Snort mailing list archives
Re: Snort running inline but not functioning as IPS
From: Y M <snort () outlook com>
Date: Wed, 27 Jan 2016 15:58:48 +0000
From: Robin Kipp <mlists () robin-kipp net> Sent: Wednesday, January 27, 2016 2:52 PM
Am 27.01.2016 um 10:46 schrieb Y M <snort () outlook com>:
Actually, that’s rather unlikely… It was pretty late at night where I am when I sent that Email, so I forgot to mention that I was doing some tests when Snort was back up and running with the security and balanced policies. I pinged some of the > blacklisted IP >addresses that Snort is using, something which would always trigger alerts when no ips_policy was present. I then also used a remote vserver to run vulnerability scans over the internet, using OpenVAS, Nexpose and Nmap. Finally, I even started 2 virtual >machines on my network, one running Windows XP and the other running an old Ubuntu release, both with vulnerable software. I opened up the vulnerable ports to the internet using my router, but only allowed connections from my remote vserver to those >ports. Next I used Metasploit to exploit various SMB and Apache2 web application vulnerabilities, all that worked fine complete with launching a Meterpreter reverse shell and all that. So, while I never really tested all that with Snort in IDS mode, I’m sure that at >least one of those actions should have resulted in an alert and a drop action, but really nothing happened...
Okay, got it.
Thanks for that suggestion! I set the ips_policy to security, then reprocessed rules and restarted Snort without seeing any alerts. However, after making the change to enablesid.conf that you suggested, I am now seeing loads and loads of „misc activity“ alerts in Snort! Here are the stats I got from pulledpork after reprocessing rules:
Rule Stats... New:-------0 Deleted:---0 Enabled Rules:----27951 Dropped Rules:----0 Disabled Rules:---0 Total Rules:------27951 IP Blacklist Stats... Total IPs:——19242 I’m using pulledpork 0.7.2 btw, previously (before starting from scratch) I was using 0.7.1. Here’s a question though, if I previously set ips_policy to security, shouldn’t there be more ‚dropped rules‘? Or does the number of dropped rules in those stats really just count the rules that were explicitly dropped in dropsid.conf?
The ips_policy (connectivity, balanced, security, max) determines the base ruleset, i.e.: number of rules in that policy, that will eventually be enabled, based on this blog post: http://blog.snort.org/2013/10/snort-vrt-default-ruleset-rebalancing.html. The ips_policy does not change signatures' action from "alert" to "drop". You have to specify which signatures need to have the "drop" action in your dropsid.conf. What you are referring to may be supported in the commercial offering, but I am not sure of that.
Nope, all the pings, vulnerability scans and even vulnerability exploitations went through without any Snort interference.
Does your custom ICMP rule has ips_policy metadata, i.e.: "metadata: security-policy ips" or "balanced -ips drop" ? The previous line means that this particular rule is now treated as a member of the security/balanced ips_policy. If the signature has no such metadata, then it will not be picked up by PulledPork when you specify the ips_policy, unless you have your rule explicitly defined in the enablesid.conf
I currently don’t have anything in my dropsid.conf except for the commented lines that are in there by default. As far as I understood, the dropsid.conf is only there if the user wants to drop rules explicitly, but doesn’t need to be modified to take the ips_policy into > account… Is that correct?
Please see my comment above. At this point, I would ask to provide sanitized pulledpork.conf and snort.conf and the command you use to run Snort with. Also, disable all of the rules and just focus on getting your ICMP rule to work as expected then expand.
Many thanks for your help! Best regards, Robin
------------------------------------------------------------------------------ Site24x7 APM Insight: Get Deep Visibility into Application Performance APM + Mobile APM + RUM: Monitor 3 App instances at just $35/Month Monitor end-to-end web transactions and take corrective actions now Troubleshoot faster and improve end-user experience. Signup Now! http://pubads.g.doubleclick.net/gampad/clk?id=267308311&iu=/4140 _______________________________________________ Snort-users mailing list Snort-users () lists sourceforge net Go to this URL to change user options or unsubscribe: https://lists.sourceforge.net/lists/listinfo/snort-users Snort-users list archive: http://sourceforge.net/mailarchive/forum.php?forum_name=snort-users Please visit http://blog.snort.org to stay current on all the latest Snort news!
Current thread:
- Re: Snort running inline but not functioning as IPS, (continued)
- Re: Snort running inline but not functioning as IPS Joel Esler (jesler) (Jan 22)
- Re: Snort running inline but not functioning as IPS Robin Kipp (Jan 23)
- Re: Snort running inline but not functioning as IPS Joel Esler (jesler) (Jan 23)
- Re: Snort running inline but not functioning as IPS Robin Kipp (Jan 24)
- Re: Snort running inline but not functioning as IPS Y M (Jan 24)
- Re: Snort running inline but not functioning as IPS Robin Kipp (Jan 24)
- Re: Snort running inline but not functioning as IPS Y M (Jan 24)
- Re: Snort running inline but not functioning as IPS Robin Kipp (Jan 26)
- Re: Snort running inline but not functioning as IPS Y M (Jan 27)
- Re: Snort running inline but not functioning as IPS Robin Kipp (Jan 27)
- Re: Snort running inline but not functioning as IPS Y M (Jan 27)
- Re: Snort running inline but not functioning as IPS Robin Kipp (Jan 27)
