-
Notifications
You must be signed in to change notification settings - Fork 697
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Invalid state and untracked packet iptables issues. #845
Labels
Comments
Fyi: IOC = indicator of compromise |
@dolanjs Can you provided a detailed STR for future investigators? |
dolanjs
pushed a commit
to dolanjs/securedrop
that referenced
this issue
Jan 23, 2015
…about why the inbound invalid rule is dropped but not logged.
3 tasks
Closing as stale; since the OSSEC spam issue is resolved, we'd need clear STR for any remaining issues with log spam. |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
For the Monitor servers smtp traffic and (app and monitor servers) tor traffic keep experiencing issues with iptables state table. Even thought there are fw rules to allow outbound
NEW,ESTABLISHED,RELATED
and the corresponding inboundESTABLISHED,RELATED
for SMTP and Tor traffic, variousINVALID
andUNTRACKED
events are being dropped. The sequence of events dropped packets:This is causing a lot of false positives. Until the issue can be fully diagnosed we should not log OUTBOUND host based FW drops. Even though this could mean that an IOC is not logged compared to the amount of false positives logging them currently generates I think it is worth the trade off.
Related to #836
The text was updated successfully, but these errors were encountered: