Linux Netfilter discussions
 help / color / mirror / Atom feed
* Promiscuous mode and xtables
@ 2011-08-04  4:19 Jonathan Tripathy
  2011-08-04  8:37 ` Tyler J. Wagner
  0 siblings, 1 reply; 4+ messages in thread
From: Jonathan Tripathy @ 2011-08-04  4:19 UTC (permalink / raw)
  To: netfilter

Hi Everyone,

Currently, I use ebtables and iptables to secure my servers. It would be 
appreciated if someone could please give me some advice on what the best 
settings are for using a network port in promiscuous mode for network 
monitoring *only*. I.e. I do not want any of this traffic to be able to 
access anything on my server.

Thanks

^ permalink raw reply	[flat|nested] 4+ messages in thread

* Re: Promiscuous mode and xtables
  2011-08-04  4:19 Promiscuous mode and xtables Jonathan Tripathy
@ 2011-08-04  8:37 ` Tyler J. Wagner
  2011-08-04 21:57   ` Jonathan Tripathy
  0 siblings, 1 reply; 4+ messages in thread
From: Tyler J. Wagner @ 2011-08-04  8:37 UTC (permalink / raw)
  To: Jonathan Tripathy, netfilter

If you intend to monitor only, set OUTPUT and FORWARD chains to DROP.
Otherwise you can't firewall. Make sure your monitoring software is up
to date, as vulnerabilities on it will be the biggest issue.

Regards,
Tyler

Jonathan Tripathy <jonnyt@abpni.co.uk> wrote:

    Hi Everyone,

    Currently, I use ebtables and iptables to secure my servers. It would be 
    appreciated if someone could please give me some advice on what the best 
    settings are for using a network port in promiscuous mode for network 
    monitoring *only*. I.e. I do not want any of this traffic to be able to 
    access anything on my server.

    Thanks
    --
    To unsubscribe from this list: send the line "unsubscribe netfilter" in
    the body of a message to majordomo@vger.kernel.org
    More majordomo info at  http://vger.kernel.org/majordomo-info.html


^ permalink raw reply	[flat|nested] 4+ messages in thread

* Re: Promiscuous mode and xtables
  2011-08-04  8:37 ` Tyler J. Wagner
@ 2011-08-04 21:57   ` Jonathan Tripathy
  2011-08-04 22:03     ` Tyler J. Wagner
  0 siblings, 1 reply; 4+ messages in thread
From: Jonathan Tripathy @ 2011-08-04 21:57 UTC (permalink / raw)
  To: Tyler J. Wagner; +Cc: netfilter

Shouldn't I also set the input chain to DROP as well?

Thanks

On 04/08/2011 09:37, Tyler J. Wagner wrote:
> If you intend to monitor only, set OUTPUT and FORWARD chains to DROP.
> Otherwise you can't firewall. Make sure your monitoring software is up
> to date, as vulnerabilities on it will be the biggest issue.
>
> Regards,
> Tyler
>
> Jonathan Tripathy<jonnyt@abpni.co.uk>  wrote:
>
>      Hi Everyone,
>
>      Currently, I use ebtables and iptables to secure my servers. It would be
>      appreciated if someone could please give me some advice on what the best
>      settings are for using a network port in promiscuous mode for network
>      monitoring *only*. I.e. I do not want any of this traffic to be able to
>      access anything on my server.
>
>      Thanks
>      --
>      To unsubscribe from this list: send the line "unsubscribe netfilter" in
>      the body of a message to majordomo@vger.kernel.org
>      More majordomo info at  http://vger.kernel.org/majordomo-info.html
>

^ permalink raw reply	[flat|nested] 4+ messages in thread

* Re: Promiscuous mode and xtables
  2011-08-04 21:57   ` Jonathan Tripathy
@ 2011-08-04 22:03     ` Tyler J. Wagner
  0 siblings, 0 replies; 4+ messages in thread
From: Tyler J. Wagner @ 2011-08-04 22:03 UTC (permalink / raw)
  To: Jonathan Tripathy; +Cc: netfilter

Actually, yes. I had assumed you'd need INPUT to be ACCEPT to monitor,
but of course you won't. For two reasons:

1. You're (presumably) not interested in monitoring traffic intended for
the server itself.
2. Your monitoring software sniffs the traffic using libpcap, which gets
its data before netfilter is applied.

That being the case, set all chains to DROP, and just sniff. But again,
make sure the application doing the sniffing is secure, and preferably
drops privileges as soon as the socket is open.

Regards,
Tyler

On 2011-08-04 22:57, Jonathan Tripathy wrote:
> Shouldn't I also set the input chain to DROP as well?
> 
> Thanks
> 
> On 04/08/2011 09:37, Tyler J. Wagner wrote:
>> If you intend to monitor only, set OUTPUT and FORWARD chains to DROP.
>> Otherwise you can't firewall. Make sure your monitoring software is up
>> to date, as vulnerabilities on it will be the biggest issue.
>>
>> Regards,
>> Tyler
>>
>> Jonathan Tripathy<jonnyt@abpni.co.uk>  wrote:
>>
>>      Hi Everyone,
>>
>>      Currently, I use ebtables and iptables to secure my servers. It
>> would be
>>      appreciated if someone could please give me some advice on what
>> the best
>>      settings are for using a network port in promiscuous mode for
>> network
>>      monitoring *only*. I.e. I do not want any of this traffic to be
>> able to
>>      access anything on my server.
>>
>>      Thanks
>>      --
>>      To unsubscribe from this list: send the line "unsubscribe
>> netfilter" in
>>      the body of a message to majordomo@vger.kernel.org
>>      More majordomo info at  http://vger.kernel.org/majordomo-info.html
>>
> 

-- 
A bad analogy is like a leaky screwdriver.

^ permalink raw reply	[flat|nested] 4+ messages in thread

end of thread, other threads:[~2011-08-04 22:03 UTC | newest]

Thread overview: 4+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2011-08-04  4:19 Promiscuous mode and xtables Jonathan Tripathy
2011-08-04  8:37 ` Tyler J. Wagner
2011-08-04 21:57   ` Jonathan Tripathy
2011-08-04 22:03     ` Tyler J. Wagner

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox