[OpenIndiana-discuss] Configuring span ports on oi151

Jonathan Loran jloran at ssl.berkeley.edu
Tue Nov 8 00:43:12 UTC 2011








On Oct 24, 2011, at 10:54 AM, James Carlson wrote:

> carlopmart wrote:
>> On 10/24/2011 07:08 PM, James Carlson wrote:
>>> You didn't say how you're sniffing traffic.  If you mean that you must
>>> use an _external_ network monitoring device to do this, then the
>>> existing built-in mechanism obviously won't be sufficient.  That'd be a
>>> fair reason to add a port mode flag that disables the normal MAC
>>> filtering, though it's a little unclear why an external device would be
>>> required or desired.
>>> 
>> 
>> Sorry James, for not being properly explained. But yes, I need to use an
>> external monitoring device. I use an external server with a different
>> IDS/IPS sensors to process certain type of traffic. For example: exists
>> one Snort sensor to monitor ftp, smtp, tcp anomalies, etc. Another
>> Bro-IDS sensor to process ssl traffic. And another suricata sensor to
>> process http traffic only. All these three sensors are installed in one
>> server.
> 
> I see.  One solution might be to get those "sensors" to run on the
> OpenIndiana system.  Then they could take advantage of the observability
> interface to grab the traffic desired.
> 
>> And it is a lab. not a production system ...
> 
> The other solutions I can think of (besides adding this feature to the
> existing code or porting the applications) would be intentionally
> breaking the bridge_learn() function in bridge.c so that it always
> returns without updating the forwarding tables, or, alternatively, using
> an external bridge that has this feature.
> 
> The latter would be extremely easy, but would cost more money.  The
> former is a bit hackish, but should do the job, and would be fairly easy
> to do, provided you are able to build kernel modules.
> 

Why not something like this:

mkfifo /tmp/spanout-pipe
tcpdump -i bridgename0 -s0 -w /tmp/spanout-pipe &
cat /tmp/spanout-pipe | ssh  ids-system "snort-etc-capture"

You could replace cat | ssh with something spiffier, but perhaps less secure, like nc or mbuffer.

Jon

-     _____/     _____/      /           - Jonathan Loran -           -
-    /          /           /                IT Officer               -
-  _____  /   _____  /     /     Space Sciences Laboratory, UC Berkeley
-        /          /     /                (510) 643-5146             -
- ______/    ______/    ______/        jloran at ssl.berkeley.edu        -




More information about the OpenIndiana-discuss mailing list