Hi. I’m new to this IPS thing, so sorry if my question is in the wrong section.
I installed Suricata with some default rules and added the free sources.
It look likes Suricata works because of overnight entries in de fast.log:
So is this rule only an alert? So it is not blocked?
If it is not blocked, How do block these kind of rules? I tried to find some answers in the documentation, but couldnt find it. My guess is I didn’t look good enough though But anyway I’ll still like to block such attempts in the future.
I am probably not the most competent to answer but I will give you my opinion.
When we look at the general rule structure, the first word states the action of the rule. The most basic ones are:
pass
alert
drop
As you can see, in your triggered rule the first word is alert. It just makes a statement for you to see but executes no action against the packet. More on this can be found in the chapter 6.1. Rules Format — Suricata 6.0.0 documentation.
During your installation you probably downloaded the default ruleset - Emerging Threats Open via suricata-update tool. This ruleset is focused on intrusion detection setups and not intrusion prevention setups(IPS). This can be seen in the installed ruleset as almost no rule has the “drop” keyword.
It might be tempting to convert all alert actions to drop but I would be doubtful about this as it would lead to blocking the traffic severely. I would say your best bet is to look for IPS ruleset and replace or update your existing ruleset.
Thank you both for answering. I have the IPS part running, but the real puzzle was de drop.conf file. I thought suricata-update was just an update for the rules, but it does so much more. So I missed the suricata-update and the drop.conf config file. In the mean time I have a nice IPS up and running. That is, I do see these kind of log entries.