From: Rob M. <rv...@ca...> - 2003-05-06 22:50:00
|
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On Tue, 6 May 2003, danh wrote: > Hi people, > > I am using snort_inline 2.0.0 and it all appears to be functioning > normally (I have iptables set up with the "-j QUEUE" target for all > incoming traffic on port 80, without snort_inline running I get no > connections, with it running my web server sees the requests) but after > extensive testing I can confirm that it is letting through sequences > that "normal" snort will alert on. Can you give some examples of the sequences that are getting through? What rules are you using? As far as the behavior with the QUEUE and no snort_inline running, it is ip_queue's default behavior to drop packets if no process (snort_inline in our case) is not listening to the queue. Also, please download the latest snort_inline-2.0.0-1. > There are a few things that I have noticed that may have a bearing. > > When I used to run normal snort, I started it with the "-i ppp0" command > line option, as that is my external interface. I also had the line "var > HOME_NET [10.0.0.0/8,$ppp0_ADDRESS]" in my conf file. This does not > appear to work for snort_inline. I get an error about undefined variables. snort_inline does not get its packets from an interface therefore, the -i flag will not do much good. Instead, snort_inline gets its packet from the firewall. So if you want to control where snort_inline gets its packets, you have to divert them with the use of -j QUEUE. For example, if I want all of my inbound packets to tcp port 80 on my ppp0 interface to go through snort_inline, I would use the following iptables rule: iptables -A INPUT -i ppp0 -p tcp --dport 80 -m state --state NEW,RELATED,ESTABLISHED -j QUEUE Use connection tracking (state) because it makes iptables reassemble all fragments before it passes them on. > Also when I start up normal snort, during initialisation it reports 1331 > rules active etc.. However, snort_inline says 0 rules activated BUT it > does appear to be applying rules (it caught a WEB-IIS cmd.exe attack). hmm. I don't get the same results. [root@Jiggy src]# ./snort_inline -Qc /etc/snort_inline/snort_inline.new.conf Reading from iptables Running in IDS mode Log directory = /var/log/snort Initializing Inline mode --== Initializing Snort ==-- Initializing Output Plugins! Setting the Packet Processor to decode packets from iptables Initializing Preprocessors! Initializing Plug-ins! Parsing Rules file /etc/snort_inline/snort_inline.new.conf +++++++++++++++++++++++++++++++++++++++++++++++++++ Initializing rule chains... http_decode arguments: Unicode decoding IIS alternate Unicode decoding IIS double encoding vuln Flip backslash to slash Include additional whitespace separators Ports to decode http on: 80 rpc_decode arguments: Ports to decode RPC on: 111 32771 alert_fragments: INACTIVE alert_large_fragments: ACTIVE alert_incomplete: ACTIVE alert_multiple_requests: ACTIVE telnet_decode arguments: Ports to decode telnet on: 21 23 25 119 Conversation Config: KeepStats: 0 Conv Count: 32000 Timeout : 60 Alert Odd?: 0 Allowed IP Protocols: All 1369 Snort rules read... 1369 Option Chains linked into 113 Chain Headers 0 Dynamic rules +++++++++++++++++++++++++++++++++++++++++++++++++++ Rule application order: - ->activation->dynamic->drop->sdrop->reject->alert->pass->log --== Initialization Complete ==-- ******************* snort_inline-2.0.0-1 ******************* a modification of ... - -*> Snort! <*- Version 2.0.0 (Build 72) By Martin Roesch (ro...@so..., www.snort.org) > The reason I am using snort_inline is that I am trying to get a true > count of web site hits, but I am getting so many "code red" attempts it > is distorting the figures. So I was trying to drop the connections > before they even get to the web server. I know that there are issues > with detecting code red attacks (no established flag etc) but I can > handle that. Cool! and thanks for the feedback. Rob -----BEGIN PGP SIGNATURE----- Version: PGP 6.5.8 Comment: Made with pgp4pine 1.76 iQA/AwUBPrg76/nAyY+9KLjdEQKg0QCgmB/HVkyY8MQ97KvvrHVuGbsqbrIAnipc MOz0JB2jIP91svUjKZ9nnTis =Jg53 -----END PGP SIGNATURE----- |