USENIX'04 / UseBSD Using OpenBSD and Snort to build ready to roll Network Intrusion Detection System Sensor



Similar documents
HOWTO. Bandwidth Management for ADSL with OpenBSD

An Open Source IPS. IIT Network Security Project Project Team: Mike Smith, Sean Durkin, Kaebin Tan

Intrusion Detection System

HOWTO: Set up a Vyatta device with ThreatSTOP in router mode

Snort. A practical NIDS

Desktop Central Managing Windows Computers in WAN

Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems

Setting up an OpenBSD Firewall in the ASU Environment Installation

Building Software Systems. Multi-module C Programs. Example Multi-module C Program. Example Multi-module C Program

PetaLinux SDK User Guide. Application Development Guide

How to build secure Apache Tomcat deployments with RPM.

COUNTERSNIPE

Operating System Security

Intrusion Detection Systems (IDS)

Intrusion Detection System in Campus Network: SNORT the most powerful Open Source Network Security Tool

NETWORK SECURITY HACKS *

HOWTO: Set up a Vyatta device with ThreatSTOP in bridge mode

Features. The Samhain HIDS. Overview of available features. Rainer Wichmann

Construction of a Web Server with a Database Facility Using Open Source Software

Passive Logging. Intrusion Detection System (IDS): Software that automates this process

Desktop Central Managing Windows Computers in WAN

Universal Management Service 2015

Network Intrusion Analysis (Hands-on)

OpenBSD in the wild...a personal journey

Snort Installation - Ubuntu FEUP. SSI - ProDEI Paulo Neto and Rui Chilro. December 7, 2010

INTRUSION DETECTION SYSTEMS and Network Security

Beginners guide to continuous integration. Gilles QUERRET Riverside Software

Desktop Management, Profile Migration and Cross Platform Delivery. Technical Overview

Information Security Measures and Monitoring System at BARC. - R.S.Mundada Computer Division B.A.R.C., Mumbai-85

Peeling Back the Layers of the Network Security with Security Onion Gary Smith, Pacific Northwest National Laboratory

INF-110. GPFS Installation

USE HONEYPOTS TO KNOW YOUR ENEMIES

Introduction to Intrusion Detection and Snort p. 1 What is Intrusion Detection? p. 5 Some Definitions p. 6 Where IDS Should be Placed in Network

White Paper. Intrusion Detection Deploying the Shomiti Century Tap

Acronis Backup & Recovery 10 Server for Linux. Update 5. Installation Guide

Setting up pfsense as a Stateful Bridging Firewall.

Intelligent disaster recovery. Dell DL backup to Disk Appliance powered by Symantec

How To Migrate To Redhat Enterprise Linux 4

The Bro Network Intrusion Detection System

1. What is this? Why would I want it?

Windows Embedded Standard 7 Technical Overview

MySQL always-up with Galera Cluster

VDCF - Virtual Datacenter Control Framework for the Solaris TM Operating System

Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA

PRINTER SECURITY AUDIT: THE UNIVERSITY OF VIRGINIA. Kevin Savoy, CPA, CISA, CISSP Brian Daniels, CISA, GCFA

System Recovery in Next to No Time by Jürgen Heyer

Transparent Cryptographic File System for BSD. A primer. Luigi Catuogno [luicat@tcfs.unisa.it]

SSL Tunnels. Introduction

Bare Metal Backup And Restore

Intrusion Detection and Intrusion Prevention. Ed Sale VP of Security Pivot Group, LLC

Kevin Cardwell. Toolkits: All-in-One Approach to Security

Cisco Mobility Express Bundle. S&L Webinar

AlienVault Unified Security Management (USM) 4.x-5.x. Deploying HIDS Agents to Linux Hosts

Traffic Monitoring : Experience

EaseUS Todo Backup PXE Server

Automating the deployment of FreeBSD & PC-BSD systems. BSDCan Kris Moore PC-BSD / ixsystems kris@pcbsd.org

Maintaining the Central Management System Database

Load Balancing & High Availability

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

Linux+ Guide to Linux Certification, Third Edition. Chapter 11 Compression, System Backup, and Software Installation

SANS Dshield Webhoneypot Project. OWASP November 13th, The OWASP Foundation Jason Lam

Acronis Backup & Recovery 10 Server for Windows. Installation Guide

Release notes. Symantec Event Manager for Firewall. What s new. System requirements

Security Best Practice

5 Steps to Advanced Threat Protection

Intro to djbdns. A DNS server besides BIND. Nathan Straz. nate@techie.com. Intro to djbdns p.1/21

Release Version 4.1 The 2X Software Server Based Computing Guide

Pwn Plug Community Edition 1.1 Installation Guide

The Security Organization p. 1 Anecdote p. 2. Introduction

Open Source and Incident Response

Continuous Integration & Automated Testing in a multisite.net/cloud Project

Host Hardening. OS Vulnerability test. CERT Report on systems vulnerabilities. (March 21, 2011)

TMA Management Suite. For EAD and TDM products. ABOUT OneAccess. Value-Adding Software Licenses TMA

Web Application Security

Centralize AIX LPAR and Server Management With NIM

Windows Template Creation Guide. How to build your own Windows VM templates for deployment in Cloudturk.

HP Compaq Thin Client Imaging Tool HP Compaq Thin Client t5000 Series

HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD Course Outline CIS INTRODUCTION TO UNIX

Acronis Backup & Recovery 10 Server for Linux. Installation Guide

Server Installation/Upgrade Guide

CROSS PLATFORM AUTOMATIC FILE REPLICATION AND SERVER TO SERVER FILE SYNCHRONIZATION

Security Correlation Server Quick Installation Guide

How to Install the VMware ESXi Hypervisor on Physical Hardware

LOCKSS on LINUX. Installation Manual and the OpenBSD Transition 02/17/2011

Security Power Tools

ENABLING RPC OVER HTTPS CONNECTIONS TO M-FILES SERVER

Software Deployment and Configuration

Linux Network Security

Transcription:

USENIX'04 / UseBSD Using OpenBSD and Snort to build ready to roll Network Intrusion Detection System Sensor http://www.mycert.org.my/sensor/ Tuesday, June 29, 2004

About Speaker Kamal Hilmi Othman khilmi@niser.org.my Mohammad Rizal Othman rizal@jaring.my

Agenda Overview of OpenBSD and Snort Deployment of Distributed Network Intrusion Detection System Building OpenBSD and Snort for Network Intrusion Detection System Sensor (x86) Wrap up (Ready To Roll)

Problem Statement We need to install / deploy multiple Network Intrusion Detection System (NIDS) sensor within our network. Basically the sensor is scattered around and need that fast! We need to deploy for partner (case to case basis)

Motivation

OpenBSD BSD code base maturity. Secure By Default. Support for Internet infrastructure. Easy distribution sets. http://www.openbsd.org

Snort Most notably Network Intrusion Detection System. Community signature support. Portable and configurable. http://www.snort.org

NIDS Sensor As an agent - it analyzes network packets in real time and compares them against a database of known 'attack signatures' or patterns. It will push the data into remote database.

Distributed NIDS Generic Concept 1 to n Sensors 1 2 3 4 n Console

Typical Installation 1. Install OpenBSD. 2. Tweak a kernel for performance tuning. 3. Install required third party software MySQL client and PCRE. 4. Compile Snort with MySQL support and Snort related stuff - Barnyard, Stunnel, signature, user and group. 5. Take out unnecessary stuff. 6. Putting in house scripts. 7. Host hardening process.

Problem Time consume. Geographical boundary? Imagine when you need to roll 8 sensor?

Our approach Build one install many. Installation process will cover all. Ideal sensor: Performance Minimal OS No un-needed component Easy distribution just iso / cdrom.

Building A Release 1. Install OpenBSD - extract sys.tar.gz into /usr/src/ - cvs 2. Customise your kernel - /usr/src/sys/arch/i386/conf/mykernel 3. Test your kernel - replace, reboot and monitor

Building A Release (cont) 4. Hacking the code - You need to know the system. - With this you can decide what you want. - Code - /usr/src/makefile - /usr/src/etc/makefile - /usr/src/usr/bin/makefile -..

/usr/src/etc/makefile Building A Release (cont) --- Makefile.ori Tue Jun 15 17:14:20 2004 +++ Makefile Thu Jun 17 16:20:51 2004 @@ -1,7 +1,7 @@ # $OpenBSD: Makefile,v 1.201 2004/02/29 18:02:14 deraadt Exp $ TZDIR= /usr/share/zoneinfo -LOCALTIME= +LOCALTIME= Canada/Mountain Asia/Kuala_Lumpur NOOBJ= oobj @@ -17,8 +17,8 @@ - phones printcap protocols rbootd.conf rc rc.conf rc.local \ - rc.securelevel rc.shutdown remote rpc security services \ + protocols rbootd.conf rc rc.conf rc.local \ + rc.securelevel rc.shutdown remote security services \

Building A Release (cont) /usr/src/etc/etc.i386/makefile.inc --- Makefile.inc.ori Tue Jun 15 17:16:53 2004 +++ Makefile.inc Tue Jun 15 17:17:20 2004 @@ -3,12 +3,12 @@.ifdef DESTDIR snap_md: bsd notes bootblocks distrib - cp ${.CURDIR}/../sys/arch/i386/compile/GENERIC/bsd \ + cp ${.CURDIR}/../sys/arch/i386/compile/SENSOR/bsd \ ${DESTDIR}/snapshot/bsd bsd: - cd ${.CURDIR}/../sys/arch/i386/conf && config GENERIC - cd ${.CURDIR}/../sys/arch/i386/compile/GENERIC && \ + cd ${.CURDIR}/../sys/arch/i386/conf && config SENSOR + cd ${.CURDIR}/../sys/arch/i386/compile/SENSOR && \ ${MAKE} clean && ${MAKE} depend && exec ${MAKE} notes:

Building A Release (cont) 5. Build process configuration - make your building runs faster - /etc/mk.conf SKIPDIR=usr.sbin/httpd share/doc share/dict games kerberosv gnu/egcs sys/netinet6 distrib/alpha distrib/amd64 distrib/cats distrib/hp300 distrib/hppa distrib/mac68k distrib/macppc distrib/mvme68k distrib/mvme88k distrib/mvmeppc distrib/sparc distrib/sparc64 distrib/vax share/man gnu/usr.bin/perl gnu/usr.bin/perl/lib gnu/usr.sbin/sendmail etc/etc.alpha etc/etc.amd64 etc/etc.cats etc/etc.hp300 etc/etc.hppa etc/etc.mac68k etc/etc.macppc etc/etc.mvme68k etc/etc.mvme88k etc/etc.mvmeppc etc/etc.sparc etc/etc.sparc64 etc/etc.svr4 etc/etc.vax sys/arch/alpha sys/arch/amd64 sys/arch/arm sys/arch/cats sys/arch/hp300 sys/arch/hppa sys/arch/m68k sys/arch/mac68k sys/arch/macppc sys/arch/mvme68k sys/arch/mvme88k sys/arch/mvmeppc sys/arch/pegasos sys/arch/powerpc sys/arch/sparc sys/arch/sparc64 sys/arch/vax

Building A Release (cont) 6. Build your system - /usr/src ; make obj && make build 7. Making your system - setenv for RELEASEDIR and DESTDIR - /usr/src/etc ; make release

Building A Release (cont) /usr/src/distrib/sets/maketars --- maketars.old Wed Jun 16 18:55:32 2004 +++ maketars Sat Jun 19 09:21:38 2004 @@ -49,7 +49,7 @@ cd $fsdir -for i in base comp etc game man misc; do +for i in base etc ; do echo -n "$i: " cat ${lists}/$i/mi ${lists}/$i/m d.${arch} sort \ pax -w -d gzip -9 > ${tardir}/$i${release}.tgz

Building A Release (cont) 8. Release tarballs - RELEASEDIR should contain binary distribution sets, kernel, cdrom and floopy bootable file-systems, checksum file and installation instruction. 9. Adding third party software - uses sitexx.tgz - example: /usr/local/lib/libpcre.so.0.1 /usr/local/lib/libmysqlclient.so.12.0 /usr/local/bin/snort /usr/local/bin/barnyard /usr/local/sbin/stunnel /etc/rules/ /var/log/snort

Build A Release (cont) 10. Write your iso - follow the layout set ie: /version/arch/ - mkhybrid 11. Distribute your iso or cdrom

Installation Installation goes as normal except above screen.

Our Release Uses around 50M. Default installation with: Snort, its dependency, signature, directory, user and group Barnyard, Stunnel Has our own in house script. Sample release: http://www.my-snort.org/downloads/ http://www.mycert.org.my/sensor/ Virtual PC demo

Maintenance Central server Second NIC is controlled by TCP-Wrapper and SSH-key All rules are 'cvs Application / Snort upgrade use pkg_add

How To Collection of howto is http://www.openbsd.org/faq/index.html Man release building an OpenBSD release Man mk.conf system-specific configuration parameters misc@openbsd.org

Similar Project http://www.prowling.nu/main/openids/openids.html

Conclusion We are still working on making a small distribution. Room for improvement.

end() Thank You for Listening