How do I run SELKS in IPS mode? I did the SELKS setup using "SELKS-4.0-nodesktop.iso" and I made all the updates after installation. Currently I am working in IDS mode. How do I configure it as IPS? There is probably a value in the "suricata.yaml" file that I need to change.But I have not found a relevant guide to this topic.
I installed SELKS as a virtual server on VMware. I use the "ens160" and "ens192" interfaces. The interface that the SELKS listens to is "ens160".The interface configurations are as follows;
# The primary network interface
allow-hotplug ens192
iface ens192 inet static
address 176.53.x.xx/27
gateway 176.53.x.x
# dns-* options are implemented by the resolvconf package, if installed
dns-nameservers 94.101.95.4 94.101.94.4 8.8.8.8
dns-search selks.radore.com
auto ens160
iface ens160 inet manual
pre-up ifconfig $IFACE up
post-down ifconfig $IFACE down
post-up /etc/network/if-up.d/idps-interface-tuneup_stamus
root@SELKS:/etc/network# suricata --build-info
This is Suricata version 4.0.0-dev (rev d363a165)
Features: NFQ PCAP_SET_BUFF AF_PACKET HAVE_PACKET_FANOUT LIBCAP_NG LIBNET1.1 HAVE_HTP_URI_NORMALIZE_HOOK PCRE_JIT HAVE_NSS HAVE_LUA HAVE_LUAJIT HAVE_LIBJANSSON TLS MAGIC
SIMD support: none
Atomic intrisics: 1 2 4 8 byte(s)
64-bits, Little-endian architecture
GCC version 6.3.0 20170516, C version 199901
compiled with _FORTIFY_SOURCE=2
L1 cache line size (CLS)=64
thread local storage method: __thread
compiled with LibHTP v0.5.25, linked against LibHTP v0.5.25
Suricata Configuration:
AF_PACKET support: yes
PF_RING support: no
NFQueue support: yes
NFLOG support: no
IPFW support: no
Netmap support: no
DAG enabled: no
Napatech enabled: no
Unix socket enabled: yes
Detection enabled: yes
Libmagic support: yes
libnss support: yes
libnspr support: yes
libjansson support: yes
hiredis support: no
hiredis async with libevent: no
Prelude support: no
PCRE jit: yes
LUA support: yes, through luajit
libluajit: yes
libgeoip: yes
Non-bundled htp: yes
Old barnyard2 support: no
CUDA enabled: no
Hyperscan support: yes
Libnet support: yes
Rust support (experimental): no
Experimental Rust parsers: no
Rust strict mode: no
Suricatasc install: yes
Profiling enabled: no
Profiling locks enabled: no
Development settings:
Coccinelle / spatch: no
Unit tests enabled: no
Debug output enabled: no
Debug validation enabled: no
Generic build parameters:
Installation prefix: /usr
Configuration directory: /etc/suricata/
Log directory: /var/log/suricata/
--prefix /usr
--sysconfdir /etc
--localstatedir /var
Host: x86_64-pc-linux-gnu
Compiler: gcc (exec name) / gcc (real)
GCC Protect enabled: yes
GCC march native enabled: no
GCC Profile enabled: no
Position Independent Executable enabled: yes
CFLAGS -g -O2 -fdebug-prefix-map=/root/Work/packaging/deb-packaging/hyper-stretch/stamus-suricata/suricata-2017090101=. -fstack-protector-strong -Wformat -Werror=format-security
PCAP_CFLAGS -I/usr/include
SECCFLAGS -fstack-protector -D_FORTIFY_SOURCE=2 -Wformat -Wformat-security
Thank you,
Hello again,
What values do I need to change in the suricata.yaml file for IPS mode? Actually I want to dropped attack packets. Could you help me with that?Thank you for the interesting. I have activated the IPS mode.But I see some warnings in the suricata.log. Does this cause a problem?
[25161] 13/12/2017 -- 03:00:15 - (source-af-packet.c:748) <Warning> (AFPWritePacket) -- [ERRCODE: SC_ERR_SOCKET(200)] - Sending packet failed on socket 14: No buffer space available
[25161] 13/12/2017 -- 03:00:15 - (source-af-packet.c:748) <Warning> (AFPWritePacket) -- [ERRCODE: SC_ERR_SOCKET(200)] - Sending packet failed on socket 14: No buffer space available
[25161] 13/12/2017 -- 03:00:15 - (source-af-packet.c:748) <Warning> (AFPWritePacket) -- [ERRCODE: SC_ERR_SOCKET(200)] - Sending packet failed on socket 14: No buffer space available
[25161] 13/12/2017 -- 03:00:15 - (source-af-packet.c:748) <Warning> (AFPWritePacket) -- [ERRCODE: SC_ERR_SOCKET(200)] - Sending packet failed on socket 14: No buffer space available
[25163] 13/12/2017 -- 03:05:22 - (source-af-packet.c:748) <Warning> (AFPWritePacket) -- [ERRCODE: SC_ERR_SOCKET(200)] - Sending packet failed on socket 8: Message too long
[25163] 13/12/2017 -- 03:05:22 - (source-af-packet.c:748) <Warning> (AFPWritePacket) -- [ERRCODE: SC_ERR_SOCKET(200)] - Sending packet failed on socket 8: Message too long
[25159] 13/12/2017 -- 03:05:22 - (source-af-packet.c:748) <Warning> (AFPWritePacket) -- [ERRCODE: SC_ERR_SOCKET(200)] - Sending packet failed on socket 12: Message too long
[25163] 13/12/2017 -- 03:05:22 - (source-af-packet.c:748) <Warning> (AFPWritePacket) -- [ERRCODE: SC_ERR_SOCKET(200)] - Sending packet failed on socket 8: Message too long
[25159] 13/12/2017 -- 03:05:22 - (source-af-packet.c:748) <Warning> (AFPWritePacket) -- [ERRCODE: SC_ERR_SOCKET(200)] - Sending packet failed on socket 12: Message too long