Snort mailing list archives
Results of a quick comparison of three Snort sensors
From: "Crow, Owen" <Owen_Crow () bmc com>
Date: Thu, 10 Jan 2002 00:48:27 -0600
I've got two almost-completely identical PC's running Redhat and FreeBSD and
a Sun Blade 100 all connected to a 3com 10/100 hub. All have identical
configuration files and other than the inteface to use (-i option), they
have exactly the same command line options (/usr/local/bin/snort -c
/etc/snort/snort.conf -l /var/log/snort -u snort -g snort -i
(eth0|xl0|qfe0)).
I ran them for 6 hours from 18:00 to 00:00 today and here are the packet
counts:
Redhat: Snort analyzed 140077999 out of 236121334 packets, dropping
96043335(40.675%) packets
FreeBSD: Snort analyzed 140084599 out of 202320613 packets, dropping
62236014(30.761%) packets
Solaris: Snort analyzed 34207325 out of 34207325 packets, dropping 0(0.000%)
packets
I definitely expected better performance of the Sun with the qfe, but I
didn't expect it to miss the dropped packet counts. I'll have a look at the
code tomorrow to see if this is known. I hooked the Blade up as a "control"
to get an accurate count of packets, but I was definitely surprised.
I applogize for the lack of extra info, but I wanted to get this published
since I promised it early this week. Let me know any other info you'd like
to know.
Regards,
Owen
Here's the program output for each with more info about each sensor:
===========================================================
Redhat:
HP Kayak XA (300MHz, 64MB, 3Com 905)
Redhat Linux 7.2 with patches (2.4.7, no kernel tweaks or changes)
libpcap 0.6.2 with patch applied to collect drop statistics (thanks to Phil
Wood)
snort 1.8.3 (no extra output plugins just alert_fast and binary)
===========================================================
Initializing Network Interface eth0
WARNING: OpenPcap() device eth0 network lookup:
eth0: no IPv4 address assigned
--== Initializing Snort ==--
Decoding Ethernet on interface eth0
Parsing Rules file /etc/snort/snort.conf
Initializing Preprocessors!
Initializing Plug-ins!
Initializating Output Plugins!
+++++++++++++++++++++++++++++++++++++++++++++++++++
Initializing rule chains...
Back Orifice detection brute force: DISABLED
Stream4 config:
Stateful inspection: ACTIVE
Session statistics: INACTIVE
Session timeout: 30 seconds
Session memory cap: 8388608 bytes
State alerts: INACTIVE
Scan alerts: ACTIVE
Log Flushed Streams: INACTIVE
No arguments to stream4_reassemble, setting defaults:
Reassemble client: ACTIVE
Reassemble server: INACTIVE
Reassemble ports: 21 23 25 53 80 143 110 111 513
Reassembly alerts: ACTIVE
No arguments to frag2 directive, setting defaults to:
Fragment timeout: 60 seconds
Fragment memory cap: 4194304 bytes
ProcessFileOption: /var/log/snort/alert.fast
--== Initialization Complete ==--
-*> Snort! <*-
Version 1.8.3 (Build 88)
By Martin Roesch (roesch () sourcefire com, www.snort.org)
ICMP Unreachable IP short header (1 bytes)
============================================================================
===
Snort analyzed 140077999 out of 236121334 packets, dropping
96043335(40.675%) packets
Breakdown by protocol: Action Stats:
TCP: 39085304 (16.553%) ALERTS: 46
UDP: 3602964 (1.526%) LOGGED: 1
ICMP: 1251105 (0.530%) PASSED: 0
ARP: 42231 (0.018%)
IPv6: 0 (0.000%)
IPX: 881 (0.000%)
OTHER: 50327 (0.021%)
DISCARD: 0 (0.000%)
============================================================================
===
Fragmentation Stats:
Fragmented IP Packets: 6347 (0.003%)
Fragment Trackers: 5998
Rebuilt IP Packets: 4668
Frag elements used: 5133
Discarded(incomplete): 0
Discarded(timeout): 5800
Frag2 memory faults: 0
============================================================================
===
TCP Stream Reassembly Stats:
TCP Packets Used: 39083574 (16.552%)
Stream Trackers: 1243193
Stream flushes: 48882
Segments used: 137473
Stream4 Memory Faults: 0
============================================================================
===
893 Snort rules read...
893 Option Chains linked into 814 Chain Headers
0 Dynamic rules
+++++++++++++++++++++++++++++++++++++++++++++++++++
Rule application order: ->activation->dynamic->alert->pass->log
Snort received signal 15, exiting
================================================================
FreeBSD:
HP Kayak XA (300MHz, 64MB, 3Com 905)
FreeBSD-4.4 (upgraded to FREEBSD-4-STABLE, applied some kernel tweaks
provided on request)
libpcap 0.6.? as supplied by FreeBSD in /usr/src/contrib/libpcap
snort 1.8.3 (no extra output plugins)
================================================================
Log directory = /var/log/snort
Initializing Network Interface xl0
WARNING: OpenPcap() device xl0 network lookup:
xl0: no IPv4 address assigned
--== Initializing Snort ==--
Decoding Ethernet on interface xl0
Parsing Rules file /etc/snort/snort.conf
Initializing Preprocessors!
Initializing Plug-ins!
Initializating Output Plugins!
+++++++++++++++++++++++++++++++++++++++++++++++++++
Initializing rule chains...
Back Orifice detection brute force: DISABLED
Stream4 config:
Stateful inspection: ACTIVE
Session statistics: INACTIVE
Session timeout: 30 seconds
Session memory cap: 8388608 bytes
State alerts: INACTIVE
Scan alerts: ACTIVE
Log Flushed Streams: INACTIVE
No arguments to stream4_reassemble, setting defaults:
Reassemble client: ACTIVE
Reassemble server: INACTIVE
Reassemble ports: 21 23 25 53 80 143 110 111 513
Reassembly alerts: ACTIVE
No arguments to frag2 directive, setting defaults to:
Fragment timeout: 60 seconds
Fragment memory cap: 4194304 bytes
ProcessFileOption: /var/log/snort/alert.fast
--== Initialization Complete ==--
-*> Snort! <*-
Version 1.8.3 (Build 88)
By Martin Roesch (roesch () sourcefire com, www.snort.org)
ICMP Unreachable IP short header (1 bytes)
============================================================================
===
Snort analyzed 140084599 out of 202320613 packets, dropping
62236014(30.761%) packets
Breakdown by protocol: Action Stats:
TCP: 71686782 (35.432%) ALERTS: 340
UDP: 4758040 (2.352%) LOGGED: 6
ICMP: 1258944 (0.622%) PASSED: 0
ARP: 42296 (0.021%)
IPv6: 0 (0.000%)
IPX: 1294 (0.001%)
OTHER: 83273 (0.041%)
DISCARD: 0 (0.000%)
============================================================================
===
Fragmentation Stats:
Fragmented IP Packets: 32673 (0.016%)
Fragment Trackers: 9382
Rebuilt IP Packets: 14844
Frag elements used: 56497
Discarded(incomplete): 0
Discarded(timeout): 2541
Frag2 memory faults: 0
============================================================================
===
TCP Stream Reassembly Stats:
TCP Packets Used: 71685218 (35.431%)
Stream Trackers: 1217778
Stream flushes: 69024
Segments used: 180522
Stream4 Memory Faults: 0
============================================================================
===
893 Snort rules read...
893 Option Chains linked into 814 Chain Headers
0 Dynamic rules
+++++++++++++++++++++++++++++++++++++++++++++++++++
Rule application order: ->activation->dynamic->alert->pass->log
Snort received signal 15, exiting
================================================================
Solaris:
Sun Blade 100 (?MHz, 2048Mb, qfe card)
Solaris 8 with recommended patch bundle (no kernel tweaks)
libpcap 0.6.2 (compiled locally)
snort 1.8.3 (no extra output plugins)
================================================================
Log directory = /var/log/snort
Initializing Network Interface qfe0
--== Initializing Snort ==--
Decoding Ethernet on interface qfe0
Parsing Rules file /etc/snort/snort.conf
Initializing Preprocessors!
Initializing Plug-ins!
Initializating Output Plugins!
+++++++++++++++++++++++++++++++++++++++++++++++++++
Initializing rule chains...
Back Orifice detection brute force: DISABLED
Stream4 config:
Stateful inspection: ACTIVE
Session statistics: INACTIVE
Session timeout: 30 seconds
Session memory cap: 8388608 bytes
State alerts: INACTIVE
Scan alerts: ACTIVE
Log Flushed Streams: INACTIVE
No arguments to stream4_reassemble, setting defaults:
Reassemble client: ACTIVE
Reassemble server: INACTIVE
Reassemble ports: 21 23 25 53 80 143 110 111 513
Reassembly alerts: ACTIVE
No arguments to frag2 directive, setting defaults to:
Fragment timeout: 60 seconds
Fragment memory cap: 4194304 bytes
ProcessFileOption: /var/log/snort/alert.fast
--== Initialization Complete ==--
-*> Snort! <*-
Version 1.8.3 (Build 88)
By Martin Roesch (roesch () sourcefire com, www.snort.org)
ICMP Unreachable IP short header (1 bytes)
============================================================================
===
Snort analyzed 34207325 out of 34207325 packets, dropping 0(0.000%) packets
Breakdown by protocol: Action Stats:
TCP: 31727373 (92.750%) ALERTS: 379
UDP: 1911268 (5.587%) LOGGED: 4
ICMP: 505738 (1.478%) PASSED: 0
ARP: 16755 (0.049%)
IPv6: 0 (0.000%)
IPX: 546 (0.002%)
OTHER: 36560 (0.107%)
DISCARD: 0 (0.000%)
============================================================================
===
Fragmentation Stats:
Fragmented IP Packets: 12661 (0.037%)
Fragment Trackers: 5019
Rebuilt IP Packets: 3576
Frag elements used: 9577
Discarded(incomplete): 0
Discarded(timeout): 3398
Frag2 memory faults: 0
============================================================================
===
TCP Stream Reassembly Stats:
TCP Packets Used: 31075118 (90.843%)
Stream Trackers: 995807
Stream flushes: 19159
Segments used: 34286
Stream4 Memory Faults: 0
============================================================================
===
893 Snort rules read...
893 Option Chains linked into 814 Chain Headers
0 Dynamic rules
+++++++++++++++++++++++++++++++++++++++++++++++++++
Rule application order: ->activation->dynamic->alert->pass->log
Snort received signal 15, exiting
_______________________________________________
Snort-users mailing list
Snort-users () lists sourceforge net
Go to this URL to change user options or unsubscribe:
https://lists.sourceforge.net/lists/listinfo/snort-users
Snort-users list archive:
http://www.geocrawler.com/redir-sf.php3?list=snort-users
Current thread:
- Results of a quick comparison of three Snort sensors Crow, Owen (Jan 09)
