As it happens, there is an issue with the setup as I have presented it.
Pulledpork is munging the URL of the second blacklist in a way I have not been
able to figure out yet and causing the
pulledpork.pl script to croak, as the
munging of the URL causes a 404 Not Found error. (Insufficient testing before
posting. Guilty as charged, your honor.)
Also, to add another blacklist, you add another blacklist definition to the
reputation preprocessor config in snort.conf. This way a local blacklist and
whitelist can be maintained.
I have not looked at how rule-update and Salt will handle blacklists, so for now
this only works for a standalone SO setup.
And finally, the reputation preprocessor is supposed to shorten the processing
path for packets at the expense of using up more memory, granting a free pass to
whitelisted entries and an instant alert on blacklisted ones, depending on how
the reputation preprocessor is configured. The argument can be made that hits on
the blacklist will be more rare than those on the whitelist, so use of the
blacklist only is not saving much overall and that you must employ the whitelist
too in order to get real improved performance.
This is really an exercise and exploration of the capabilities of the Security
Onion NSM for me. I tried to enable a blacklist, it worked (at first, and after
some work), and I thought I'd share what I learned.
YMMV. Caveat lector. Benutzung auf eigene Gefahr.
> <mailto:
security-onion%2Bunsu...@googlegroups.com>.
> <mailto:
securit...@googlegroups.com>.
> <mailto:
security-onio...@googlegroups.com>.
> <mailto:
securit...@googlegroups.com>.