Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 21 Nov 2001 13:37:17 -0800
From:      Kris Kennaway <kris@obsecurity.org>
To:        Paul van der Zwan <paulz@trantor.xs4all.nl>
Cc:        Kris Kennaway <kris@obsecurity.org>, security@FreeBSD.ORG
Subject:   Re: ipfw and snort
Message-ID:  <20011121133717.A22787@xor.obsecurity.org>
In-Reply-To: <200111212126.fALLQE606054@trantor.xs4all.nl>; from paulz@trantor.xs4all.nl on Wed, Nov 21, 2001 at 10:26:14PM %2B0100
References:  <kris@obsecurity.org> <200111212126.fALLQE606054@trantor.xs4all.nl>

next in thread | previous in thread | raw e-mail | index | archive | help

[-- Attachment #1 --]
On Wed, Nov 21, 2001 at 10:26:14PM +0100, Paul van der Zwan wrote:
> > On Wed, Nov 21, 2001 at 09:02:57PM +0100, Paul van der Zwan wrote:
> > > 
> > > I would like to run snort on my ppp link to my ISP to see what people are
> > > trying, but I also have a set of ipfw rules to allow only the traffic I
> > > want to allow.
> > > Is there a way to have those rules in place but still have snort see all 
> > > incoming packets including those running into the deny rules ??
> > 
> > Yes, this is how it works always.
> 
> I did some testing using ethereal and when I try an incoming telnet (which 
> is  denied by ipwf) I don't see any packets arriving ( or ICMP going).
> This make me suspect that bpf processing takes place after ipfw..

No, it does work.  You must have something else wonky going on.

Kris

[-- Attachment #2 --]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (FreeBSD)
Comment: For info see http://www.gnupg.org

iD8DBQE7/B6MWry0BWjoQKURAn6oAKDijRH2MrtKGa/EtxzFtX6t0RL1UgCeMLSO
S1xeemuryPRWSqAKe6R8a9g=
=x4zO
-----END PGP SIGNATURE-----

Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20011121133717.A22787>