Snort mailing list archives
RE: flags
From: Erek Adams <erek () theadamsfamily net>
Date: Sun, 9 Jun 2002 13:18:54 -0700 (PDT)
On Sun, 9 Jun 2002, James Ashton wrote:
I am building a new, faster box to run on this network. I am basicaly learning with this one. I had hopoed that the 266 would cover a network that doesnt see much traffic, like this one. I have also cut a few rules out of some of the rules files. maybe 4 or 5 total. nothing that makes a noticable differance. Just top get rid of alerts I was not worried about that cluttered up the database. My original question stands though. Why do the -A fast -b flags actualy slow snort down. When run with those flags this box goes from reading one out of every 8 packets to reading one out of every 15 or so. Again, snort is stared by the command: snort -c /etc/snort/snort.conf -i eth0 -D
James,
There are a _lot_ of factors that can make a difference with the speed
as to which snort can log. Lets take a look at your config.
[...comments snipped...]
var HOME_NET [A.B.C.D/24] var EXTERNAL_NET any
Works fine, but some internal things will show up as false postives if you do that. Perhaps consider setting EXTERNAL_NET to !$HOME_NET.
var SMTP $HOME_NET var HTTP_SERVERS $HOME_NET var SQL_SERVERS $HOME_NET var DNS_SERVERS [a.b.c.d, e.f.g.h] preprocessor frag2: timeout 15 preprocessor stream4: detect_scan, timeout 15, memcap 17572864 preprocessor stream4_reassemble both, ports [21, 23, 25, 53, 80, 143, 110, 111, 513]
OK, lotsa stuff going on inside of stream4. Reassembling of both client and source is CPU intensive.
preprocessor http_decode: 80 2301 -unicode -cginull preprocessor portscan: $HOME_NET 5 5 portscan.log preprocessor portscan-ignorehosts: $DNS_SERVERS output database: log, mysql, user=snort password=snort dbname=snort2 host=localhost
OK, logging to a MySQL DB on the same box. Here's a significant bottlneck. Your sensor is losing CPU to the DB, and is having to wait on actions (inserts) to complete before it can write the next packet from snort. That adds up to a backlog. You might want to consider using barnyard.
#include classification.config
Errr... Most rules use this, might want to consider adding it back.
include bad-traffic.rules include exploit.rules include finger.rules include ftp.rules include telnet.rules include dos.rules include tftp.rules include web-cgi.rules include web-iis.rules include web-misc.rules include web-attacks.rules include misc.rules include attack-responses.rules include backdoor.rules
Now that's with no flags. When you add flags, you override/add-onto whatever configs are in snort.conf.... So when you add -b for binary logging, you are logging to a DB on the local system _and_ to the pcap binary file. When you add -A (full|fast) you are _again_ increasing I/O usage--Now snort has to log to a DB, log to bianary files, and then log the decoded packet (full|fast) info into /var/log/snort/alert. Consider the box you are using for this. Does it have a very strong I/O subsystem? SCSI2 or better? One disk? Multi Disks? How many I/O boards to share bandwith? You may also want to check out your ethernet card. Many times I've seen performance changes just by trying a different ether card. Anyways, hope that helps! Cheers! ----- Erek Adams Nifty-Type-Guy TheAdamsFamily.Net _______________________________________________________________ Don't miss the 2002 Sprint PCS Application Developer's Conference August 25-28 in Las Vegas - http://devcon.sprintpcs.com/adp/index.cfm?source=osdntextlink _______________________________________________ Snort-users mailing list Snort-users () lists sourceforge net Go to this URL to change user options or unsubscribe: https://lists.sourceforge.net/lists/listinfo/snort-users Snort-users list archive: http://www.geocrawler.com/redir-sf.php3?list=snort-users
