The previous item I sent stated that Microsoft is concerned with their outbound URLs be affected. It seems to me that most rules are set from External to Home on the rule variables. So would outbound really be a concern?
I found this link interesting though I have seen Microsoft pushing Suricata. Maybe you all have seen this link before.
But again, if the bpf has those subnets in it why would IPS block all traffic.
See my other reference. Microsoft is concerned about their O365 URLs outbound. It does not state anything about inbound in regards to IDS/IPS. Besides it is regards to tcp80 and tcp443 traffic by them stating outbound URLs.
AF_PACKET in IPS mode will forward all packets the capture interface reads. So anything it doesn’t read due to a BPF is not forwarded. So if you have a filter like not host 1.2.3.4 then traffic for IP 1.2.3.4 will not be forwarded. If you have a filter host 1.2.3.4 then only traffic for 1.2.3.4 will be forwarded. So in IPS mode, BPF is almost certainly not what you are looking for.
I would say that the XDP option is exactly what you are looking for as long as your kernel is recent and your NIC / driver support it That will lighten the load on your IPS and not block the traffic. From the manual - “XDP bypass is compatible with AF_PACKET IPS mode. Packets from bypassed flows will be send directly from one card to the second card without going by the kernel network stack.”
This is something I am looking at when the same traffic passes multiple taps. No need to analyze the same traffic twice and waste precious processing time.
Well I certainly have a new enough kernel. I am working on seeing if I have the latest driver for those NICs.
I just want to make sure that XDP won’t block all the traffic because that defeats the purpose of af_packet IPS. I just need XDP to work on that particular Microsoft traffic for Teams.
If we properly implement XDP, it is guaranteed to only stop analyzing traffic we tell it to not touch and still pass all other traffic through af-packet IPS mode?