From: Allen Francom <aef@prismnet.com>
To: Darren.Reed@Sun.COM
Cc: netfilter-devel@lists.netfilter.org,
Carl-Daniel Hailfinger <c-d.hailfinger.devel.2006@gmx.net>
Subject: Re: Developing a user space library for filtering
Date: Tue, 22 May 2007 02:11:47 -0500 (CDT) [thread overview]
Message-ID: <20070522020457.M92606@tempest.prismnet.com> (raw)
In-Reply-To: <465222C0.8050601@Sun.COM>
I worked a little bit with "Hogwash".
http://hogwash.sourceforge.net/docs/overview.html
This was a mangling of IDS/Snort into layer 2 for real-time filtering.
With a little help from my friends there I got an IPTables "target"
so that IPTables could direct traffic into the hogwash/snort.
I like it that you said "libc".
It would be nice to intercept traffic after stream reassembly which was
always a problem.
In that case what you're asking makes maybe more sense to focus on "libc"
itself and having an "intercept" there.
That way you could for example filter stream-reassembled data coming into
a web server, or not, depending on the "rules engine" deciding to catch
the traffic or not.
I always thought that would be the place to be, in the call to get data,
but hookable, like a library with a hook that checks to see if it should
be "scrubbing" incoming traffic on a particular port.
"Slick" is the word.
Word.
;)
-AEF
On Mon, 21 May 2007, Darren.Reed@Sun.COM wrote:
> Carl-Daniel Hailfinger wrote:
>
>> Hi Darren,
>>
>> On 22.05.2007 00:27, Darren.Reed@Sun.COM wrote:
>>
>>> One of the core problems I see as people want to more and
>>> more with firewall/NAT technology is integrate using it into
>>> their application (whatever that may be.) As time goes by,
>>> this problem is becoming more and more acute and perhaps
>>> is doing us (those who develop said technologies) a disservice
>>> by making the "barrier to entry" too high.
>>>
>>
>> Sorry if I'm being dense. Do you want to target firewall frontends
>> or applications which have the desire to punch holes into the
>> firewall?
>>
>
> Neither. Applications that sit on top of firewall software.
>
> As an example, using squid on your Linux firewall/router in
> transparent proxying mode requires that squid has some code
> in it that knows how to talk to Linux in order to discover the
> original destination and change the outgoing connection
> such that the original address is used again. Doing that
> requires specific knowledge of the API that netfilter/iptables
> uses.
>
> Another example might be IDS software running on your Linux
> firewall/router. If that detects an attack, it should be able to
> talk to netfilter/iptables and do "something" to mitigate it.
>
> In both cases I'd like to see something developed such that
> the 3rd party applications don't need to know what NAT or
> firewall technology is being used.
>
> Darren
>
>
>
prev parent reply other threads:[~2007-05-22 7:11 UTC|newest]
Thread overview: 12+ messages / expand[flat|nested] mbox.gz Atom feed top
2007-05-21 22:27 Developing a user space library for filtering Darren.Reed
2007-05-21 22:47 ` Carl-Daniel Hailfinger
2007-05-21 22:52 ` Darren.Reed
2007-05-22 6:27 ` Jan Engelhardt
2007-05-22 6:46 ` Patrick Schaaf
2007-05-22 20:50 ` Darren.Reed
2007-05-22 21:14 ` Phil Dibowitz
2007-05-22 22:58 ` Henrik Nordstrom
2007-05-22 23:55 ` Darren.Reed
2007-05-23 0:29 ` Philip Craig
2007-05-23 8:19 ` Henrik Nordstrom
2007-05-22 7:11 ` Allen Francom [this message]
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20070522020457.M92606@tempest.prismnet.com \
--to=aef@prismnet.com \
--cc=Darren.Reed@Sun.COM \
--cc=c-d.hailfinger.devel.2006@gmx.net \
--cc=netfilter-devel@lists.netfilter.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.