Re: Intrusion Detection recommendations

2015-02-19 Thread Owen DeLong
they began > using a Linux kernel around PIX OS V8. > > --p > > -Original Message- > From: NANOG [mailto:nanog-bounces+patrick.darden=p66@nanog.org] On Behalf > Of Justin M. Streiner > Sent: Saturday, February 14, 2015 3:28 AM > To: nanog@nanog.org > S

RE: Re: Intrusion Detection recommendations

2015-02-19 Thread Darden, Patrick
-Original Message- From: NANOG [mailto:nanog-boun...@nanog.org] On Behalf Of Rich Kulawiec Sent: Saturday, February 14, 2015 4:29 PM To: nanog@nanog.org Subject: [EXTERNAL]Re: Intrusion Detection recommendations . . . This reminds me to bring up a point that can't be stressed enough: it'

RE: Re: Intrusion Detection recommendations

2015-02-19 Thread Darden, Patrick
, February 14, 2015 12:57 PM To: Randy Bush Cc: North American Network Operators' Group Subject: [EXTERNAL]Re: Intrusion Detection recommendations On Sat, Feb 14, 2015 at 2:38 AM, Randy Bush wrote: Bro, SNORT, SGUIL, Tcpdump, and Wireshark are some nice tools. By itself, a single insta

RE: Re: Intrusion Detection recommendations

2015-02-19 Thread Darden, Patrick
- From: NANOG [mailto:nanog-bounces+patrick.darden=p66@nanog.org] On Behalf Of Justin M. Streiner Sent: Saturday, February 14, 2015 3:28 AM To: nanog@nanog.org Subject: [EXTERNAL]Re: Intrusion Detection recommendations On Fri, 13 Feb 2015, Rich Kulawiec wrote: > On Fri, Feb 13, 2015 at 02

Re: Intrusion Detection recommendations

2015-02-19 Thread Joe Klein
I now have a few moments to discuss Security Onion, and why it works well for a many small and mid-sided organization. Security Onion is a Linux distro for IDS, NSM, and log management. The whole thing can be run on a single, or separated systems, based on the needs, network and security architec

RE: Intrusion Detection recommendations

2015-02-18 Thread Scavotto, Brian
I'm not sure if it's been mentioned, but for a business of your size...check out SecurityOnion. It's everything you need in one easy package and it's free. -Original Message- From: NANOG [mailto:nanog-boun...@nanog.org] On Behalf Of Andy Ringsmuth Sent: Friday, February 13, 2015 12:40 PM

RE: Intrusion Detection recommendations

2015-02-15 Thread Colin Bodor
PM To: nanog@nanog.org Subject: Re: Intrusion Detection recommendations On Sat, Feb 14, 2015 at 12:57:29PM -0600, Jimmy Hess wrote: > By itself, a single install of Snort/Bro is not necessarily a complete > IDS, as it cannot inspect the contents of outgoing SSL sessions, so > there can

Re: Intrusion Detection recommendations

2015-02-14 Thread Jimmy Hess
On Sat, Feb 14, 2015 at 12:04 PM, BPNoC Group wrote: The thing to note about ipfw, is it only provides you with essentially 5-tuple based access lists based on source and destination, as this functions strictly by looking at packet headers.There's no ipfw rule you can make that will tell

Re: Intrusion Detection recommendations

2015-02-14 Thread Matthew Petach
On Fri, Feb 13, 2015 at 12:43 PM, J. Oquendo wrote: [...] > For the most part > though, this practice of half-baked security will continue, > vendors will make bucketloads of money, consumers of IPS/IDS > devices will still complain how much the product sucks, and > I as a pentester... I stay hap

Re: Intrusion Detection recommendations

2015-02-14 Thread Rich Kulawiec
On Sat, Feb 14, 2015 at 12:57:29PM -0600, Jimmy Hess wrote: > By itself, a single install of Snort/Bro is not necessarily a complete > IDS, as it cannot inspect the contents of outgoing SSL sessions, so > there can still be Javascript/attacks against the browser, or SQL > injection attempts encap

Re: Intrusion Detection recommendations

2015-02-14 Thread BPNoC Group
On Sat, Feb 14, 2015 at 10:19 AM, Rich Kulawiec wrote: > On Fri, Feb 13, 2015 at 03:45:30PM -0600, Rafael Possamai wrote: > > What is the alternative then... Does he have the time to become a BSD > guru > > and master ipfw and pf? Probably not feasible with all other job duties, > > unless he loc

Re: Intrusion Detection recommendations

2015-02-14 Thread BPNoC Group
On Fri, Feb 13, 2015 at 6:45 PM, Rafael Possamai wrote: > I am a huge fan of FreeBSD, but for a medium/large business I'd definitely > use a fairly well tested security appliance like Cisco's ASA. Or maybe Juniper, Cisco's Ironport, IPSO? They are all FreeBSD based, big and large critical netw

Re: Intrusion Detection recommendations

2015-02-14 Thread Charles N Wyble
Checkout security onion. Its got a pretty nice suite of tools and can run a (or many) dedicated sensor system and communicate back to a central system. As for SSL MITM, see the recent nanog thread for a full layer 2 to layer 8 ramifications of that activity. For ssh mitm, I don't know of any t

Re: Intrusion Detection recommendations

2015-02-14 Thread Jimmy Hess
On Sat, Feb 14, 2015 at 2:38 AM, Randy Bush wrote: Bro, SNORT, SGUIL, Tcpdump, and Wireshark are some nice tools. By itself, a single install of Snort/Bro is not necessarily a complete IDS, as it cannot inspect the contents of outgoing SSL sessions, so there can still be Javascript/attacks aga

Re: Intrusion Detection recommendations

2015-02-14 Thread Rafael Possamai
Thanks for the awesome response, you have valid points. This could be me trying to simplify things by suggesting something like Cisco ASA, but the FreeBSD solution will need much more than just a well written ipfw or pf set of rules. In his scenario, I would also most likely need to setup VPN, CARP

Re: Intrusion Detection recommendations

2015-02-14 Thread Justin M. Streiner
On Fri, 13 Feb 2015, Rich Kulawiec wrote: On Fri, Feb 13, 2015 at 02:45:46PM -0600, Rafael Possamai wrote: I am a huge fan of FreeBSD, but for a medium/large business I'd definitely use a fairly well tested security appliance like Cisco's ASA. Closed-source software is faith-based security.

Re: Intrusion Detection recommendations

2015-02-14 Thread Rich Kulawiec
On Fri, Feb 13, 2015 at 03:45:30PM -0600, Rafael Possamai wrote: > What is the alternative then... Does he have the time to become a BSD guru > and master ipfw and pf? Probably not feasible with all other job duties, > unless he locks himself in his mom's basement for the next 5 years. I know this

Re: Intrusion Detection recommendations

2015-02-14 Thread Randy Bush
> I've been tasked by our company president to learn about, investigate and > recommend an intrusion detection system for our company. > > We're a smaller outfit, less than 100 employees, entirely Apple-based. > Macs, iPhones, some Mac Mini servers, etc., and a fiber connection to the > world. We

RE: Intrusion Detection recommendations

2015-02-13 Thread Keith Medcalf
German Shepherd Dogs are wonderful intrusion detection devices. In a lot of cases they also server as excellent intrusion prevention devices as well. (Must be Friday night) :-) --- Theory is when you know everything but nothing works. Practice is when everything works but no one knows why.

Re: Intrusion Detection recommendations

2015-02-13 Thread Jimmy Hess
On Fri, Feb 13, 2015 at 11:40 AM, Andy Ringsmuth wrote: > NANOG'ers, > I've been tasked by our company president to learn about, investigate and > recommend an intrusion detection system for our company. An important thing to realize is that an Intrusion Detection System is not a "product" you c

Re: Intrusion Detection recommendations

2015-02-13 Thread Mel Beckman
Of course it is. You say that like faith is a bad thing. The illogic of claiming to have no faith in anything is this: it's impractical to assume the role of quality assurance for everything in your life. The question is your faith reasonable. Ever use an elevator? Faith. Drive a car? Faith.

Re: Intrusion Detection recommendations

2015-02-13 Thread Mel Beckman
tl;dr dc -mel > On Feb 13, 2015, at 1:13 PM, "J. Oquendo" wrote: > >> On Fri, 13 Feb 2015, Mel Beckman wrote: >> >> JO, >> >> IDS to meet PCI or HIPAA requirements is "regulatory grade". It meets >> specific notification and logging requirements. SNORT-based systems fall >> into this categ

RE: Intrusion Detection recommendations

2015-02-13 Thread Warsaw LATAM Operations Group
Hello Andy, I believe you are very good set up the way you are in technology. I see you are surrounded by BSD systems everywhere, on servers, mobile and desktop. And I suggest you keep running FreeBSD for this new security requirement you have. We run FreeBSD as IDS/IPS system on several sites, a

Re: Intrusion Detection recommendations

2015-02-13 Thread J. Oquendo
On Fri, 13 Feb 2015, Rafael Possamai wrote: > What is the alternative then... Does he have the time to become a BSD guru > and master ipfw and pf? Probably not feasible with all other job duties, > unless he locks himself in his mom's basement for the next 5 years. > The alternative is to unders

Re: Intrusion Detection recommendations

2015-02-13 Thread Valdis . Kletnieks
On Fri, 13 Feb 2015 15:45:30 -0600, Rafael Possamai said: > What is the alternative then... Does he have the time to become a BSD guru > and master ipfw and pf? Probably not feasible with all other job duties, > unless he locks himself in his mom's basement for the next 5 years. By the time you le

Re: Intrusion Detection recommendations

2015-02-13 Thread Rafael Possamai
What is the alternative then... Does he have the time to become a BSD guru and master ipfw and pf? Probably not feasible with all other job duties, unless he locks himself in his mom's basement for the next 5 years. On Fri, Feb 13, 2015 at 3:27 PM, Rich Kulawiec wrote: > On Fri, Feb 13, 2015 at

Re: Intrusion Detection recommendations

2015-02-13 Thread Rich Kulawiec
On Fri, Feb 13, 2015 at 02:45:46PM -0600, Rafael Possamai wrote: > I am a huge fan of FreeBSD, but for a medium/large business I'd definitely > use a fairly well tested security appliance like Cisco's ASA. Closed-source software is faith-based security. ---rsk

Re: Intrusion Detection recommendations

2015-02-13 Thread J. Oquendo
On Fri, 13 Feb 2015, Mel Beckman wrote: > JO, > > IDS to meet PCI or HIPAA requirements is "regulatory grade". It meets > specific notification and logging requirements. SNORT-based systems fall into > this category. > tl;dr (even I don't read what I write) You failed to see the snark in "m

Re: Intrusion Detection recommendations

2015-02-13 Thread Rafael Possamai
I am a huge fan of FreeBSD, but for a medium/large business I'd definitely use a fairly well tested security appliance like Cisco's ASA. Depending on the traffic you have on your fiber uplink, you can get a redundant pair of ASAs running for less than $2,000 in the US. I just find it less stressful

Re: Intrusion Detection recommendations

2015-02-13 Thread Mel Beckman
JO, IDS to meet PCI or HIPAA requirements is "regulatory grade". It meets specific notification and logging requirements. SNORT-based systems fall into this category. -mel beckman > On Feb 13, 2015, at 10:00 AM, "J. Oquendo" wrote: > >> On Fri, 13 Feb 2015, Mel Beckman wrote: >> >> Unless

Re: Intrusion Detection recommendations

2015-02-13 Thread Richo Healey
On 13/02/15 17:45 +, Mel Beckman wrote: Unless you need regulatory-grade IDS, your best bet is a Unified Threat Management (UTM) appliance, essentially any modern enterprise grade firewall such as a Cisco ASA, Fortigate, SonicWall, etc. These all have built-in IDS/IPS options for a fee. -

Re: Intrusion Detection recommendations

2015-02-13 Thread J. Oquendo
On Fri, 13 Feb 2015, Mel Beckman wrote: > Unless you need regulatory-grade IDS, your best bet is a Unified Threat > Management (UTM) appliance, essentially any modern enterprise grade firewall > such as a Cisco ASA, Fortigate, SonicWall, etc. These all have built-in > IDS/IPS options for a fee.

Re: Intrusion Detection recommendations

2015-02-13 Thread J. Oquendo
On Fri, 13 Feb 2015, Andy Ringsmuth wrote: > NANOG'ers, > > I've been tasked by our company president to learn about, investigate and > recommend an intrusion detection system for our company. > > We're a smaller outfit, less than 100 employees, entirely Apple-based. Macs, > iPhones, some Mac

Re: Intrusion Detection recommendations

2015-02-13 Thread Mel Beckman
Unless you need regulatory-grade IDS, your best bet is a Unified Threat Management (UTM) appliance, essentially any modern enterprise grade firewall such as a Cisco ASA, Fortigate, SonicWall, etc. These all have built-in IDS/IPS options for a fee. -mel On Feb 13, 2015, at 9:40 AM, Andy Ringsm