Security Incidents mailing list archives
Re: Using NBAR to stop your users from geting Nimda from a web page
From: Jeff Kell <jeff-kell () utc edu>
Date: Sun, 23 Sep 2001 15:59:44 -0400
Trevor wrote:
One thing to keep in mind if using the ACL from that page... They
suggest using:
access-list 105 deny ip any any dscp 1 log
access-list 105 permit ip any any
Denying all ip will knock down any packets that have your regex
strings in it. Doing a search on Google for "cmd.exe" will hang as it
tries to return the results of your search :) Also, any email
discussion (like this one) that has "readme.eml" in it will be denied.
I changed mine to:
Extended IP access list 153
deny tcp any any eq www dscp 1 log (6012 matches)
permit ip any any (228200 matches)
This will only filter incoming www traffic.
A couple of comments on the Cisco recommendations - the filter checks
for several variants of .ida files, immediately followed by a *.ida,
which makes the previous ones superfluous.
And while restricting your deny to 'any any eq www dscp 1' helps some,
there are some legitimate packets that arrive with (the equivalent of)
dscp set to 1. Would suggest you change the policy filter to add on at
the end:
class class-default
set dscp 0 (or whatever value other than 1)
I have had some slightly confusing discrepancies between the packet
counts of 'sho policy int' versus the access-list 105 hits, even after
the above changes. The most reliable way to do the filtering is by
using the policing method on the ingress interface(s). I've placed the
policing version on the edge routers and the "mark and deny" method on
the border router behind them. Nothing leaked through, but not sure
how many false positives we might have blocked. NBAR still seems to be
a bit of magic with a touch of evil voodoo :-) (IOS 12.2(3) by the
way).
Also, is anyone using this on a 75xx series Cisco with dCEF? I've heard from a few people that they are only able to filter some of the traffic.
Not me, I checked figures for the image and it wants 20Mb flash and 128Mb RAM, both of which exceed our old 7505 RSP1s capacity. Besides, doesn't it only work on VIP interfaces? Jeff Kell <jeff-kell () utc edu> Systems/Network Administrator University of Tennessee at Chattanooga PS - While I have a mail in progress, anybody else seeing RFC1918 addressed packets to port 80? We're getting a ton of them, but they are blocked by our ingress filter, so I don't have any details on what sort of requests they are (don't have a sniffer that can sit on the T1s and don't want to remove the filter just to sniff, though I may have to if this persists). ---------------------------------------------------------------------------- This list is provided by the SecurityFocus ARIS analyzer service. For more information on this free incident handling, management and tracking system please see: http://aris.securityfocus.com
Current thread:
- Using NBAR to stop your users from geting Nimda from a web page Antonio Vasconcelos (Sep 22)
- Re: Using NBAR to stop your users from geting Nimda from a web page Trevor (Sep 23)
- Re: Using NBAR to stop your users from geting Nimda from a web page Jeff Kell (Sep 24)
- Message not available
- Re: Using NBAR to stop your users from geting Nimda from a web page Antonio Vasconcelos (Sep 24)
- Re: Using NBAR to stop your users from geting Nimda from a web page Trevor (Sep 23)
