[Snort-sigs] [Snort-users] New Classification System Finalization

Matthew Jonkman jonkman at ...3525...
Mon Jan 31 15:19:54 EST 2011


On Jan 31, 2011, at 2:45 PM, Joel Esler wrote:

> Just to be clear, the underscores/dashes thing is not a Snort thing (well not entirely, I didn't look into it as far as Snort was concerned), it's an output plugin problem.  By using dashes it maintains compatibility with all output systems currently in place.  (Barnyard, barnyard2, flop, etc)  It's the format that's been in place since the beginning, and it's an easy fix to not break everything.

Thanks Joel, that helps clarify.

So does an underscore *break* these tools, or just not the norm for them?


> 
> On the other hand, there was a lot of conversation regarding just redesigning the whole classification system to be more dynamic and not static.  I think this gets farther in the longer term and allows for a much more flexible system.
> 

Ya, we'll have this on the agenda for the OISF too and share the thoughts with all. Definitely long term, but we have the funding in OISF to "do good things for IDS", and this could fit in there!

Matt

> Joel
> 
> On Mon, Jan 31, 2011 at 2:28 PM, Matthew Jonkman <jonkman at ...3525...> wrote:
> As you may recall, Alienvault (http://www.alienvault.com), the home of OSSIM, has very generously offered to the snort and suricata communities the classification system they've developed to better categorize and react to IDS events. We're excited about this, especially in suricata, and we have already begun the changes required to allow us at Emerging Threats Pro and Emerging Threats Open to distribute the rulesets in both forms.
> 
> We had called an end to comments by Jan 12, but discussion has continued mostly privately. A few points to iron out yet:
> 
> 1. Sourcefire has proposed to change all underscores to dashes.
> I feel the underscores are an important differentiator. But older snort's may not handle that well. Suricata will handle them fine. But having differing systems is going to be a challenge of course.
> 
> 2. Sourcefire also proposes to lower-case everything.
> Shouldn't be a big deal if no one objects.
> 
> 3. We also need to assign priorities to the events. Sourcefire in the link below has proposed how they might look. We need feedback there.
> Perhaps we put up a simple web app to let folks go through and prioritize and we can take the average over a few weeks of input?
> 
> -----------
> 
> Initial posts are here:
> http://blog.emergingthreatspro.com/2010/12/new-classification-system-proposal.html
> 
> and here:
> http://blog.snort.org/2011/01/classification-comments.html
> 
> The actual system is here as proposed by Alienvault:
> 
> http://www.emergingthreats.net/new_classifications_v1.txt
> 
> And a version proposed by Sourcefire.
> http://www.snort.org/assets/157/classifications.txt
> 
> -----------
> 
> I propose these steps as a way forward:
> 
> 1. Lets get more feedback on the lists (the snort lists, the oisf lists, and the emerging lists).
> 
> 2. We have an OISF brainstorming session at RSA in a week and a half (http://www.openinfosecfoundation.org/index.php/component/content/article/34-general-content/109-the-next-oisf-brainstorming-meeting)
> This is on the agenda there, lets get some more discussion and we will summarize this on the lists
> 
> Lets call the End of February the final date, adopt an official classification.conf and move forward!
> 
> Matt
> 
> 
> 
> ----------------------------------------------------
> Matthew Jonkman
> Emergingthreats.net
> Emerging Threats Pro
> Open Information Security Foundation (OISF)
> Phone 765-807-8630
> Fax 312-264-0205
> http://www.emergingthreatspro.com
> http://www.openinfosecfoundation.org
> ----------------------------------------------------
> 
> PGP: http://www.jonkmans.com/mattjonkman.asc
> 
> 
> 
> 
> ------------------------------------------------------------------------------
> Special Offer-- Download ArcSight Logger for FREE (a $49 USD value)!
> Finally, a world-class log management solution at an even better price-free!
> Download using promo code Free_Logger_4_Dev2Dev. Offer expires
> February 28th, so secure your free ArcSight Logger TODAY!
> http://p.sf.net/sfu/arcsight-sfd2d
> _______________________________________________
> Snort-users mailing list
> Snort-users at lists.sourceforge.net
> Go to this URL to change user options or unsubscribe:
> https://lists.sourceforge.net/lists/listinfo/snort-users
> Snort-users list archive:
> http://www.geocrawler.com/redir-sf.php3?list=snort-users
> 
> 
> 
> -- 
> Joel Esler
> Skype:eslerjoel
> http://blog.snort.org && http://blog.clamav.net
> 
> ------------------------------------------------------------------------------
> Special Offer-- Download ArcSight Logger for FREE (a $49 USD value)!
> Finally, a world-class log management solution at an even better price-free!
> Download using promo code Free_Logger_4_Dev2Dev. Offer expires 
> February 28th, so secure your free ArcSight Logger TODAY! 
> http://p.sf.net/sfu/arcsight-sfd2d_______________________________________________
> Snort-sigs mailing list
> Snort-sigs at lists.sourceforge.net
> https://lists.sourceforge.net/lists/listinfo/snort-sigs
> http://www.snort.org


----------------------------------------------------
Matthew Jonkman
Emergingthreats.net
Emerging Threats Pro
Open Information Security Foundation (OISF)
Phone 765-807-8630
Fax 312-264-0205
http://www.emergingthreatspro.com
http://www.openinfosecfoundation.org
----------------------------------------------------

PGP: http://www.jonkmans.com/mattjonkman.asc



-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.snort.org/pipermail/snort-sigs/attachments/20110131/7b3b06fc/attachment.html>


More information about the Snort-sigs mailing list