Hi there
After 2 days of brain strain I thought I finally got Suricata with Windivert running on a Windows Server.
In EveBox though, I’m seeing DROP rules are showing action as ALLOWED although it is as a drop rule.
Changed IP’s for demonstration purposes.
HOME_NET=1.0.0.0
The rule:
drop ip [2.0.0.0/24] any -> any any (msg:"ET DROP Dshield Block Listed Source group 1"; reference:url,feeds.dshield.org/block.txt; threshold: type limit, track by_src, seconds 3600, count 1; classtype:misc-attack; flowbits:set,ET.Evil; flowbits:set,ET.DshieldIP; sid:2402000; rev:6025; metadata:affected_product Any, attack_target Any, deployment Perimeter, tag Dshield, signature_severity Major, created_at 2010_12_30, updated_at 2021_09_06;)
The JSON output when triggered:
{
"_id": 88590,
"_source": {
"alert": {
"action": "allowed",
"category": "Misc Attack",
"gid": 1,
"metadata": {
"affected_product": [
"Any"
],
"attack_target": [
"Any"
],
"created_at": [
"2010_12_30"
],
"deployment": [
"Perimeter"
],
"signature_severity": [
"Major"
],
"tag": [
"Dshield"
],
"updated_at": [
"2021_09_06"
]
},
"rev": 6025,
"severity": 2,
"signature": "ET DROP Dshield Block Listed Source group 1",
"signature_id": 2402000
},
"dest_ip": "1.0.0.0",
"dest_port": 33911,
"evebox": {
"filename": "C:\\Program Files\\Suricata\\log\\eve.json"
},
"event_type": "alert",
"flow": {
"bytes_toclient": 0,
"bytes_toserver": 40,
"pkts_toclient": 0,
"pkts_toserver": 1,
"start": "2021-09-07T13:51:44.037483+0000"
},
"flow_id": 399008609636971,
"metadata": {
"flowbits": [
"ET.Evil",
"ET.DshieldIP"
]
},
"proto": "TCP",
"src_ip": "2.0.0.0",
"src_port": 50460,
"tags": [],
"timestamp": "2021-09-07T13:51:44.037483+0000"
}
}
Starting Suricata with this command:
"C:\Program Files\Suricata\suricata.exe" -c "C:\Program Files\Suricata\suricata.yaml" --windivert true