im afraid you cannot start snort as a daemon. At some point after snort has initialized its attack lists
and other stuff, another thread is launched and that one wont get any data form the unix cmd pipe .-(
After some tests with ossim and snort, im planning to use a dedicated ap with 9 ports and port mirroring
rulesets, could find any good binary or usefull app for tzsp.
im afraid you cannot start snort as a daemon. At some point after snort has initialized its attack lists
and other stuff, another thread is launched and that one wont get any data form the unix cmd pipe .-(
This is right only if Snort started as daemon. If snort is started without -D key, it can receive data from pipe.
In my environment I have VmWare cluster with multiple VM and I have 2 solution:
Dedicated port or Vlan on VmWare side with port mirroring on RouterOS.
Send stream using calea.
I will try to make a start-up script using screen.
I have made some tests, and the problem with my configuration (the ossim default one), is located on
the preprocessor configuration, is i load the config like this its ok.
But if i add the config file that reflect the preprocessor config no packets are processed. ( -c /etc/snort/snort.eth0.conf )
Ill make some test but having a look onto the cfg, guess its related to the preprocessors.
Is anybody using trafr on ossim installations ?? How ??
Im considering using tcprewrite or some solution like this, but with no modifications
to the headers, at least its working rigth now rewriting the packets to loopback
but withe source and destination set to 127.0.0.1. Got to figure out if a direct rewrite
with no modifications exists, does anybody know ?
Here is an open source program I created to take a TZSP stream and save the encapsulated data to a PCAP file. The TZSP protocol is stripped away, making it easy to import this data into many traffic analysis programs such as Wireshark and aircrack.
You need a linux machine to compile and run it.
It collects syslog messages from your’s routeros device (there are instructions on how to use it) and adds the attackers on an address list which you can use to block them.
Use Snort’s -r option to read a pcap capture file, whether from Snort, TCPDump, Ethereal, or any other program that creates a libpcap format file
you can use sniffer (traffr) in background with screen (you said urself) and then with -r switch of snort analyse the files but you need a timer script for check new files created by traffr
Thanks you a lot for this topic. With it and the help of Noah Dietrich, from Snort Technology, I m now able to use Snort with my Mikrotik.
I m using tmux for launching the commands.
As my snort vm use ubuntu, this is the command I m using : sudo trafr -s |sudo snort -c /etc/snort/snort.conf -l /var/log/snort/ -r - -A console
Snort is not daemonized anymore as recommended by the topic.
I still have a question : Does Barnyard2 needs to be launched manually, like snort ? Each times I launch it by SystemD, barnyard stop working after an undefined moment ( coud be 1 hour, but could be less ) ?
Thanks you,
Vincent
EDIT : 284 000+ events filled in my database, Snorby seems to being stuck, even if Snort and Barnyard are still running.