/ipfidsupdate

Automated Snort rule update for IPFire

Primary LanguagePerlGNU General Public License v2.0GPL-2.0

ipfidsupdate

Automated Snort rule update for IPFire

Provides a service to update Snort rules on an IPFire appliance automatically, including preserving the state (enabled/disabled) of existing rules.

To install

Read the notes below before installing this addon. Once you've done this you can proceed to the first step.

  1. First remove any automatic updater that you've already got running. It's not necessary to do this if you're running an old version of this updater.

  2. Download the installer:

wget https://github.com/timfprogs/ipfidsupdate/raw/master/install-idsupdate.sh

  1. Make it executable:

chmod +x install-idsupdate.sh

  1. Run the installer:

./install-idsupdate.sh

The installer will download the files and install them in the correct places. You can then use the WUI (under 'Services') to configure the updater. If you want the system to run with minimal interaction, you should probably choose the following settings:

Default policy : Balanced
Apply policy changes : Enabled

Other settings are up to you.

Notes

Live update

Doing a live update means that Snort will read the updated rule files while still processing traffic. The alternative shuts down Snort while the update is checked and then each instance of Snort is restarted in turn; this will leave the network unprotected for several minutes, whereas the network will be protected all the time for a live update.

The drawback of a live update is that you need enough memory to run an additional instance of Snort while the updated rules are being checked and reloaded. If you don't have enough memory for this the system will kill tasks to free up memory; this will not necessarily show up on the Status > Services page in the WUI. You can check the kernel log to see if this has happened.

If you do have memory problems you will need to carry out one of the following:

  • Disable unneccessary Snort rules
  • Disable an addon service
  • Switch off the live update

Policy

If you choose a policy of Security you are likely to have to manually enable and disable rules every time there is an update, otherwise you are likely to block legitimate users of the system. If you choose Max-Detect you will have to do this, and you will prevent access through the firewall for many users while you try to get the enable and disable rules right. Both these settings also run the risk of slowing down the traffic through the firewall due to the amount of processing involved.

The policy of connectivity is useful if you do not have a lot of memory or you've got a fast connection on a slow computer.

Maximum download speed

A Talos VRT rule file is large and may take a significant time to download. Setting a maximum download speed can prevent this from interfering too much with other users. A limit of half your internet speed is a good start.

Emails

If you've got emails enabled, you will be given the option of enabling emails whenever there is a successful update or a failure.

You should be aware that these emails could give useful information to an attacker if they are intercepted. The amount of information in the email is minimised to limit this, but you should probably only enable this is you've confident of the security of your email infrastructure.

Update log

A new page is added to the Log menu giving the update status. Note that if you're in Europe this will be blank for most of the day, since the rules are typically updated late in the day. You can select previous day's logs.

You will occasionally get messages due to failed attempts to download a file. These can be ignored unless they occur frequently.

Note that only information for currently selected categories will be shown; there may be changes to rules is other categories. This means that occasionally an update is downloaded that appears to have nothing it it; this will be due to all the changes being in categories that you haven't got selected.

The categories are:

New Rules These are enabled or disabled depending on their policy and your selected default policy.

Deleted Rules These are rules that have been deleted from the ruleset.

Updated Rules These are rules that have been changed from the previous version. If the policy has changed and 'Apply policy changes to new changed rules' has been set to 'yes' then the rule will be enabled or disabled as appropriate. Rules that have not changed category will be listed if you have overridden the enabled or disabled state. You should consider whether the reason that you overrode the state is still valid.

Flowbits

These are used to pass information between different rules. For example a flowbit will be set if a rule recognises that a file is a particular type of executable. Other rules can then use test the flowbit rather than duplicating the check.

This means that a rule that tests a flowbit cannot work if the rule that checks the flowbit is disabled. As part of the update a check is made for these rule; a link will be placed on the log page if any are found. You should either enable the rule that sets the flowbit or disable the rule that tests it.

Most of the rules that set flowbits are found in the emerging-info, emerging-policy and file-identify categories.

Rulesets

The community rules can be found in both the Talos VRT and Emerging Threats rulesets, as well as the Community ruleset. To avoid wasting resources on these duplicate rules the updater carries out some processing to optimise the rulesets. In particular it switches to an alternative version of the Emerging Threats rules (no-gpl) if it detects that you are using one of the Talos VRT rulesets. A consequence of this is that the first time an Emerging Threats ruleset is updated there will be a large number of deleted rules reported, as the duplcated rules are removed.

If you've got both the Community and Talos VRT rulesets installed, the updater will disable the community rules in the Talos VRT rule files. If you're using the registered rules they include a version of the community rules that is 30 days old, so by doing this you get the latest version of the community rules. If you've got a subscription this should make no difference, but disabling the community rules will save the updater some work.

IP Blocklists

There are a number of rule files that implement IP Address blocking. While an Intrusion Detection System can do this, it's inefficient. It would be preferable to install a specialised IP Blocklist updater. Once you've done this you can disable the appropriate IDS rules. This will decrease the amount of memory and processor usage of the system. It is also likely that the majority of alerts generated are from these rules; this will reduce the number of alerts. The result is that it will be easier to see attacks that are not going to be blocked by the firewall.

The rules that implement blocklists are:

Source Rules
Talos VRT blacklist.rules
Emerging Threats emerging-ciarmy.rules, emerging-compromised.rules, emerging-drop.rules, emerging-dshield.rules, emerging-tor.rules, emerging-botcc.rules, emerging-botcc.portgrouped.rules