IDS mailing list archives
Re: Snort and Nessus Signature
From: Vikram Phatak <vphatak () lucidsecurity com>
Date: Mon, 26 Sep 2005 12:14:51 -0400
I think we got off on the wrong foot. I am not intending to disparage the current snort signature set.
Jason wrote:
I am surprised to hear you say that. I am not saying that Snort signatures are poor. In fact, I am saying that Sourcefire invested a lot of resources to make sure that their signatures are of HIGH quality. However, Sourcefire themselves have seperate signature sets by version so that people get the optimal set for the version they are running. And Snort's signature set was not built from the ground up with correlation to vulnerabilities & VA tools in mind and therefore has some shortcomings that need to be addressed before correlation is a simple matter of cross-referencing data.I did not think that response indicated offense and I am not offended. I though the response was a factual response based on the information I have. Vikram Phatak wrote:Wow. I did not expect that kind of response... I offered to discuss in detail with Crux or anyone else interested. Have I somehow offended you? Jason wrote:Vikram Phatak wrote:How so? Please provide a little more information.Hi Crux, It is not a simple matter to integrate Nessus & Snort since there are quite a few errors in the snort signatures, or in the supporting information for many of the snort signatures (CVE, BID, descriptions,etc.).First, if you look at the non-VRT certified signatures from Snort, or historically at Snort signatures in general, they do not consistently have references, and in many cases needed to be updated to support functions available in newer versions of Snort (like PCRE) that provide better accuracy and lower false positives. Sourcefire recognized this - which is why they rewrote over 1000 signatures (may be more now) which can be purchased as part of their VRT Certifiied signature program.I think it is an absolute injustice to generalize this statement to Snort as a whole. There are many groups that produce snort rules of varying quality but the official snort.org rulesets are not as described.
(I just looked (briefly) for the press release by Sourcefire re: signature QA & updates but was unable to find it. If I find it later I will forward to you.)
Interesting. I have a feeling that SID 2514 is more of an anomaly detection rule than a vulnerability based signature, but I have not examined it yet... I remember at the time that was the case, but my memory may be suspect.Having said that, we have found that there can be multiple CVE entries for the same vulnerability, signatures that have no CVE, multiple nessusplugins that have the same CVE (sometimes correct, sometimes not) etc. You cannot simply assume that everything is correct, and correlateautomatically and expect to have any confidence in your results - whichmeans you need to inspect every single correlation (which takes time).Agreed. There is a lot of room for improvement in the vuln DB space. That there are several reference points for any one issue is problematic. That each reference point handles them differently further complicates this. [...]Also, many snort signatures do not have CVE, BID references since historically they have written based upon packet captures of specific exploits, (such as "Sasser") as opposed to vulnerabilities (LSASS), which is how CVE entries are sorted.Absolutely incorrect. LSASS is the detect method and the rules detect exploitation of a vulnerability not an exploit.Um. Please check your facts. Sourcefire did not provide its VRT service until Feb/March '05, while LSASS vulnerability that the SASSER worm exploited came out in April/May '04. The only signatures publicly available at the time were exploit signatures based upon PCAPs of the different worm variants... Despite any marketing that would have you believe otherwise.Here are your facts. http://securityresponse.symantec.com/avcenter/venc/data/w32.sasser.worm.html - Discovered on: April 30, 2004 [...] http://www.sourcefire.com/services/advisories/sa050204.html [...] released on April 27, 2004, contained SID 2514 that will detect infected hosts attempting to compromise other hosts via the LSASS vulnerability. This rule will generate multiple events due to Sasser worm activity. [...] These rules were in the snort.org set before there was a worm and the rules were quite effective in detecting the worm and variants as well as non worm exploitation attempts. [...]
I agree with that wholeheartedly. It is not an all or nothing situation. More visibility is better than less, etc. I believe very strongly that it is important not to "drink one's own cool-aid" when examining a solution. (I am not saying you are doing that.) I like to get all the facts (good and bad) and make decisions accordingly - Which is why I pointed out some of the faults with correlating using current data sources. It was never my intent to say "Don't do it" but rather to say "Know what the limitations are" so that those limitations can be addressed (as opposed to ignored). Old habits die hard :-)But to your point - assuming 100% accuracy of references and that most eventually point back to something that can be correllated with a Nessus plugin - which 70% are covered? How do I, as an admin, know I am not missing something? There needs to be some examination of effectiveness before simply saying "lets correlate". Or rather, correlate - but audit your results. That was the point of my prior posting.Apologies if I got the context wrong there. The shortcomings of text based interactions. I absolutely agree that there are challenges with the various vuln data sources. IMHO there are no absolutes in security so any correlation done is ultimately additional data that can be taken into account. Even a 10% coverage would provide better value than the current 0% coverage.
We (Lucid Security) have found that it was far more efficient (and reliable) to choose the OS & Application versions that we want to protect (MSFT, Linux, Solaris, Apache, IIS, SQL, etc.) and prioritize accordingly. We then chose the appropriate CVE entries that met the requirements of our "filter" and wrote and tested signatures based upon the vulnerability accordingly. If there was an existing signature that met our requirements, then great! But we found thatwas rarely the case.I take it you are not in the spirit of the community and as such are either selling your wares and saying screw the rest of the community or you are simply spreading FUD. Which is it?Nice. Do you attack Ron or Marty with this kind of nonsense? I am offering advice from experiences that we have gone through and you are asking me if I am saying "screw the community" or "spreading FUD"? It is like asking, "Do you still beat your wife?"Well do you? ;-)
;-)
I am very willing to discuss what has and has not worked for us. As far as the results... I cannot discuss Lucid Security's plans in that area at this time. I'm sorry I cannot say more, but it would be improper for me to do so.I think I addressed this above. Your advice is certainly welcome. Your results are even more welcome. _That_ would be in the spirit of the community. From what I saw you indirectly challenged the quality of the community with incorrect data while promoting your own product as superior. I found your statements to be incorrect. No offense intended.
As far as challenging the quality of the community - that was not my intent. As I said before, many (if not most) signatures were not written with correlation to VA tools in mind. I do not mean to imply any lacking on the part of the community for not doing so, it simply has not been part of the scope for writing an effective signature. As far as the effectiveness of signatures - again it is a moving target with newer versions providing better ways to capture malicious traffic. Writing signatures against the underlying vulnerability is a relatively new practice and not all signatures are written that way. In many cases there is no need to write signatures that way, since nobody is writing attacks against older vulnerabilities (the assumption being that they are patched already).
-Vik -- Vikram Phatak CTO, Lucid Security http://www.lucidsecurity.com ------------------------------------------------------------------------ Test Your IDS Is your IDS deployed correctly?Find out quickly and easily by testing it with real-world attacks from CORE IMPACT. Go to http://www.securityfocus.com/sponsor/CoreSecurity_focus-ids_040708 to learn more.
------------------------------------------------------------------------
Current thread:
- Snort and Nessus Signature cruxiezzzzz (Sep 16)
- Re: Snort and Nessus Signature Jason (Sep 19)
- Re: Snort and Nessus Signature Vikram Phatak (Sep 19)
- Re: Snort and Nessus Signature Michael Sierchio (Sep 21)
- Re: Snort and Nessus Signature Ron Gula (Sep 22)
- Re: Snort and Nessus Signature Olaf Gellert (Sep 26)
- Re: Snort and Nessus Signature Ron Gula (Sep 26)
- Re: Snort and Nessus Signature Michael Sierchio (Sep 21)
- Re: Snort and Nessus Signature Jason (Sep 26)
- Re: Snort and Nessus Signature Vikram Phatak (Sep 26)
- Re: Snort and Nessus Signature Jason (Sep 26)
- Re: Snort and Nessus Signature Vikram Phatak (Sep 26)
- <Possible follow-ups>
- Re: Snort and Nessus Signature barcajax (Sep 16)
- RE: Snort and Nessus Signature Derick Anderson (Sep 16)
