Snort mailing list archives

Snort and Guardian


From: Michele Sibau <michele () sede civibank it>
Date: Wed, 10 Oct 2001 12:40:34 +0200

Hallo,
        excuse me if i'm boring you with my question...
        the problem is that i can't make Guardian work for me
        i can't understand how to produce the snort.alert file
        i can get only a 0917@1055-snort.alert file but guardian doesn't
work(i've also tried to rename it but... )
        can you give me some ideas ?
        thank you very much since now for your patience !
        Michele

        I'm using snort Version 1.8.1-RELEASE (Build 74)
        and Guardian with this lines in the conf file..

        # Snort's alert file.
        alertFile       /var/log/snort/snort.alert

        the /var/log/snort looks like this
        0816 () 1309-snort log  0820 () 1321-snort log
0822 () 1214-snort log     portscan.log
        0817 () 0940-snort log  0821 () 0816-snort log  0822 () 1700-snort log
        0817 () 1706-snort log  0821 () 0930-snort log  0822 () 1701-snort log
        0820 () 1128-snort log  0821 () 1018-snort log  0917@1055-snort.alert
        0820 () 1250-snort log  0822 () 0941-snort log  0917 () 1055-snort log

        due the snort conf file

        #-------------------------------------------------
        #   http://www.snort.org     Snort 1.8.0 Ruleset
        #     Contact: snort-sigs () lists sourceforge net
        #--------------------------------------------------
        # NOTE:This ruleset only works for 1.8.0 and later
        #--------------------------------------------------
        # $Id: snort.conf,v 1.62 2001/08/12 04:31:01 roesch Exp $
        #
        ###################################################
        # This file contains a sample snort configuration.
        # You can take the following steps to create your
        # own custom configuration:
        #
        #  1) Set the network variables for your network
        #  2) Configure preprocessors
        #  3) Configure output plugins
        #  4) Customize your rule set
        #
        ###################################################
        # Step #1: Set the network variables:
        #
        # You must change the following variables to reflect
        # your local network. The variable is currently
        # setup for an RFC 1918 address space.
        #
        # You can specify it explicitly as:
        #
        # var HOME_NET 10.1.0.0/24
        #
        # or use global variable $<interfacename>_ADDRESS
        # which will be always initialized to IP address and
        # netmask of the network interface which you run
        # snort at.
        #
        # var HOME_NET $eth0_ADDRESS
        #
        # You can specify lists of IP addresses for HOME_NET
        # by separating the IPs with commas like this:
        #
        # var HOME_NET 10.1.0.0/24]
        #
        # MAKE SURE YOU DON'T PLACE ANY SPACES IN YOUR LIST!
        #
        # or you can specify the variable to be any IP address
        # like this:

        var HOME_NET any

        # Set up the external network addresses as well.
        # A good start may be "any"

        var EXTERNAL_NET any

        # Set up your SMTP servers, or simply configure them
        # to HOME_NET

        var SMTP $HOME_NET

        # Set up your web servers, or simply configure them
        # to HOME_NET

        var HTTP_SERVERS $HOME_NET

        # Set up your sql servers, or simply configure them
        # to HOME_NET

        var SQL_SERVERS $HOME_NET

  # Define the addresses of DNS servers and other hosts
  # if you want to ignore portscan false alarms from them...

        var DNS_SERVERS $HOME_NET

        ###################################################
        # Step #2: Configure preprocessors
        #
        # General configuration for preprocessors is of
        # the form
        # preprocessor <name_of_processor>: <configuration_options>

        # minfrag: detect small fragments
        # -------------------------------
        # minfrag has been deprecated as of build 26

        # defrag: defragmentation support
        # -------------------------------
        # IP defragmentation support from Dragos Ruiu. There
        # are no configuration options at this time.

        #preprocessor defrag
        preprocessor frag2

        # stream2: TCP stream reassembly
        # -------------------------------------
        # TCP stream reassembly preprocessor from Chris Cramer.
        # This preprocessor should always go after the defrag
        # preprocessor, but before application layer decoders.
        # The example below monitors ports 23 and 80, has a
        # timeout after 10 seconds, and will send reassembled
        # packets of max payload 16384 bytes through the
        # detection engine. See README.tcpstream for more
        # information and configuration options. Uncomment
        # the following line and configure appropriately to
        # enable this preprocessor.
        #
        # NOTE: This code should still be considered BETA!
        # It seems to be stable, but there are still some
        # issues that remain to be resolved, so make sure you
        # keep an eye on your Snort sensor if you enable this plugin
        # The older version which definitely had issues w/ packet
        # loss is still in the code base, to use it in place of the
        # new version, use "preprocessor stream: ..."

        #preprocessor stream2: timeout 10, ports 21 23 80 110 143,
maxbytes 16384

        # stream4: stateful inspection/stream reassembly for Snort

#----------------------------------------------------------------------
        # Use in concert with the -z [all|est] command line switch to
defeat
        # stick/snot against TCP rules.  Also performs full TCP stream
        # reassembly, stateful inspection of TCP streams, etc.  Can
statefully
        # detect various portscan types, fingerprinting, ECN, etc.

        # stateful inspection directive
        # no arguments loads the defaults (timeout 30, memcap 8MB)
        # options (options are comma delimited):
        #   detect_scans - stream4 will detect stealth portscans and
generate alerts
        #                  when it sees them when this option is set
        #   detect_state_problems - detect TCP state problems, this
tends to be very
        #                           noisy because there are a lot of
crappy ip stack
        #                           implementations out there
        #   keepstats [machine] - keep session statistics, add "machine"
to get them in
        #                         a flat format for machine reading
        #   noinspect - turn off stateful inspection only
        #   timeout [number] - set the session timeout counter to
[number] seconds,
        #                      default is 30 seconds
        #   memcap [number] - limit stream4 memory usage to [number]
bytes

        preprocessor stream4: detect_scans

        # tcp stream reassembly directive
        # no arguments loads the default configuration (clientonly,
ports default,
        # alerts on)
        # options (still comma delimited):
        #   clientonly - reassemble traffic for the client side of a
connection only
        #   serveronly - reassemble traffic for the server side of a
connection only
        #   both - reassemble both sides of a session
        #   noalerts - turn off alerts from the stream reassembly stage
of stream4
        #   ports [list] - use the space separated list of ports in
[list], "all"
        #                  will turn on reassembly for all ports,
"default" will turn
        #                  on reassembly for ports 21, 23, 25, 53, 80,
143, 110, 111
        #                  and 513

        preprocessor stream4_reassemble

        # http_decode: normalize HTTP requests
        # ------------------------------------
        # http_decode normalizes HTTP requests from remote
        # machines by converting any %XX character
        # substitutions to their ASCII equivalent. This is
        # very useful for doing things like defeating hostile
        # attackers trying to stealth themselves from IDSs by
        # mixing these substitutions in with the request.
        # Specify the port numbers you want it to analyze as arguments.
        # You may also specify -unicode to turn off detection of
        # UNICODE directory traversal, etc attacks.  Use -cginull to
        # turn off detection of CGI NULL code attacks.

        preprocessor http_decode: 80 -unicode -cginull

        # unidecode: normalize HTTP/detect UNICODE attacks
        # ------------------------------------------------
        # Works much the same as http_decode, but does a better
        # job of categorizing and identifying UNICODE attacks,
        # recommended as a potential replacement for http_decode.

        # preprocessor unidecode: 80 -unicode -cginull

        # rpc_decode: normalize RPC traffic
        # ---------------------------------
        # RPC may be sent in alternate encodings besides the usual
        # 4-byte encoding that is used by default.  This preprocessor
        # normalized RPC traffic in much the same way as the http_decode

        # preprocessor.  This plugin takes the ports numbers that RPC
        # services are running on as arguments.

        preprocessor rpc_decode: 111

        # bo: Back Orifice detector
        # -------------------------
        # Detects Back Orifice traffic on the network.  This
preprocessor
        # uses the Back Orifice "encryption" algorithm to search for
        # traffic conforming to the Back Orifice protocol (not BO2K).
        # This preprocessor can take two arguments.  The first is
"-nobrute"
        # which turns off the plugin's brute forcing routine (brute
forces
        # the key space of the protocol to find BO traffic).  The second

        # argument that can be passed to the routine is a number to use
        # as the default key when trying to decrypt the traffic.  The
        # default value is 31337 (just like BO).  Be aware that turning
on
        # the brute forcing option runs the risk of impacting the
overall
        # performance of Snort, you've been warned...

        preprocessor bo: -nobrute

        # telnet_decode: Telnet negotiation string normalizer
        # ---------------------------------------------------
        # This preprocessor "normalizes" telnet negotiation strings from

        # telnet and ftp traffic.  It works in much the same way as the
        # http_decode preprocessor, searching for traffic that breaks up

        # the normal data stream of a protocol and replacing it with
        # a normalized representation of that traffic so that the
"content"
        # pattern matching keyword can work without requiring
modifications.
        # This preprocessor requires no arguments.

        preprocessor telnet_decode

        # portscan: detect a variety of portscans
        # ---------------------------------------
        # portscan preprocessor by Patrick Mullen <p_mullen () linuxrc net>

        # This preprocessor detects UDP packets or TCP SYN packets going
to
        # four different ports in less than three seconds. "Stealth" TCP

        # packets are always detected, regardless of these settings.

        preprocessor portscan: $HOME_NET 4 3 portscan.log

        # Use portscan-ignorehosts to ignore TCP SYN and UDP "scans"
from
        # specific networks or hosts to reduce false alerts. It is
typical
        # to see many false alerts from DNS servers so you may want to
        # add your DNS servers here. You can all multiple hosts/networks

        # in a whitespace-delimited list.
        #
        #preprocessor portscan-ignorehosts: $DNS_SERVERS

        # Spade: the Statistical Packet Anomaly Detection Engine
        #-------------------------------------------------------
        # READ the README.Spade file before using this plugin!
        #
        # See http://www.silicondefense.com/spice/ for more info
        #
        # Spade is a Snort plugin to report unusual, possibly
        # suspicious, packets. Spade will review the packets
        # received by Snort, find those of interest (TCP SYNs
        # into your homenets, if any), and report those packets
        # that it believes are anomalous along with an anomaly
        # score.  To enable spp_anomsensor, you must have a
        # line of this form in your snort configuration file:
        #
        # preprocessor spade: <anom-report-thresh> <state-file>
        # <log-file> <prob-mode> <checkpoint-freq>
        #
        # set this to a directory Spade can read and write to
        # store its files
        #
        # var SPADEDIR .
        #
        # preprocessor spade: -1 $SPADEDIR/spade.rcv $SPADEDIR/log.txt 3
50000
        #
        # put a list of the networks you are interested in Spade
observing packets
        # going to here
        #
        # preprocessor spade-homenet: 0.0.0.0/0
        #
        # this causes Spade to adjust the reporting threshold
automatically
        # the first argument is the target rate of alerts for normal
circumstances
        # (0.01 = 1% or you can give it an hourly rate) after the first
hour (or
        # however long the period is set to in the second argument), the
reporting
        # threshold given above is ignored you can comment this out to
have the
        # threshold be static, or try one of the other adapt methods
below
        # preprocessor spade-adapt3: 0.01 60 168
        #
        # other possible Spade config lines:
        # adapt method #1
        #preprocessor spade-adapt: 20 2 0.5
        # adapt method #2
        #preprocessor spade-adapt2: 0.01 15 4 24 7
        # offline threshold learning
        #preprocessor spade-threshlearn: 200 24
        # periodically report on the anom scores and count of packets
seen
        #preprocessor spade-survey:  $SPADEDIR/survey.txt 60
        # print out known stats about packet feature
        #preprocessor spade-stats: entropy uncondprob condprob

        # arpspoof
        #----------------------------------------
        # Experimental ARP detection code from Jeff Nathan, detects ARP
attacks,
        # directed ARP requests, and specific ARP mapping monitoring.
Takes a
        # "-directed" option to turn on directed ARP request detection.

        # preprocessor arpspoof


####################################################################
        # Step #3: Configure output plugins
        #
        # Uncomment and configure the output plugins you decide to use.
        # General configuration for output plugins is of the form:
        #
        # output <name_of_plugin>: <configuration_options>
        #
        # alert_syslog: log alerts to syslog
        # ----------------------------------
        # Use one or more syslog facilities as arguments

        output alert_syslog: LOG_AUTH LOG_ALERT

        # log_tcpdump: log packets in binary tcpdump format
        # -------------------------------------------------
        # The only argument is the output file name.
        #
        # output log_tcpdump: snort.log

        # database: log to a variety of databases
        # ---------------------------------------
        # See the README.database file for more information about
configuring
        # and using this plugin.
        #
        # output database: log, mysql, user=root password=test dbname=db
host=localhost
        # output database: alert, postgresql, user=snort dbname=snort
        # output database: log, unixodbc, user=snort dbname=snort
        # output database: log, mssql, dbname=snort user=snort
password=test

        # xml: xml logging
        # ----------------
        # See the README.xml file for more information about configuring

        # and using this plugin.
        #
        # output xml: log, file=/var/log/snortxml

        # unified: Snort unified binary format alerting and logging
        # -------------------------------------------------------------
        # The unified output plugin provides two new formats for logging

        # and generating alerts from Snort, the "unified" format.  The
        # unified format is a straight binary format for logging data
        # out of Snort that is designed to be fast and efficient.  Used
        # with the upcoming tool "barnyard", most of the overhead for
        # logging and alerting to various slow storage mechanisms such
        # as databases or the network can now be avoided.
        #
        # Check out the spo_unified.h file for the data formats.
        #
        output alert_unified: snort.alert
        output log_unified: snort.log

        # trap_snmp: SNMP alerting for Snort
        # -------------------------------------------------------------
        # Read the README-SNMP file for more information on enabling and
using this
        # plug-in.
        #
        #
        # The SnmpTrapGenerator outputplugin requires several parameters

        # The parameters depend on the Snmpversion that is used
(specified)
        # For the SNMPv2c case the paremeters will be as follows
        #  alert, <sensorID>, {trap|inform} -v <SnmpVersion> -p
<portNumber>
        #         <hostName> <community>
        #
        # For SNMPv2c traps
        #
        #output trap_snmp: alert, 7, trap -v 2c -p 162  myTrapListener
myCommunity
        #
        # For SNMPv2c informs

        #output trap_snmp: alert, 7, inform -v 2c -p 162  myTrapListener
myCommunity
        #
        # For SNMPv3 traps with
        # security name = snortUser
        # security level = authentication and privacy
        # authentication parameters :
        #           authentication protocol = SHA ,
        #           authentication pass phrase = SnortAuthPassword
        # privacy (encryption) parameters
        #           privacy protocol = DES,
        #           privacy pass phrase = SnortPrivPassword
        #
        #output trap_snmp: alert, 7, trap -v 3 -p 162 -u snortUser -l
authPriv -a SHA -A SnortAuthPassword -x DES -X SnortPrivPassword
myTrapListener
        #For SNMPv3 informs with authentication and encryption
        #output trap_snmp: alert, 7, inform -v 3 -p 162 -u snortUser -l
authPriv -a SHA -A SnortAuthPassword -x DES -X SnortPrivPassword
        myTrapListener

        # You can optionally define new rule types and associate one or
        # more output plugins specifically to that type.
        #
        # This example will create a type that will log to just tcpdump.

        # ruletype suspicious
        # {
        #   type log
        #   output log_tcpdump: suspicious.log
        # }
        #
        # EXAMPLE RULE FOR SUSPICIOUS RULETYPE:
        # suspicious $HOME_NET any -> $HOME_NET 6667 (msg:"Internal IRC
Server";)
        #
        # This example will create a rule type that will log to syslog
        # and a mysql database.
        # ruletype redalert
        # {
        #   type alert
        #   output alert_syslog: LOG_AUTH LOG_ALERT
        #   output database: log, mysql, user=snort dbname=snort
host=localhost
        # }
        #
        # EXAMPLE RULE FOR REDALERT RULETYPE
        # redalert $HOME_NET any -> $EXTERNAL_NET 31337 (msg:"Someone is
being LEET"; \
        #   flags:A+;)

        #
        # Include classification & priority settings
        #

        include classification.config


####################################################################
        # Step #4: Customize your rule set
        #
        # Up to date snort rules are available at the following web
sites:
        #   http://www.snort.org
        #   http://www.whitehats.com
        #
        # The snort web site has documentation about how to
        # write your own custom snort rules.
        #
        # The rules included with this distribution generate alerts
based on
        # on suspicious activity. Depending on your network environment,
your
        # security policies, and what you consider to be suspicious,
some of
        # these rules may either generate false positives ore may be
detecting
        # activity you consider to be acceptable; therefore, you are
        # encouraged to comment out rules that are not applicable in
your
        # environment.
        #
        # Note that using all of the rules at the same time may lead to
        # serious packet loss on slower machines. YMMV, use with
caution,
        # standard disclaimers apply. :)
        #
        # The following individuals contributed many of rules in this
        # distribution.
        #
        # Credits:
        #   Ron Gula <rgula () securitywizards com> of Network Security
Wizards
        #   Max Vision <vision () whitehats com>
        #   Martin Markgraf <martin () mail du gtn com>
        #   CyberPsychotic <fygrave () tigerteam net>
        #   Nick Rogness <nick () rapidnet com>
        #   Jim Forster <jforster () rapidnet com>
        #   Scott McIntyre <scott () whoi edu>
        #   Tom Vandepoel <Tom.Vandepoel () ubizen com>
        #   Brian Caswell <bmc () mitre org>

        #=========================================
        # Include all relevant rulesets here
        # by default policy, info, and virus
        # rulesets are disabled
        #=========================================
        include exploit.rules
        include scan.rules
        include finger.rules
        include ftp.rules
        include telnet.rules
        include smtp.rules
        include rpc.rules
        include rservices.rules
        include backdoor.rules
        include dos.rules
        include ddos.rules
        include dns.rules
        include netbios.rules
        include web-cgi.rules
        include web-coldfusion.rules
        include web-frontpage.rules
        include web-iis.rules
        include web-misc.rules
        include sql.rules
        include x11.rules
        include icmp.rules
        include shellcode.rules
        include misc.rules
        include policy.rules
        include info.rules
        include icmp-info.rules
        include virus.rules
        include local.rules



_______________________________________________
Snort-users mailing list
Snort-users () lists sourceforge net
Go to this URL to change user options or unsubscribe:
https://lists.sourceforge.net/lists/listinfo/snort-users
Snort-users list archive:
http://www.geocrawler.com/redir-sf.php3?list=snort-users


Current thread: