[Oisf-users] Suricata not blocking bad traffic

Victor Julien lists at inliniac.net
Tue Jul 10 13:28:51 UTC 2018


We recommend suricata-update:

http://suricata-update.readthedocs.io/en/latest/update.html#modifying-rules

and

http://suricata-update.readthedocs.io/en/latest/update.html#example-configuration-to-convert-rules-to-drop-drop-conf

On 10-07-18 14:48, Leonard wrote:
> You want to use one of signature management tools that can automatically
> manage the signatures that can set the actions you want.  See the
> Suricata docs.
> 
> On Jul 10, 2018, at 7:31 AM, gatodiablo at protonmail.com
> <mailto:gatodiablo at protonmail.com> wrote:
> 
>> Ok. It's easy enough to use sed to change the alerts to drops, but
>> what about the next time updated rules are downloaded? I would have to
>> change them again. I use emerging threat rules and they all appear to
>> be alert only. Surely there is an simpler way to solve this?
>>
>>
>> Sent from ProtonMail mobile
>>
>>
>>
>> -------- Original Message --------
>> On Jul 9, 2018, 1:08 PM, Andreas Herz < andi at geekosphere.org
>> <mailto:andi at geekosphere.org>> wrote:
>>
>>
>>     On 08/07/18 at 21:58, gatodiablo at protonmail.com
>>     <mailto:gatodiablo at protonmail.com> wrote:
>>     > Alert I think. Do I need a different set of rules to run in IPS
>>     mode? I ideally want it to both alert and drop anything that
>>     matches a rule.
>>
>>     Yes you need to change the action keyword from 'alert' to 'drop' or it
>>     won't be dropped/blocked. You will still get an "alert" message as
>>     well
>>     which also mentiones the drop.
>>
>>     -- 
>>     Andreas Herz
>>     _______________________________________________
>>     Suricata IDS Users mailing list:
>>     oisf-users at openinfosecfoundation.org
>>     <mailto:oisf-users at openinfosecfoundation.org>
>>     Site: http://suricata-ids.org | Support:
>>     http://suricata-ids.org/support/
>>     List:
>>     https://lists.openinfosecfoundation.org/mailman/listinfo/oisf-users
>>
>>     Conference: https://suricon.net
>>     Trainings: https://suricata-ids.org/training/
>> _______________________________________________
>> Suricata IDS Users mailing list: oisf-users at openinfosecfoundation.org
>> <mailto:oisf-users at openinfosecfoundation.org>
>> Site: http://suricata-ids.org | Support: http://suricata-ids.org/support/
>> List: https://lists.openinfosecfoundation.org/mailman/listinfo/oisf-users
>>
>> Conference: https://suricon.net
>> Trainings: https://suricata-ids.org/training/
> 
> 
> This email and any files transmitted with it are confidential and
> intended solely for the use of the individual or entity to which they
> are addressed. If you have received this email in error please notify
> Netsecuris management at mgmt at netsecuris.com. Please note that any views
> or opinions presented in this email are solely those of the author and
> do not necessarily represent those of Netsecuris Inc. The integrity and
> security of this message cannot be guaranteed on the Internet
> 
> 
> _______________________________________________
> Suricata IDS Users mailing list: oisf-users at openinfosecfoundation.org
> Site: http://suricata-ids.org | Support: http://suricata-ids.org/support/
> List: https://lists.openinfosecfoundation.org/mailman/listinfo/oisf-users
> 
> Conference: https://suricon.net
> Trainings: https://suricata-ids.org/training/
> 


-- 
---------------------------------------------
Victor Julien
http://www.inliniac.net/
PGP: http://www.inliniac.net/victorjulien.asc
---------------------------------------------



More information about the Oisf-users mailing list