* Trojan Spyware Malware Control
@ 2008-01-25 8:39 TRM
2008-01-25 15:26 ` Grant Taylor
0 siblings, 1 reply; 3+ messages in thread
From: TRM @ 2008-01-25 8:39 UTC (permalink / raw)
To: netfilter
Hi List,
Using iptables rules in my gateway, how can i control/stop
Trojan,malware,spyware.
example, tutorial, docs, link anything if i can get from the list, it'll
be my pleasure.
Thanks
--
Tarak Ranjan
Send instant messages to your online friends http://in.messenger.yahoo.com
^ permalink raw reply [flat|nested] 3+ messages in thread
* Re: Trojan Spyware Malware Control
2008-01-25 8:39 Trojan Spyware Malware Control TRM
@ 2008-01-25 15:26 ` Grant Taylor
2008-01-26 5:21 ` Michael Rash
0 siblings, 1 reply; 3+ messages in thread
From: Grant Taylor @ 2008-01-25 15:26 UTC (permalink / raw)
To: Mail List - Netfilter
On 01/25/08 02:39, TRM wrote:
> Using iptables rules in my gateway, how can i control/stop
> Trojan,malware,spyware. example, tutorial, docs, link anything if i
> can get from the list, it'll be my pleasure.
This is akin to filtering phone calls purely by phone number only, no
names. If you know the source address of good connections, you can
allow them. However with out some information as to where the trojan,
malware, spyware, you are trying to block, there is little (but some)
you can do at the network / transport level.
Firewalls are not intended to block this type of traffic, you should use
something that is.
Grant. . . .
^ permalink raw reply [flat|nested] 3+ messages in thread
* Re: Trojan Spyware Malware Control
2008-01-25 15:26 ` Grant Taylor
@ 2008-01-26 5:21 ` Michael Rash
0 siblings, 0 replies; 3+ messages in thread
From: Michael Rash @ 2008-01-26 5:21 UTC (permalink / raw)
To: Mail List - Netfilter
On Jan 25, 2008, Grant Taylor wrote:
> On 01/25/08 02:39, TRM wrote:
>> Using iptables rules in my gateway, how can i control/stop
>> Trojan,malware,spyware. example, tutorial, docs, link anything if i can
>> get from the list, it'll be my pleasure.
>
> This is akin to filtering phone calls purely by phone number only, no
> names. If you know the source address of good connections, you can allow
> them. However with out some information as to where the trojan, malware,
> spyware, you are trying to block, there is little (but some) you can do at
> the network / transport level.
There are also some things that iptables can do at the application layer
with the string match extension along with translated Snort rules. The
fwsnort project http://www.cipherdyne.org/fwsnort/ (disclaimer: I wrote
it, so I'm obviously biased) can accomplish this translation.
For example, here is a Snort rule that describes some Spyware activity:
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:
"BLEEDING-EDGE MALWARE 180solutions Spyware (tracked event reported)";
flow: to_server,established; uricontent:"/TrackedEvent.aspx?"; nocase;
uricontent:"eid="; nocase;
reference:url,securityresponse.symantec.com/avcenter/venc/data/pf/adware.180search.html;
classtype: trojan-activity; sid: 2001397; rev:6; )
Using fwsnort, this becomes the following iptables command:
$IPTABLES -A FWSNORT_FORWARD_ESTAB -p tcp --dport 80 -m string --string
"/TrackedEvent.aspx?" --algo bm -m string --string "eid=" --algo bm -m
comment --comment "sid:2001397; msg:BLEEDING-EDGE MALWARE 180solutions
Spyware (tracked event reported); classtype:trojan-activity;
reference:url,securityresponse.symantec.com/avcenter/venc/data/pf/adware.180search.html;
rev:6; FWS:1.0.3;" -j LOG --log-ip-options --log-tcp-options
--log-prefix "[118] SID2001397 ESTAB "
All iptables commands built up by fwsnort are stored within the script
/etc/fwsnort/fwsnort.sh for easy execution.
> Firewalls are not intended to block this type of traffic, you should use
> something that is.
In general, I agree with this. If you want really good detection
measures for activity associated with Spyware et.al., then frequently
decoding operations against web traffic as well as pcre's become
involved, and at that point there is no viable iptables alternative
(unless you are running Snort inline built on top of the QUEUE target
or some such).
However, in some cases, having iptables offer some protection (after
all, it is inline by definition) can be handy.
--
Michael Rash
http://www.cipherdyne.org/
Key fingerprint = 53EA 13EA 472E 3771 894F AC69 95D8 5D6B A742 839F
> Grant. . . .
> -
> To unsubscribe from this list: send the line "unsubscribe netfilter" in
> the body of a message to majordomo@vger.kernel.org
> More majordomo info at http://vger.kernel.org/majordomo-info.html
^ permalink raw reply [flat|nested] 3+ messages in thread
end of thread, other threads:[~2008-01-26 5:21 UTC | newest]
Thread overview: 3+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2008-01-25 8:39 Trojan Spyware Malware Control TRM
2008-01-25 15:26 ` Grant Taylor
2008-01-26 5:21 ` Michael Rash
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox