« Previous | Next »
27 August, 2005
The 0.9.3 release of
fwknop is ready for
download. Here is an excerpt from
the
ChangeLog:
- Added an on-disk cache of md5 sums so that the md5 sum check can
survive restarts of fwknop.
- Updated install.pl to be more friendly to Mac OS X (Blair Zajac).
- Updated to allow access.conf variables to have values instead of just
being defined.
- Started on additional server authentication mode code (re-worked MD5
sum calculation to allow packet format to be extended by taking into
account the fwknop version number).
27 August, 2005
| Software Releases
| By: Michael Rash
15 August, 2005
Syngress Publishing has published a book
entitled
"Nessus, Snort, & Ethereal Power Tools : Customizing Open Source Security Applications",
and I was the Technical Editor for Chapter 10
"Modifying Snort". This chapter explores
the steps necessary to modify Snort to support a custom requirement. Examples are given for two
custom projects "Snort-AV" and "Snort-Wireless".
15 August, 2005
| Publications
| By: Michael Rash
07 August, 2005
The 0.9.2 release of
fwknop is ready for
download. Here is an excerpt from
the
ChangeLog:
- Added FILE_PCAP data collection method when running in server mode.
This is a more general way of getting packets than the ULOG_PCAP
mode since then a normal ethernet sniffer can be used to build the
file.
- Added the ability to re-open a pcap file if its size shrinks (i.e.
it gets rotated out or something).
- Bugfix for multiple rules with the same timestamp not being timed out
by knoptm.
- Integrated spoofing capability directly within fwknop (instead of
using the knopspoof command) through the use of "require Net::RawIP".
- Better multi-protocol support in server mode. Tcp and icmp packets
are properly decoded now.
07 August, 2005
| Software Releases
| By: Michael Rash
29 July, 2005
The 0.9.1 release of
fwknop is ready for
download. Here is an excerpt from
the
ChangeLog:
- Added the ability to specify multiple ports/protocols to access on a
server with the --Access command line option.
- Added the ability to spoof SPA packets over icmp and tcp protocols.
- Added the ability to restrict access at the server to only those
ports defined in the OPEN_PORTS keyword. This option is controled by
a new keyword "PERMIT_CLIENT_PORTS".
- Bugfix for MD5 sum not being properly calculated over decrypted data.
This allowed old packets that contained additional garbage data to
be replayed against an fwknop server.
- Updated to fall back to getpwuid() if getlogin() fails (Blair Zajac).
- Added --ipt-list to list all current rules in the FWKNOP Netfilter
chains.
- Added --ipt-flush to flush all current rules in the FWKNOP Netfilter
chains.
- Bugfix for the installer dying if ~/lib already exists (Blair Zajac).
- Updated to delay the loading of server perl modules (Net::Pcap, etc.)
only if we are running in server mode.
- Bugfix for module directory paths in install.pl.
29 July, 2005
| Software Releases
| By: Michael Rash
15 July, 2005
The 1.4.2 release of
psad is ready for
download. Here is an excerpt from
the
ChangeLog:
- Dependency bugfixes for mail binary.
- Bugfix for various IGNORE_* keywords not being honored.
- Bugfix for not timing out blocked IP addresses from a previous run.
- Updated to version 0.2 of the IPTables::ChainMgr module.
- Updated to not truncate the fwdata file upon psad startup.
- Added --fw-dump which produces a sanitized (i.e. no IP addresses)
version of the local Netfilter policy. Also added --fw-include-ips
to (optionally) not sanitize IPs/nets. Note that the 0.0.0.0 and
0.0.0.0/0 IPs/nets are not sanitized since they give no useful
information about specific IPs/nets.
- Added ulogd data collection mode.
- Bugfix for FW_MSG_SEARCH default (at least "DROP" is included now
even if FW_SEARCH_ALL is set to "N").
15 July, 2005
| Software Releases
| By: Michael Rash
11 July, 2005
The 0.8.0 release of
fwsnort is ready for
download. Here is an excerpt from
the
ChangeLog:
- Completely re-structured fwsnort w.r.t. how it creates Netfilter
chains. There are no longer any per-interface chains (this
greatly simplifies the Netfilter chains).
- Added three new chains "FWSNORT_INPUT_ESTAB", "FWSNORT_OUTPUT_ESTAB"
and "FWSNORT_FORWARD_ESTAB" to which tcp connections in the
ESTABLISHED state are jumped. This allows fwsnort to use the
Netfilter tcp connection tracking mechanism to ignore Stick and Snot
style attacks (similar to the flow:established Snort rule option).
- Added true variable resolution (i.e. HTTP_SERVERS -> HOME_NET -> any)
for the Snort rule header. This directly emulates the behavior of
the Snort IDS.
- Added IP protocol support in the translation of the Snort rule
header. The Snort rule translation rate is now at about 53% for
Snort-2.3.
- Bugfix for ipopts Snort option (several arguments are not supported
by the ipv4options extension).
- Better tests for Netfiler TTL, TOS, and ipv4options matches.
- Replaced IGNORE_IP and IGNORE_NET keywords with single IGNORE_ADDR
keywork in fwsnort.conf.
11 July, 2005
| Software Releases
| By: Michael Rash
05 June, 2005
The 0.7.0 release of
fwsnort is ready for
download. Here is an excerpt from
the
ChangeLog:
- Added support for the Snort pass action by using the ACCEPT target.
- Added support for the Snort log action by using the ULOG target
(which can then log the packet via the pcap writer).
- Added support for all fwsnort alerts to be logged via the ULOG
target instead of the LOG target.
- Added support for the "resp" keyword to allow it to drive the
Netfilter argument to the REJECT target.
- Added "pcre" to the unsupported list... this knocks the fwsnort
translation rate down to about 50% for Snort-2.3 rules (pcre is
heavily utilized).
- Added "priority" and "rev" to comment lines.
05 June, 2005
| Software Releases
| By: Michael Rash
30 May, 2005
fwknop has made
Slashdot once again for the new
Single Packet Authorization mode. The story has been given the title
Going Beyond Port Knocking; Single Packet Access.
30 May, 2005
| In The News
| By: Michael Rash
29 May, 2005
The 0.9.0 release of
fwknop is ready for
download. Here is an excerpt from
the
ChangeLog:
- Added new authorization mode that uses Net::Pcap to read packets
out of a file that is written to by the ulogd pcap writer (also
stubbed in code to sniff packets directly off the wire). This
authorization mode only requires single packets, and has many
characteristics that are better than simple port knocking, including
being non-replayable, and much more data can be sent. This mode
is now the default for both the server and the client.
- Made the execution of knopmd optional depending on whether AUTH_MODE
is a pcap mode (e.g. ULOG_PCAP or PCAP).
- Added --Spoof-src argument so that encrypted packets can be spoofed
via /usr/sbin/knopspoof.
- Added /usr/sbin/knoptm so that firewall rules can be timed-out when
the server is running in PCAP mode even if new packets don't appear
on the wire.
- Updated fwknop man page to talk about the new pcap-based
authorization mode.
29 May, 2005
| Software Releases
| By: Michael Rash
26 April, 2005
| In The News
| By: Michael Rash
« Previous |
Next »