Skip to content

Latest commit

 

History

History
424 lines (341 loc) · 10.7 KB

SingleHostConfig.md

File metadata and controls

424 lines (341 loc) · 10.7 KB

configuration

see

Backup current configuration

root@secx:~# cp /etc/suricata/suricata.yaml /etc/suricata/suricata.yaml.bak

See all currently active configuration

root@secx:~# grep -v -E '^\s*#' /etc/suricata/suricata.yaml | grep -v '^$'

Fortunately, suricata.yaml is quite well explained within the comments.

Test changes before running your new configuration!

suricata -c /etc/suricata/suricata.yaml -T
#or
suricata -c /etc/suricata/suricata.yaml -T -v

HOME_NET and ports

Again, as a bare minimum, you should define your home network:

root@secx:~# grep 'HOME_NET' /etc/suricata/suricata.yaml
    HOME_NET: "[192.168.0.0/16,10.0.0.0/8,172.16.0.0/12]"
    EXTERNAL_NET: "!$HOME_NET"
    HTTP_SERVERS: "$HOME_NET"
    SMTP_SERVERS: "$HOME_NET"
    SQL_SERVERS: "$HOME_NET"
    DNS_SERVERS: "$HOME_NET"
    TELNET_SERVERS: "$HOME_NET"
    DNP3_SERVER: "$HOME_NET"
    DNP3_CLIENT: "$HOME_NET"
    MODBUS_CLIENT: "$HOME_NET"
    MODBUS_SERVER: "$HOME_NET"
    ENIP_CLIENT: "$HOME_NET"
    ENIP_SERVER: "$HOME_NET"

Why does it matter?

  • EXTERNAL_NET -> HOME_NET
  • HOME_NET -> EXTERNAL_NET
  • HOME_NET -> HOME_NET
  • any -> any ...

Review default ports according to your environments:

root@secx:~# grep '_PORTS' /etc/suricata/suricata.yaml 
    HTTP_PORTS: "80"
    SHELLCODE_PORTS: "!80"
    ORACLE_PORTS: 1521
    SSH_PORTS: 22
    DNP3_PORTS: 20000
    MODBUS_PORTS: 502

Also, keep in mind that Suricata recognizes some protocols regardless of the port.

Where are which hosts?

root@secx:~# grep -A 14 'host-os-policy:' /etc/suricata/suricata.yaml
host-os-policy:
  # Make the default policy windows.
  windows: [0.0.0.0/0]
  bsd: []
  bsd-right: []
  old-linux: []
  linux: [10.0.0.0/8, 192.168.1.100, "8762:2352:6241:7245:E000:0000:0000:0000"]
  old-solaris: []
  solaris: ["::1"]
  hpux10: []
  hpux11: []
  irix: []
  macos: []
  vista: []
  windows2k3: []

MTU

root@secx:~# grep 'default-packet-size:' /etc/suricata/suricata.yaml
#default-packet-size: 1514

Rules

root@secx:~# grep -A51 rule-path /etc/suricata/suricata.yaml
default-rule-path: /etc/suricata/rules
rule-files:
 - botcc.rules
 - ciarmy.rules
 - compromised.rules
 - drop.rules
 - dshield.rules
 - emerging-activex.rules
 - emerging-attack_response.rules
 - emerging-chat.rules
 - emerging-current_events.rules
 - emerging-dns.rules
 - emerging-dos.rules
 - emerging-exploit.rules
 - emerging-ftp.rules
 - emerging-games.rules
 - emerging-icmp_info.rules
# - emerging-icmp.rules
 - emerging-imap.rules
 - emerging-inappropriate.rules
 - emerging-malware.rules
 - emerging-misc.rules
 - emerging-mobile_malware.rules
 - emerging-netbios.rules
 - emerging-p2p.rules
 - emerging-policy.rules
 - emerging-pop3.rules
 - emerging-rpc.rules
 - emerging-scada.rules
 - emerging-scan.rules
 - emerging-shellcode.rules
 - emerging-smtp.rules
 - emerging-snmp.rules
 - emerging-sql.rules
 - emerging-telnet.rules
 - emerging-tftp.rules
 - emerging-trojan.rules
 - emerging-user_agents.rules
 - emerging-voip.rules
 - emerging-web_client.rules
 - emerging-web_server.rules
 - emerging-web_specific_apps.rules
 - emerging-worm.rules
 - tor.rules
 - decoder-events.rules # available in suricata sources under rules dir
 - stream-events.rules  # available in suricata sources under rules dir
 - http-events.rules    # available in suricata sources under rules dir
 - smtp-events.rules    # available in suricata sources under rules dir
 - dns-events.rules     # available in suricata sources under rules dir
 - tls-events.rules     # available in suricata sources under rules dir
# - modbus-events.rules  # available in suricata sources under rules dir
 - app-layer-events.rules  # available in suricata sources under rules dir

Rule priority

Different rule types are matched in a specific priority order

root@secx:~# grep -A 4 'action-order' /etc/suricata/suricata.yaml
# action-order:
#   - pass
#   - drop
#   - reject
#   - alert

Optimizing the default configuration for performance

see:

My test machine (yes, it is old)

  • Intel® Xeon® Processor E5630 (12M Cache, 2.53 GHz);
  • 1 Physical CPU;
  • 4 cores; (8 threads with Hyper-Threading enabled).
  • RAM: 72GB PC3-10600 (DDR3-1333) Registered CAS-9 Memory;
  • 1Gbit/s traffic
  • Almost 12,000 EmergingThreats rules enabled

###Simultaneous packet processing Default number of packets allowed to be processed simultaneously by Suricata.

root@secx:~# grep 'max-pending-packets:' /etc/suricata/suricata.yaml
#max-pending-packets: 1024

The default is rather conservative if you have a powerful CPU. For example, increasing this limit to 4,096 showed a slight improvement in performance. Overdoing it can degrade performance, since it negatively impacts caching.

max-pending-packets: 4096

Detection engine

Inspection profile

root@secx:~# grep -A 12 'detect-engine:' /etc/suricata/suricata.yaml
detect-engine:
  - profile: medium
  - custom-values:
      toclient-src-groups: 2
      toclient-dst-groups: 2
      toclient-sp-groups: 2
      toclient-dp-groups: 3
      toserver-src-groups: 2
      toserver-dst-groups: 4
      toserver-sp-groups: 2
      toserver-dp-groups: 25
  - sgh-mpm-context: auto
  - inspection-recursion-limit: 3000

All signatures loaded into Suricata are divided in groups for faster matching.

  • high - more groups, better performance and higher memory usage;
  • medium - balance between performance and memory usage (default);
  • low - less groups, lower performance and lower memory usage.
  • custom - 8 customizable values

Which MPM algorithm?

  • MPM - multi pattern matcher

Supported algorithms are b2g, b3g, wumanber, ac, ac-bs, and ac-gfbs

root@secx:~# grep '^mpm-algo:' /etc/suricata/suricata.yaml
mpm-algo: ac

Signature Group Head MPM distribution context

root@secx:~# grep 'sgh-mpm-context:' /etc/suricata/suricata.yaml
  - sgh-mpm-context: auto
  • full - every group has its own MPM-context;
  • single - all groups share one MPM-context.

If the sgh-mpm-context is set to 'auto', two algorithms ac and ac-gfbs use a single MPM-context. The rest of the algorithms use full by default. You can try different setting manually.

Some test results:

  • Using the 'ac' algorithms with 'full' distribution context required a large amount of memory. With the ET ruleset it consumed over 30GiB of memory. It did demonstrate the best results in processing speed. But is it worth it?
  • Using the 'b2gc' algorithm with 'full' context demonstrated also good performance with more reasonable memory usage (about 6GiB) in my case.

Buffer sizes

Default receive buffer sizes for capture modules are quite safe even for portable systems.

af-packet mode

af-packet:
...
    # recv buffer size, increase value could improve performance
    # buffer-size: 32768
...

Instead try:

af-packet:
    buffer-size: 2147483647

PCAP mode

pcap:
...
    # On Linux, pcap will try to use mmaped capture and will use buffer-size
    # as total of memory used by the ring. So set this to something bigger
    # than 1% of your bandwidth.
    #buffer-size: 16777216
...

Instead try

pcap:
    buffer-size: 2147483647

Memcaps

Increase memcaps and disable checksum-validation.

root@secx:~# grep -A6 '^stream:' /etc/suricata/suricata.yaml
stream:
  memcap: 32mb
  checksum-validation: yes      # reject wrong csums
  inline: auto                  # auto will use inline mode in IPS mode, yes or no set it statically
  reassembly:
    memcap: 128mb
    depth: 1mb                  # reassemble 1mb into a stream
root@secx:~# grep -A4 '^flow:' /etc/suricata/suricata.yaml
flow:
  memcap: 64mb
  hash-size: 65536
  prealloc: 10000
  emergency-recovery: 30

Flow timeouts

root@secx:~# grep -A25 '^flow-timeouts' /etc/suricata/suricata.yaml
flow-timeouts:

  default:
    new: 30
    established: 300
    closed: 0
    emergency-new: 10
    emergency-established: 100
    emergency-closed: 0
  tcp:
    new: 60
    established: 3600
    closed: 120
    emergency-new: 10
    emergency-established: 300
    emergency-closed: 20
  udp:
    new: 30
    established: 300
    emergency-new: 10
    emergency-established: 100
  icmp:
    new: 30
    established: 300
    emergency-new: 10
    emergency-established: 100

Too much? Can we decrease something?


next : Rules management