From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Injected-Via-Gmane: http://gmane.org/ To: sarlug@lug.ru From: Eriberto Date: Mon, 06 Mar 2006 15:29:40 -0300 Message-ID: Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1; format=flowed X-Complaints-To: usenet@sea.gmane.org X-Gmane-NNTP-Posting-Host: 201.22.151.53.adsl.gvt.net.br User-Agent: Mozilla Thunderbird 1.0.2 (X11/20051002) X-Accept-Language: pt-br, pt Sender: news Content-Transfer-Encoding: quoted-printable X-MIME-Autoconverted: from 8bit to quoted-printable by mail-relay.eunet.no id k26IUgHe034418 Subject: [Sarlug] IPS HLBR 1.0 released (off-topic) X-BeenThere: sarlug@lug.ru X-Mailman-Version: 2.1.6 Precedence: list Reply-To: Saratov Linux User Group Maillist List-Id: Saratov Linux User Group Maillist List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 07 Mar 2006 11:20:41 -0000 Archived-At: List-Archive: List-Post: IPS HLBR - Version 1.0 can detect malicious traffic using regular expressions Version 1.0 of Hogwash Light BR, released march 5th 2006, brings two interesting new features. The first one is the ability of using regular expressions to detect intrusion attempts and e-mails with virus or phishing. The second is the use of lists with banned words. HLBR is an IPS (Intrusion Prevention System) that reads network traffic in the layer 2 of the OSI model. Since it works like a bridge, it stays in-line in the network topology and doesn't need an IP address. So, HLBR is invisible to attackers. Traffic filtering (including the packets contents) can be done with simple rules. Version 1.0 can use regular expressions to filter the packets. Below is an example of rule with regular expressions: (please see http://hlbr.sourceforge.net/hlbr-rule-1.gif) In short, all TCP traffic destined to port 25 of the e-mail server will be filtered. If the text: filename=3D"anything_different_of_line_breaks.s__c__r" (please ignore underlines in s__c__r) is found inside the packet, that means there are an attachment .scr in the e-mail (virus). So this packet will suffer the action named 'virus'. This action logs the event, dumps the malicious traffic in tcpdump format and drops the packet. Below is an example of rule against a type of buffer overflow attempt against DNS servers: (please see http://hlbr.sourceforge.net/hlbr-rule-2.gif) In this case, due to the use of pipe characters (|), HLBR will check the traffic for the hexadecimal sequence given as an attack signature. HLBR lets you use rules for blocking attacks against network servers. In order to fully understand it please read our documentation at http://hlbr.sourceforge.net/ips-en.html - explanations about the IPS concept including charts. HLBR site is at http://hlbr.sourceforge.net. (Translated from Portuguese by Andr=E9 Bertelli - andre (a) bertelli.name= )