Linux Netfilter discussions
 help / color / mirror / Atom feed
* Trojan Spyware Malware Control
@ 2008-01-25  8:39 TRM
  2008-01-25 15:26 ` Grant Taylor
  0 siblings, 1 reply; 3+ messages in thread
From: TRM @ 2008-01-25  8:39 UTC (permalink / raw)
  To: netfilter

Hi List,
        Using iptables rules in my gateway, how can i control/stop 
Trojan,malware,spyware.
example, tutorial, docs, link anything if i can get from the list, it'll 
be my pleasure.

Thanks

-- 
Tarak Ranjan

Send instant messages to your online friends http://in.messenger.yahoo.com 


^ permalink raw reply	[flat|nested] 3+ messages in thread

* Re: Trojan Spyware Malware Control
  2008-01-25  8:39 Trojan Spyware Malware Control TRM
@ 2008-01-25 15:26 ` Grant Taylor
  2008-01-26  5:21   ` Michael Rash
  0 siblings, 1 reply; 3+ messages in thread
From: Grant Taylor @ 2008-01-25 15:26 UTC (permalink / raw)
  To: Mail List - Netfilter

On 01/25/08 02:39, TRM wrote:
> Using iptables rules in my gateway, how can i control/stop 
> Trojan,malware,spyware. example, tutorial, docs, link anything if i 
> can get from the list, it'll be my pleasure.

This is akin to filtering phone calls purely by phone number only, no 
names.  If you know the source address of good connections, you can 
allow them.  However with out some information as to where the trojan, 
malware, spyware, you are trying to block, there is little (but some) 
you can do at the network / transport level.

Firewalls are not intended to block this type of traffic, you should use 
something that is.



Grant. . . .

^ permalink raw reply	[flat|nested] 3+ messages in thread

* Re: Trojan Spyware Malware Control
  2008-01-25 15:26 ` Grant Taylor
@ 2008-01-26  5:21   ` Michael Rash
  0 siblings, 0 replies; 3+ messages in thread
From: Michael Rash @ 2008-01-26  5:21 UTC (permalink / raw)
  To: Mail List - Netfilter

On Jan 25, 2008, Grant Taylor wrote:

> On 01/25/08 02:39, TRM wrote:
>> Using iptables rules in my gateway, how can i control/stop 
>> Trojan,malware,spyware. example, tutorial, docs, link anything if i can 
>> get from the list, it'll be my pleasure.
>
> This is akin to filtering phone calls purely by phone number only, no 
> names.  If you know the source address of good connections, you can allow 
> them.  However with out some information as to where the trojan, malware, 
> spyware, you are trying to block, there is little (but some) you can do at 
> the network / transport level.

There are also some things that iptables can do at the application layer
with the string match extension along with translated Snort rules.  The
fwsnort project http://www.cipherdyne.org/fwsnort/ (disclaimer: I wrote
it, so I'm obviously biased) can accomplish this translation.

For example, here is a Snort rule that describes some Spyware activity:

alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:
"BLEEDING-EDGE MALWARE 180solutions Spyware (tracked event reported)";
flow: to_server,established; uricontent:"/TrackedEvent.aspx?"; nocase;
uricontent:"eid="; nocase;
reference:url,securityresponse.symantec.com/avcenter/venc/data/pf/adware.180search.html;
classtype: trojan-activity; sid: 2001397; rev:6; )


Using fwsnort, this becomes the following iptables command:

$IPTABLES -A FWSNORT_FORWARD_ESTAB -p tcp --dport 80 -m string --string
"/TrackedEvent.aspx?" --algo bm -m string --string "eid=" --algo bm -m
comment --comment "sid:2001397; msg:BLEEDING-EDGE MALWARE 180solutions
Spyware (tracked event reported); classtype:trojan-activity;
reference:url,securityresponse.symantec.com/avcenter/venc/data/pf/adware.180search.html;
rev:6; FWS:1.0.3;" -j LOG --log-ip-options --log-tcp-options
--log-prefix "[118] SID2001397 ESTAB "


All iptables commands built up by fwsnort are stored within the script
/etc/fwsnort/fwsnort.sh for easy execution.

> Firewalls are not intended to block this type of traffic, you should use 
> something that is.

In general, I agree with this.  If you want really good detection
measures for activity associated with Spyware et.al., then frequently
decoding operations against web traffic as well as pcre's become
involved, and at that point there is no viable iptables alternative
(unless you are running Snort inline built on top of the QUEUE target
or some such).

However, in some cases, having iptables offer some protection (after
all, it is inline by definition) can be handy.

--
Michael Rash
http://www.cipherdyne.org/
Key fingerprint = 53EA 13EA 472E 3771 894F  AC69 95D8 5D6B A742 839F


> Grant. . . .
> -
> To unsubscribe from this list: send the line "unsubscribe netfilter" in
> the body of a message to majordomo@vger.kernel.org
> More majordomo info at  http://vger.kernel.org/majordomo-info.html

^ permalink raw reply	[flat|nested] 3+ messages in thread

end of thread, other threads:[~2008-01-26  5:21 UTC | newest]

Thread overview: 3+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2008-01-25  8:39 Trojan Spyware Malware Control TRM
2008-01-25 15:26 ` Grant Taylor
2008-01-26  5:21   ` Michael Rash

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox