There is a reason for it. It works well except for this ONE issue.

I like setting up 0 vulnerability/weakness networks. This is the only
one minus presentation/application issues.

Thank you both for your input. I'll touch base when I determine a
resolution strategy.

-- 
Blake Cornell
CTO, Integris Security LLC
501 Franklin Ave, Suite 200
Garden City, NY 11530 USA
http://www.integrissecurity.com/
O: +1(516)750-0478
M: +1(516)900-2193
PGP: CF42 5262 AE68 4AC7 591B 2C5B C34C 7FAB 4660 F572
Free Tools: https://www.integrissecurity.com/SecurityTools
Follow us on Twitter: @integrissec

On 07/10/2014 01:49 PM, James Bensley wrote:
> Further to what Walter has said - Double NATB!
> ___
> List mailing list
> List@lists.pfsense.org
> https://lists.pfsense.org/mailman/listinfo/list

___
List mailing list
List@lists.pfsense.org
https://lists.pfsense.org/mailman/listinfo/list


Re: [pfSense] Enumerating NAT Hops - Information Disclosure - TTL++ mangle.

2014-07-10 Thread Blake Cornell
Any thoughts anyone?

-- 
Blake Cornell
CTO, Integris Security LLC
501 Franklin Ave, Suite 200
Garden City, NY 11530 USA
http://www.integrissecurity.com/
O: +1(516)750-0478
M: +1(516)900-2193
PGP: CF42 5262 AE68 4AC7 591B 2C5B C34C 7FAB 4660 F572
Free Tools: https://www.integrissecurity.com/SecurityTools
Follow us on Twitter: @integrissec

On 07/03/2014 06:15 PM, Blake Cornell wrote:
> Hello,
>
> I have a pfSense network that uses multiple layers of NAT translation. 
> Public IP's are mapped to specific NAT addresses using a 1 to 1 mapping
> on the edge device.  The packets are then forwarded to another pfSense
> device using another layer of NAT translation.
>
> Ex: public ip -> NAT network 1 -> NAT network 2 -> target machine.
>
> The issue lies when using the example IP of 1.1.1.1, on an example open
> port 80.
>
> # tcptraceroute 1.1.1.1 80
> [removed for brevity]
>  3  1.1.1.1  29.247 ms  17.670 ms  14.007 ms
>  4  1.1.1.1  20.142 ms  16.119 ms  16.609 ms
>  5  1.1.1.1 [open]  21.387 ms  17.176 ms  70.283 ms
>
> As you can see, the results show three instances of 1.1.1.1.  This
> allows an attacker the ability to enumerate the depth of NAT
> translation.  This is a low risk issue.
>
> To resolve this issue I need to "mangle" forwarded IP packets by
> incrementing their TTL by 1.  This would effectively hide the above
> included results.  If anyone knows how to do this either through the web
> interface or through custom configurations then please let me know.
>
> EMail me directly for a real world example for your analysis.
>
> Thanks in Advance,
>

___
List mailing list
List@lists.pfsense.org
https://lists.pfsense.org/mailman/listinfo/list


[pfSense] Enumerating NAT Hops - Information Disclosure - TTL++ mangle.

2014-07-03 Thread Blake Cornell
Hello,

I have a pfSense network that uses multiple layers of NAT translation. 
Public IP's are mapped to specific NAT addresses using a 1 to 1 mapping
on the edge device.  The packets are then forwarded to another pfSense
device using another layer of NAT translation.

Ex: public ip -> NAT network 1 -> NAT network 2 -> target machine.

The issue lies when using the example IP of 1.1.1.1, on an example open
port 80.

# tcptraceroute 1.1.1.1 80
[removed for brevity]
 3  1.1.1.1  29.247 ms  17.670 ms  14.007 ms
 4  1.1.1.1  20.142 ms  16.119 ms  16.609 ms
 5  1.1.1.1 [open]  21.387 ms  17.176 ms  70.283 ms

As you can see, the results show three instances of 1.1.1.1.  This
allows an attacker the ability to enumerate the depth of NAT
translation.  This is a low risk issue.

To resolve this issue I need to "mangle" forwarded IP packets by
incrementing their TTL by 1.  This would effectively hide the above
included results.  If anyone knows how to do this either through the web
interface or through custom configurations then please let me know.

EMail me directly for a real world example for your analysis.

Thanks in Advance,

-- 
Blake Cornell
CTO, Integris Security LLC
501 Franklin Ave, Suite 200
Garden City, NY 11530 USA
http://www.integrissecurity.com/
O: +1(516)750-0478
M: +1(516)900-2193
PGP: 54DE 7526 4D9C 8641 A3AB 2B30 3C76 DF58 5B3D 6377
Free Tools: https://www.integrissecurity.com/SecurityTools
Follow us on Twitter: @integrissec

___
List mailing list
List@lists.pfsense.org
https://lists.pfsense.org/mailman/listinfo/list