Hi,
Thank you for your info mail! Answers below...
On Wed, Jan 7, 2015 at 11:05 AM, Chris Almond <
chrisal...@gmail.com> wrote:
> Dear Community,
>
> I have started to test Selks a few weeks ago and got some questions. I wrote
> some notes, but not sure if I understand everything well. Please correct me:
>
>
> "Services running:
> Suricata --> IPS / IDS
> Scirius --> Web management interface for Suricata, written in Django
> Elasticsearch --> The engine processing logs and search.
> Logstash --> Log management, scrubs your logs and parse all data
> sources into an easy to read JSON format.
> Kibana --> Dashboard, Elasticsearch’s data visualization engine,
> "kibana-dashboards-stamus"
>
> Processing of data: Suricata logs -> Elasticsearch -> Logstash ->
> Kibana/Scirius "
>
>
Processing/access of/to data: Suricata logs -> Logstash ->
Elasticsearch -> (nginx proxy with authentication)...Kibana/Scirius
>
> After installing Selks all the traffic originating from itself gets into the
> logs and I can use the dashboard very well. However I couldn't analyze
> traffic originating from other hosts/clients.
> What I have and did:
> - There is one ethernet interface allowing incoming/outgoing/forwarding
> packets.
> - I have allowed ip forwarding in sysctl.
> - Changed Suricata to NFQ mode
What were your steps exactly?
> - I am sending all traffic to the NFQ, to the same one which is configured
> in suricata
> - Set client's default gateway to Selks
What is your network set up like - I mean do you use any NAT/PNAT? Any
iptables/ipset rules? Anything in particular?
>
> After this, the packets get forwarded from clients, everything gets passed
> to the NFQ, but I see nothing in the bashboard or in Suricata logs. Eg. I
> have opened Tor connections from the clients, but no alerts were received.
> Tcpdump can see everything clients send.
>
Just to confirm - what is the output of "ethtool -k yourinterface"
> Note: there is a remote exec vuln in the default install's ElasticSearch's
> "/_search?source=" parameter. That may be fixed by upgrading the iso images.
>
Is that the CVE you are referring to ? -
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3120
> Any help is appreciated,
> Thank you!
> Chris
>
Thanks
> --
> IRC: Let's talk about SELKS on Freenode IRC on the #SELKS channel
> Wiki:
https://github.com/StamusNetworks/SELKS/wiki
> GitHub:
https://github.com/StamusNetworks/SELKS
> Blog:
https://www.stamus-networks.com/theblog/
> Twitter: @StamusN
> g+: Stamus Networks
> ---
> You received this message because you are subscribed to the Google Groups
> "SELKS" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to
selks+un...@googlegroups.com.
> To post to this group, send email to
se...@googlegroups.com.
> For more options, visit
https://groups.google.com/d/optout.
--
Regards,
Peter Manev