-
-
Notifications
You must be signed in to change notification settings - Fork 510
monitor method ebpf
Since v1.4.0 the default process monitor method is eBPF.
eBPF is a revolutionary technology with origins in the Linux kernel that can run sandboxed programs in an operating system kernel. It is used to safely and efficiently extend the capabilities of the kernel without requiring to change kernel source code or load kernel modules.
When this method is used, we load an eBPF module (similar to a kernel module) that hooks some kernel functions in order to read and get the parameters (source IP, destination, IP, etc).
https://github.com/evilsocket/opensnitch/tree/master/ebpf_prog
This technology allow us to intercept processes faster and in a more secure way. ProcFS is easier to fool:
- https://github.com/gianlucaborello/libprocesshider
- https://xcellerator.github.io/posts/linux_rootkits_06/
- https://xcellerator.github.io/posts/linux_rootkits_07/
- https://xcellerator.github.io/posts/linux_rootkits_08/
We can also intercept connections initiated from kernel space, like those initiated by rootkits or VPNs:
WireGuard connection:
Read more:
- https://www.brendangregg.com/blog/2019-01-01/learn-ebpf-tracing.html
- https://blog.cloudflare.com/cloudflare-architecture-and-how-bpf-eats-the-world/
- https://thenewstack.io/how-ebpf-turns-linux-into-a-programmable-kernel/
- https://netflixtechblog.com/how-netflix-uses-ebpf-flow-logs-at-scale-for-network-insight-e3ea997dca96?gi=89c7bb8b4054
- https://blog.cloudflare.com/l4drop-xdp-ebpf-based-ddos-mitigations/
Please help us make this wiki better.
How to submit changes: https://github.com/evilsocket/opensnitch/blob/wiki/README.md
- Installation
- Getting started
- Configuration
- Compilation
- GUI translations
- FAQs and common errors
- Examples OpenSnitch in action