This is the mail archive of the systemtap@sourceware.org mailing list for the systemtap project.


Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]
Other format: [Raw text]

Re: monitor changes to iptables


Grep for EXPORT_SYMBOL in the netfilter folder returns a couple of
promising leads. For example
http://elixir.free-electrons.com/linux/latest/source/net/ipv4/netfilter/ip_tables.c#L1754

On Fri, Oct 13, 2017 at 6:31 PM, Arkady <arkady.miasnikov@gmail.com> wrote:
> Sorry, this is a better link
> http://elixir.free-electrons.com/linux/latest/source/net/netfilter/nfnetlink.c#L151
>
> On Fri, Oct 13, 2017 at 6:28 PM, Arkady <arkady.miasnikov@gmail.com> wrote:
>> You are looking for preferably exported hooks in
>> http://elixir.free-electrons.com/linux/v2.6.33/source/net/netfilter
>> Specifically you can start looking around
>> http://elixir.free-electrons.com/linux/latest/source/net/netlink/af_netlink.c#L1861
>>  - this is the point where a netlink configuration packet hist the
>> netfilter API.
>>
>> On Fri, Oct 13, 2017 at 6:16 PM, Daniel Doron <danielmeirdoron@gmail.com> wrote:
>>> Hi William,
>>>
>>> I am building an EDR Agent (End point detection and response) which
>>> role is to gather various information about activities of different
>>> processes and able to detect abnormal activity. One of the required
>>> sensors is a detector for iptable changes. A an example of threat
>>> using iptable rules is a malware which has gained access to the system
>>> and leaks information via port knocking method. Just one example...
>>> My goal is to gather information using SystemTap from inside the
>>> Kernel to avoid as much as possible being detected or thwarted.
>>> I hope this clarifies the goal.
>>>
>>> -Daniel
>>>
>>>
>>> On Wed, Oct 11, 2017 at 5:45 PM, William Cohen <wcohen@redhat.com> wrote:
>>>> On 10/11/2017 12:47 AM, Daniel Doron wrote:
>>>>> Hi William,
>>>>> Thanks for the suggestion. Correct me if I am wrong but:
>>>>> 1. auditctl does not provide real time / online logging facility
>>>>> 2. I would have to parse its logs to the get the info I want
>>>>> 3. Does it also use kprobes to get the info? I'll need to strace it to
>>>>> see how it works...
>>>>>
>>>>> I was thinking maybe monitor the ip_tables module directly, but I will
>>>>> need to figure out the relevant functions...
>>>>
>>>> Hi Daniel,
>>>>
>>>> The auditctl suggestion was a quick off the top of the head thought about some place that would have that information.  There is a timestamp in the audit log information, so if one knowns when the problems occurs it should be possible to identify the events in the audit log happening around that time.
>>>>
>>>> It would be useful to describe what the problem that is being investigated.  That background would some context to steer the discussion towards approaches that would best solve the problem.
>>>>
>>>> -Will
>>>>>
>>>>>
>>>>>
>>>>> On Tue, Oct 10, 2017 at 11:17 PM, William Cohen <wcohen@redhat.com> wrote:
>>>>>> On 10/10/2017 10:49 AM, Daniel Doron wrote:
>>>>>>> Hi,
>>>>>>>
>>>>>>> I am trying to figure out a way to monitor and log changes to iptables
>>>>>>> (netfilter). Any ideas would be appreciated...
>>>>>>>
>>>>>>> Thanks.
>>>>>>> Daniel.
>>>>>>>
>>>>>>
>>>>>> Hi Daniel,
>>>>>>
>>>>>> Would you need to use systemtap for this or would using auditctl as mentioned in the following be sufficient?
>>>>>>
>>>>>> https://unix.stackexchange.com/questions/206891/audit-on-changes-to-the-running-iptables-configuration
>>>>>>
>>>>>>
>>>>>> -Will
>>>>


Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]