[Snort-users] latest win32 binary of snort (resend with modifications to get around various filters that bounced the last message)

Tom H tom at ...9643...
Mon Jul 14 14:44:02 EDT 2003


I've got the latest win32 binary for snort along with the current ruleset.
"C:\Snort\bin>snort -V
-*> Snort! <*-
Version 2.0.0-ODBC-MySQL-WIN32 (Build 72)"
and snort rules stable from "Mon Jul 14 20:19:07 2003 GMT  Works for 1.9.x  "

I'm having difficulty getting the 'established' rule to work for the 'flow' keyword. 
The current 'p o r n.rules' (spaces added to fool various spam catchers) file contains;
alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"P O R N freezzz"; content:"FREEZZZ"; nocase; flow:to_client,established; classtype:kickass-p o r n; sid:1310; rev:5;)

however if I remove the established, then the rule alerts for pages containing FREEZZZ? can anyone point me in the right direction to what might be causing that. As I assume that web content is sent back on an established connection.

The init output is posted below;


Tom H

Initializing Preprocessors!
Initializing Plug-ins!
Parsing Rules file C:\snort\etc\snort.conf

Initializing rule chains...
No arguments to frag2 directive, setting defaults to:
    Fragment timeout: 60 seconds
    Fragment memory cap: 4194304 bytes
    Fragment min_ttl:   0
    Fragment ttl_limit: 5
    Fragment Problems: 0
    Self preservation threshold: 500
    Self preservation period: 90
    Suspend threshold: 1000
    Suspend period: 30
Stream4 config:
    Stateful inspection: ACTIVE
    Session statistics: INACTIVE
    Session timeout: 30 seconds
    Session memory cap: 8388608 bytes
    State alerts: INACTIVE
    Evasion alerts: INACTIVE
    Scan alerts: ACTIVE
    Log Flushed Streams: INACTIVE
    MinTTL: 1
    TTL Limit: 5
    Async Link: 0
    State Protection: 0
    Self preservation threshold: 50
    Self preservation period: 90
    Suspend threshold: 200
    Suspend period: 30
Stream4_reassemble config:
    Server reassembly: ACTIVE
    Client reassembly: ACTIVE
    Reassembler alerts: ACTIVE
    Ports: 21 23 25 53 80 110 111 143 513 1433
    Emergency Ports: 21 23 25 53 80 110 111 143 513 1433
http_decode arguments:
    Unicode decoding
    IIS alternate Unicode decoding
    IIS double encoding vuln
    Flip backslash to slash
    Include additional whitespace separators
    Ports to decode http on: 80
rpc_decode arguments:
    Ports to decode RPC on: 111 32771
    alert_fragments: INACTIVE
    alert_large_fragments: ACTIVE
    alert_incomplete: ACTIVE
    alert_multiple_requests: ACTIVE
telnet_decode arguments:
    Ports to decode telnet on: 21 23 25 119
Using LOCAL time
Conversation Config:
   KeepStats: 0
   Conv Count: 3000
   Timeout   : 60
   Alert Odd?: 0
   Allowed IP Protocols:  All

Portscan2 config:
    log: C:\snort\log/scan.log
    scanners_max: 256
    targets_max: 1024
    target_limit: 5
    port_limit: 20
    timeout: 60
21 Snort rules read...
21 Option Chains linked into 1 Chain Headers
0 Dynamic rules

Rule application order: ->activation->dynamic->alert->pass->log

        --== Initialization Complete ==--

More information about the Snort-users mailing list