man labrea (Commandes) - Honeypot for incoming IP connection attempts
NAME
labrea - Honeypot for incoming IP connection attempts
SYNOPSIS
labrea [-i --device INTERFACE] [-n --network nnn.nnn.nnn.nnn[/nn]] [-m --mask nnn.nnn.nnn.nnn] [-t --throttle-size BYTES] [-p --max-rate RATE ] [-R --soft-restart] [-r --arp-timeout RATE] [-s --switch-safe] [-h --hard-capture] [-x --disable-capture] [-X --exclude-resolvable-ips] [-P --persist-mode-only] [-a --no-resp-synack] [-H --auto-hard-capture] [-f --no-resp-excluded-ports] [--no-arp-sweep] [--init-file FILE] [-F --bpf-file FILE] [-T --dry-run] [-d --foreground] [-o --log-to-stdout] [-O --log-timestamp-epoch] [-l --log-to-syslog] [-b --log-bandwidth] [-v --verbose] [-q --quiet] [-z --no-nag] [-? --usage --help ] [-V --version] [-I --ip-addr nnn.nnn.nnn.nnn] [-E --my-mac-addr xx:xx:xx:xx:xx:xx] [-D --list-interfaces] [-j --winpcap-dev nn] [--syslog-server nnn.nnn.nnn.nnn] [--syslog-port nnn]
[BPF Filter]
DESCRIPTION
labrea creates virtual machines for unused IP addresses in the specified block of IP addresses. LaBrea sits and listens for ARP "who-has" requests.
When an ARP request for a particular IP goes unanswered for longer than its "rate" setting (default: 3 seconds), labrea crafts an ARP reply that routes all traffic destined for the IP to a "bogus" MAC address. labrea sniffs for TCP/IP traffic sent to that MAC address and then responds to any SYN packet with a SYN/ACK packet that it creates.
OPTIONS
labrea accepts the following options:
- -i --device interface
- By default, labrea uses the first ethernet interface. This forces labrea to use the specified interface.
- -n --network xxx.xxx.xxx.xxx[/nn]
- labrea normally pulls information about the netblock from the IP information assigned to the interface. If labrea is run on an unconfigured interface (one without an assigned IP address), then use this option to specify the subnet to be captured.
xxx.xxx.xxx.xxx is the network address. /nn is the subnet mask in CIDR notation. If the subnet mask is not specified here, then you must include the -m parameter.
- -m --mask xxx.xxx.xxx.xxx
- Another way to specify the network mask for the capture netblock. If this parameter is specified, then the -n parameter must also be specified.
- -t --throttle-size nn
- Sets the TCP window advertisement to limit the amount of data sent to labrea. The number of data bytes to allow per packet is nn bytes.
- -p --max-rate rate
- Connect attempts will be permanently captured by forcing the connection into a "persist" state (by closing the TCP window). In this state, the connection will not time out. labrea will permanently capture connect attempts up to maximum bandwidth rate bytes. If the specified bandwidth is exceeded, labrea will still tarpit the incoming connection (ie respond SYN/ACK to incoming SYN).
- -R --soft-restart
- New captures will be held off for 5 minutes to let bandwidth calculations progress. If a major scan hits just after startup, this prevents labrea from capturing too many connections.
- -r --arp-timeout rate
- Wait rate seconds after seeing incoming arp requests before capturing an IP address.
- -s --switch-safe
- When there is an incoming ARP request, specifies that labrea should send out an ARP request of its own for the same IP address. This is necessary for safe operation in a switched environment where one host does not necessarily see all the traffic on the switch.
- -h --hard-capture
- Once an IP address has been captured, then do not wait for a "-r" timeout for the next incoming ARP request.
- -x --disable-capture
- Do not capture IPs.
- -X --exclude-resolvable-ips
- On startup, attempt DNS resolution on all IPs within the capture netblock. Automatically exclude any IP that has a corresponding entry in the DNS. Be careful because this can generate a lot of DNS lookups if the capture subnet is large.
- -P --persist-mode-only
- Try to limit bandwidth use by doing only persist capturing. Note: This parameter has limited usefulness since below max b/w, the same exchange that leads to persist capture also has the side effect of tarpitting.
- -a --no-resp-synack
- By default, the LaBrea virtual hosts respond to SYN/ACK with RST, and answer Pings. Disables this behaviour.
- -H --auto-hard-capture
- Mark all non-excluded and all non-hardexcluded IPs as being hard captured. See labrea.conf(5) for more information. This parameter should be used with caution.
- -f --no-resp-excluded-ports
- Drop incoming connections to excluded ports. Normal default behaviour is to return a RST. Makes nmap-style scanning go much slower.
- --no-arp-sweep
- On startup, labrea sweeps the capture subnet with bursts of ARP requests in an attempt to locate all live machines. This parameter disables the sweep.
- --init-file file
- Read the configuration from the specified file instead of from the default location.
- -F --bpf-file file
- Designates the name of a file containing a BPF filter pointing to machines/ports to be tarpitted. As with the command line BPF filter, these connections MUST be firewalled to DROP inbound traffic.
- -T --dry-run
- Do labrea initialization, including Dns excludes, parse of the configuration file, opening the network interface etc. Print diagnostic information, then exit.
- -d --foreground
- Do not detach the process. (Unix systems only)
- -o --log-to-stdout
- Send log information to stdout rather than to syslog. This option also implies and sets the -d option (i.e. do not detach process).
- -O --log-timestamp-epoch
- Same as the "-o" option, but with time output in seconds since epoch to make it easier for logfile analysis programs.
- -l --log-to-syslog
- Send log messages to syslog.
- -b --log-bandwidth
- Log a message every minute detailing the current bandwidth consumption of the -p option (persist capture).
- -v --verbose
- Increase the verbosity of log messages. Use twice for more effect.
- -q --quiet
- Do not report arp requests for IPs that are not in the capture subnet.
- -z --no-nag
- Turn off the nag message. Before you do this, read the basic warning in the Notes section just below.
- -? --usage --help
- Print a help message and then exit.
- -V --version
- Print version information and exit.
- -I --ip-addr nnn.nnn.nnn.nnn
- Manually specify the IP address for the labrea server.
- -E --my-mac-addr xx:xx:xx:xx:xx:xx
- Manually specify the MAC address of the labrea server's NIC.
- -D --list-interfaces
- On Windows systems, print the list of WinPcap devices, followed by the list of the libdnet interfaces. Note that each API has a different nomenclature for the underlying NIC.
- -j --winpcap-dev nn
- On windows systems, select the nth winpcap device in the list.
NOTES
Basic Warning about use of labrea
You must understand this: As a default, LaBrea captures IP addresses by creating a "virtual machine" that sits on any UNUSED IP address that it sees. labrea has been carefully written and tested to transparently and peacefully operate in normal production environments but ...
There is a potential for problems if someone decides to start using one of the IP addresses that labrea has laid claim to, or if labrea erroneously decides that an IP address is free when in fact a real machine is already there.
Built-in protections
labrea tries very hard to NEVER capture an IP that has a live machine sitting on it.
The following automatic mechanisms are provided:
- •
- If labrea sees a gratuitous ARP signalling the arrival of a new machine, it marks the corresponding IP address as excluded. ("new kids on the block" logic)
- •
- Each ARP response is noted and the corresponding IP address is marked as excluded.
- •
- At startup, a systematic sweep is done of the entire capture subnet (as long as the subnet is not too big). All IP addresses that respond are marked as excluded.
Then there are ways of manually specifying the exclusion of certain addresses, and otherwise ensuring safe operation:
- •
- The EXC config stmt allows specified IP addresses to be manually excluded from capture.
- •
- The IPI config stmt causes packets with the specified IP source address(es) to be ignored.
- •
- -s --switch-safe parameter causes mirroring of ARP requests in a switched environment
- •
- -X --exclude-resolvable-ips says to exclude all IPs that have a corresponding Dns entry
Traffic rerouting: Despite all this, if labrea somehow receives traffic whose IP destination address belongs to a live machine, labrea will reroute that traffic to the real machine.
Size of the capture subnet
It is best to limit the capture subnet to the actual physical segment (VLAN, hub) where labrea is running.
In some configurations, where proxy arp is being used to determine routing, interface subnet masks can be quite large. (i.e. the "whole" network is "directly" attached to the physical segment).
In this case, if labrea picks up the subnet mask from the interface, then labrea will inefficiently watch addresses that it has no hope of capturing. You should use the -m / -n parameters to manually limit the size of the capture subnet.
Other usage notes
BUGS
EXAMPLES
- 1)
- Run safely in a switched environment with very verbose logging. Don't respond to excluded ports. Log bandwidth usage from persist capturing. Exclude all IPs that are in the Dns. Run in the foreground, and log to stdout. Maximum capture bandwidth is 2 MB/sec. Use toto.conf as the initialisation file. Use network device "eth1" instead of the default device. Do a test run only - parse input, initialize, then exit.
labrea --switch-safe --verbose -v --no-resp-excluded-ports --log-bandwidth --exclude-resolvable-ips --foreground --log-to-stdout --max-rate 2000000 --init-file toto.conf --device eth1 -z --dry-run (one line)
- 2)
- Same thing with the short parameter style.
labrea -z -s -v -v -f -b -X -d -o -p 2000000 --init-file toto.conf -i eth1 -T (one line)
FILES
- /usr/local/etc/labrea.conf
- Default configuration file
- /usr/local/sbin/labrea
- Program
SEE ALSO
AUTHOR
Tom Liston <tliston@hackbusters.net> Bugs: lorgor@users.sourceforge.net or http://labrea.sourceforge.net