Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Invalid state and untracked packet iptables issues. #845

Closed
dolanjs opened this issue Jan 23, 2015 · 3 comments
Closed

Invalid state and untracked packet iptables issues. #845

dolanjs opened this issue Jan 23, 2015 · 3 comments

Comments

@dolanjs
Copy link
Contributor

dolanjs commented Jan 23, 2015

For the Monitor servers smtp traffic and (app and monitor servers) tor traffic keep experiencing issues with iptables state table. Even thought there are fw rules to allow outbound NEW,ESTABLISHED,RELATED and the corresponding inbound ESTABLISHED,RELATED for SMTP and Tor traffic, various INVALID and UNTRACKED events are being dropped. The sequence of events dropped packets:

Jan 23 16:01:51 mon-staging kernel: [39702.413350] Denied_INVALID IN= OUT=eth0 SRC=10.0.2.15 DST=74.125.20.108 LEN=40 TOS=0x00 PREC=0x00 TTL=64 ID=55750 DF PROTO=TCP SPT=49706 DPT=587 WINDOW=32160 RES=0x00 ACK URGP=0 
Jan 23 16:01:51 mon-staging kernel: [39702.413475] Denied_ACK IN= OUT=eth0 SRC=10.0.2.15 DST=74.125.20.108 LEN=40 TOS=0x00 PREC=0x00 TTL=64 ID=55750 DF PROTO=TCP SPT=49706 DPT=587 WINDOW=32160 RES=0x00 ACK URGP=0 
Jan 23 16:01:51 mon-staging kernel: [39702.413350] Denied_TCP IN= OUT=eth0 SRC=10.0.2.15 DST=74.125.20.108 LEN=40 TOS=0x00 PREC=0x00 TTL=64 ID=55750 DF PROTO=TCP SPT=49706 DPT=587 WINDOW=32160 RES=0x00 ACK URGP=0 

This is causing a lot of false positives. Until the issue can be fully diagnosed we should not log OUTBOUND host based FW drops. Even though this could mean that an IOC is not logged compared to the amount of false positives logging them currently generates I think it is worth the trade off.

Related to #836

@garrettr
Copy link
Contributor

Fyi: IOC = indicator of compromise

@garrettr
Copy link
Contributor

@dolanjs Can you provided a detailed STR for future investigators?

dolanjs pushed a commit to dolanjs/securedrop that referenced this issue Jan 23, 2015
…about why the inbound invalid rule is dropped but not logged.
garrettr added a commit that referenced this issue Jan 24, 2015
Iptables invalid and acks. resolves #828, follow-up in #845
@garrettr garrettr added this to the 0.4 milestone Mar 27, 2015
@redshiftzero redshiftzero removed this from the 0.4 milestone Apr 6, 2017
@eloquence
Copy link
Member

Closing as stale; since the OSSEC spam issue is resolved, we'd need clear STR for any remaining issues with log spam.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

4 participants