HackFest Series: Firewall Building 101 April Lab 2nd Saturday Noon At UAT
Alex Dean
alex at crackpot.org
Sun Mar 29 09:07:38 MST 2009
I've run IPCop on several home networks and been pleased with the
results. Lately I've been thinking about giving pfSense a try as
well. Mainly, it looks like the web GUI in pfSense is a bit nicer
to use, but learning a bit more BSD would be a plus. I was thinking
of installing that on a little soekris box to get rid of the noise of
an old workstation running the firewall.
http://ipcop.org/
http://www.pfsense.com/
http://www.soekris.com/net4501.htm
Anyone who's used both IPCop and pfSense care to offer a comparison?
Anyone run it on a small embedded device like the Soekris I linked to?
Regarding Snort : I ran that on an IPCop instance for a while, but
ended up shutting it down because of a lack of analysis tools. It
generated this massive log file, and IPCop provided no way to look at
it except by manually trolling the log. I looked into adding mysql to
IPCop (since snort can also log to a database), and then you can use
Base to examine the logs. Adding mysql, recompiling snort, etc, etc,
inside the IPCop distro proved to be a bit more than I was willing to
invest the time in.
http://base.secureideas.net/about.php
Lisa, I'd be interested to know how you use snort in these conditions?
alex
On Mar 28, 2009, at 10:05 PM, Lisa Kachold wrote:
> Join us at UAT.edu as we build and play with Firewall ISO's in old
> boxen with network cards.
>
> Just imagine the script kiddies surprise when your new Firewall
> retaliates with a storm of SYN packets automagically rather than
> roll over like your Linksys or Netgear did?
>
> Imagine being able to check snort logs and dump a big list of IPs
> directly to a deny file without having to type them all into teensy
> little forms like on the http://192.168.1.1/filters.htm screen!
>
> Addicted to the LinkSys/Netgear Wireless, or like the fast ethernet
> ports and pretty blue and white LinkSys interface for setting up
> VPN's?
>
> You can set that device in place on the INSIDE of your Firewall of
> China!
>
> See you there!
>
> Obnosis | (503)754-4452
> PLUG Linux Security Labs 2nd Saturday Each Month at Noon - 3PM
>
>
> From: lisakachold at obnosis.com
> To: plug-discuss at lists.plug.phoenix.az.us
> Subject: RE: OT? Linux-based trojans now targeting WRT and other
> linux-based routers
> Date: Sun, 29 Mar 2009 04:09:13 +0000
>
> Yes, I was thinking about getting an ASA, but I like my gigabit
> 1000BaseT connections, L2 vlan, VPN's, and I think you are correct
> that optimally, a fast machine with 4 ethernet cards is going to be
> the direct solution in line before that silly "LinkSys" arm
> processor IPS.
>
> I used to build custom linux firewalls in 1995 and drop them in for
> businesses with a 2400 cisco, and I have built a few since
> (azwsx.com) so I think I will take your advice - I have a fresh
> install FreeBSD box right here, and a couple extra cards.
>
> Thanks for the great suggestion!
>
> Obnosis | (503)754-4452
> PLUG Linux Security Labs 2nd Saturday Each Month at Noon - 3PM
>
> > Date: Sat, 28 Mar 2009 03:13:32 -0700
> > From: technomage.hawke at gmail.com
> > To: plug-discuss at lists.plug.phoenix.az.us
> > Subject: Re: OT? Linux-based trojans now targeting WRT and other
> linux-based routers
> >
> > Lisa Kachold wrote:
> > > Well, the sad fact is that _any_ machine will kick over and barf
> it's guts under distributed attacks; it just depends on what it does
> after the green slime clears..
> > > Also, it really helps if you run one that won't take WRT, or
> only runs on an arm, with small memory therefore they aren't too hot
> to pwn you. Linksys put out the source, whereupon I built my own,
> and played with the features; you know kiddies are doing this also.
> > >
> > > Course, if you have a WRT-able router, it's a good idea to set
> it up as a small linux system, but you have to know how to work it;
> starting by iptable deny all of china is a good start.
> > > I have had mine owned regularly; I just flash it again. Mine is
> easy to determine, since it suddenly starts showing AIM ports open.
> Once they target you successfully, they will insidiously continue to
> keep track of you; rather like trophy hunting.
> > > I could have done a complete defcon presentation on various
> routers by this time.
> > > That's why I always suggest to everyone, if you see something
> strange, you see something strange, report it, complain, study it,
> rather than continuing to agree with everyone in denial about the
> sad state of security.
> > > Obnosis | (503)754-4452
> > >
> > >
> > >
> > >
> > > PLUG Linux Security Labs 2nd Saturday Each Month at Noon - 3PM
> > >
> > Lisa (and others),
> > I don't tend to generally trust the "commercial grade" devices
> > available. they can't handle what I do with my home connection on a
> > daily basis
> > (and the last thing I want is some script kiddie pwning my
> router). I
> > use OpenBSD here as my firewall machine (I have both a hardware
> version
> > and vmware). I tend to keep close track on these and so far, neither
> > have been "pwned" after nearly 5 years of continuous use. I used
> to use a
> > linux firewall before that, but had problems with rootkits.
> >
> > Even with this, it still doesn't hurt to have a whole bevy of
> security
> > tools at hand for "just in case" (like windows, linux, OS X, etc).
> >
> > ---------------------------------------------------
> > PLUG-discuss mailing list - PLUG-discuss at lists.plug.phoenix.az.us
> > To subscribe, unsubscribe, or to change your mail settings:
> > http://lists.PLUG.phoenix.az.us/mailman/listinfo/plug-discuss
>
> Quick access to Windows Live and your favorite MSN content with
> Internet Explorer 8.
> Windows Live™ SkyDrive: Get 25 GB of free online storage. Check it
> out. ---------------------------------------------------
> PLUG-discuss mailing list - PLUG-discuss at lists.plug.phoenix.az.us
> To subscribe, unsubscribe, or to change your mail settings:
> http://lists.PLUG.phoenix.az.us/mailman/listinfo/plug-discuss
-------------- next part --------------
A non-text attachment was scrubbed...
Name: PGP.sig
Type: application/pgp-signature
Size: 194 bytes
Desc: This is a digitally signed message part
Url : http://lists.PLUG.phoenix.az.us/pipermail/plug-discuss/attachments/20090329/e2bec185/attachment.pgp
More information about the PLUG-discuss
mailing list