You read my last post about strongSwan because you wanted to setup a VPN for yourself? Too complicated? Well, give Wireguard a try then.
Continue reading How to setup WireGuard VPN with ChromeOS clientCategory: network
strongSwan IPsec VPN IKEv2 with ChromeOS client
strongSwan is a complete IPsec solution. It can be used to secure the communication between your servers and clients by authentication and encryption.
Continue reading strongSwan IPsec VPN IKEv2 with ChromeOS clienteBPF bypass with Suricata 7.0.2 in Debian 12 Bookworm
This does not work out-of-the-box currently. I saw a bug report that the currently shipped .bpf files are not working with current libbpf (version >1.0). However, here’s how you can compile them yourself.
Continue reading eBPF bypass with Suricata 7.0.2 in Debian 12 BookwormYour site is unable to reach wordpress.org or dokuwiki plugin store through suricata?
I had some trouble with Suricata as an IPS with wordpress and dokuwiki. My wordpress was unable to reach wordpress.org and my dokuwiki was unable to reach the plugin/extension store of dokuwiki. While I’m (still) not sure what exactly is causing this, I found a work-around for it.
Continue reading Your site is unable to reach wordpress.org or dokuwiki plugin store through suricata?Block Bogons with Suricata
I believe in my old blog I’ve shown how to block bogons with iptables and later with nftables. Here’s how to do it with Suricata.
Continue reading Block Bogons with SuricataUpdate to Suricata 7 in Debian 12 Bookworm and VirtIO NICs with af-packet in IPS mode
I found a solution to use two VirtIO NICs together with af-packet in Suricata (2). Also I upgraded my suricata to 7 using backports (1)…
Continue reading Update to Suricata 7 in Debian 12 Bookworm and VirtIO NICs with af-packet in IPS modeCreate a suricata rules file using fail2ban
In my last posts I’ve shown a central syslog which feeds fail2ban, suricata as an intrusion prevention system (IPS) and here is the final piece which feeds suricata with the results of fail2ban by creating a .rules file for suricata-update.
Continue reading Create a suricata rules file using fail2banWorking with suricata
This is a follow up to my last post in which I described how to setup suricata as a IPS which bridges traffic between two interfaces using af-packet (and all that in a virtual machine). Here I’m showing how to work with suricata in general – or rather – how I work with suricata.
Continue reading Working with suricataSetting up Suricata in Debian Bookworm running in KVM with af-packet as IPS
Suricata is a Network Intrusion Detection and Prevention System as well as a Network Security Monitoring engine. For now I am using Suricata as an IPS and here I’ll show you how to set it up.
Continue reading Setting up Suricata in Debian Bookworm running in KVM with af-packet as IPSSetup a central logging instance (and use it to block traffic using fail2ban)
A very light-weight approach for storing logs centralized is by just using rsyslog. My virtual machines all use rsyslog. That rsyslog sends it’s logs to another internal virtual machine which runs rsyslog as well. A fail2ban instance is checking all these logs and sending a block command to the firewalls. Here is how.
Continue reading Setup a central logging instance (and use it to block traffic using fail2ban)