<html xmlns:v="urn:schemas-microsoft-com:vml" xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:w="urn:schemas-microsoft-com:office:word" xmlns:x="urn:schemas-microsoft-com:office:excel" xmlns:p="urn:schemas-microsoft-com:office:powerpoint" xmlns:a="urn:schemas-microsoft-com:office:access" xmlns:dt="uuid:C2F41010-65B3-11d1-A29F-00AA00C14882" xmlns:s="uuid:BDC6E3F0-6DA3-11d1-A2A3-00AA00C14882" xmlns:rs="urn:schemas-microsoft-com:rowset" xmlns:z="#RowsetSchema" xmlns:b="urn:schemas-microsoft-com:office:publisher" xmlns:ss="urn:schemas-microsoft-com:office:spreadsheet" xmlns:c="urn:schemas-microsoft-com:office:component:spreadsheet" xmlns:odc="urn:schemas-microsoft-com:office:odc" xmlns:oa="urn:schemas-microsoft-com:office:activation" xmlns:html="http://www.w3.org/TR/REC-html40" xmlns:q="http://schemas.xmlsoap.org/soap/envelope/" xmlns:rtc="http://microsoft.com/officenet/conferencing" xmlns:D="DAV:" xmlns:Repl="http://schemas.microsoft.com/repl/" xmlns:mt="http://schemas.microsoft.com/sharepoint/soap/meetings/" xmlns:x2="http://schemas.microsoft.com/office/excel/2003/xml" xmlns:ppda="http://www.passport.com/NameSpace.xsd" xmlns:ois="http://schemas.microsoft.com/sharepoint/soap/ois/" xmlns:dir="http://schemas.microsoft.com/sharepoint/soap/directory/" xmlns:ds="http://www.w3.org/2000/09/xmldsig#" xmlns:dsp="http://schemas.microsoft.com/sharepoint/dsp" xmlns:udc="http://schemas.microsoft.com/data/udc" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:sub="http://schemas.microsoft.com/sharepoint/soap/2002/1/alerts/" xmlns:ec="http://www.w3.org/2001/04/xmlenc#" xmlns:sp="http://schemas.microsoft.com/sharepoint/" xmlns:sps="http://schemas.microsoft.com/sharepoint/soap/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:udcs="http://schemas.microsoft.com/data/udc/soap" xmlns:udcxf="http://schemas.microsoft.com/data/udc/xmlfile" xmlns:udcp2p="http://schemas.microsoft.com/data/udc/parttopart" xmlns:wf="http://schemas.microsoft.com/sharepoint/soap/workflow/" xmlns:dsss="http://schemas.microsoft.com/office/2006/digsig-setup" xmlns:dssi="http://schemas.microsoft.com/office/2006/digsig" xmlns:mdssi="http://schemas.openxmlformats.org/package/2006/digital-signature" xmlns:mver="http://schemas.openxmlformats.org/markup-compatibility/2006" xmlns:m="http://schemas.microsoft.com/office/2004/12/omml" xmlns:mrels="http://schemas.openxmlformats.org/package/2006/relationships" xmlns:spwp="http://microsoft.com/sharepoint/webpartpages" xmlns:ex12t="http://schemas.microsoft.com/exchange/services/2006/types" xmlns:ex12m="http://schemas.microsoft.com/exchange/services/2006/messages" xmlns:pptsl="http://schemas.microsoft.com/sharepoint/soap/SlideLibrary/" xmlns:spsl="http://microsoft.com/webservices/SharePointPortalServer/PublishedLinksService" xmlns:Z="urn:schemas-microsoft-com:" xmlns:st="" xmlns="http://www.w3.org/TR/REC-html40">

<head>
<META HTTP-EQUIV="Content-Type" CONTENT="text/html; charset=us-ascii">
<meta name=Generator content="Microsoft Word 12 (filtered medium)">
<style>
<!--
 /* Font Definitions */
 @font-face
        {font-family:"Cambria Math";
        panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
        {font-family:Calibri;
        panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
        {font-family:Tahoma;
        panose-1:2 11 6 4 3 5 4 4 2 4;}
 /* Style Definitions */
 p.MsoNormal, li.MsoNormal, div.MsoNormal
        {margin:0in;
        margin-bottom:.0001pt;
        font-size:12.0pt;
        font-family:"Times New Roman","serif";}
a:link, span.MsoHyperlink
        {mso-style-priority:99;
        color:blue;
        text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
        {mso-style-priority:99;
        color:purple;
        text-decoration:underline;}
span.EmailStyle17
        {mso-style-type:personal-reply;
        font-family:"Calibri","sans-serif";
        color:#1F497D;}
.MsoChpDefault
        {mso-style-type:export-only;}
@page Section1
        {size:8.5in 11.0in;
        margin:1.0in 1.0in 1.0in 1.0in;}
div.Section1
        {page:Section1;}
-->
</style>
<!--[if gte mso 9]><xml>
 <o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
 <o:shapelayout v:ext="edit">
  <o:idmap v:ext="edit" data="1" />
 </o:shapelayout></xml><![endif]-->
</head>

<body lang=EN-US link=blue vlink=purple>

<div class=Section1>

<p class=MsoNormal><span style='font-size:11.0pt;font-family:"Calibri","sans-serif";
color:#1F497D'>That answered everything. We didn't compile it with that option.
Got it fixed and is working on my test box. <o:p></o:p></span></p>

<p class=MsoNormal><span style='font-size:11.0pt;font-family:"Calibri","sans-serif";
color:#1F497D'><o:p> </o:p></span></p>

<p class=MsoNormal><span style='font-size:11.0pt;font-family:"Calibri","sans-serif";
color:#1F497D'>Thanks for the help! I'll update my posts on the Snort forums so
other users can see since most don't use the mailing lists. <o:p></o:p></span></p>

<p class=MsoNormal><span style='font-size:11.0pt;font-family:"Calibri","sans-serif";
color:#1F497D'><o:p> </o:p></span></p>

<p class=MsoNormal><span style='font-size:11.0pt;font-family:"Calibri","sans-serif";
color:#1F497D'>Thanks,<o:p></o:p></span></p>

<p class=MsoNormal><span style='font-size:11.0pt;font-family:"Calibri","sans-serif";
color:#1F497D'>Andy <o:p></o:p></span></p>

<p class=MsoNormal><span style='font-size:11.0pt;font-family:"Calibri","sans-serif";
color:#1F497D'><o:p> </o:p></span></p>

<div style='border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in 0in 0in'>

<p class=MsoNormal><b><span style='font-size:10.0pt;font-family:"Tahoma","sans-serif"'>From:</span></b><span
style='font-size:10.0pt;font-family:"Tahoma","sans-serif"'> Matt Watchinski
[mailto:mwatchinski@...1935...] <br>
<b>Sent:</b> Wednesday, February 03, 2010 10:14 AM<br>
<b>To:</b> Andy Berryman<br>
<b>Cc:</b> Nigel Houghton; Snort Users List<br>
<b>Subject:</b> Re: [Snort-users] Trying to trouble shoot snort isntall.<o:p></o:p></span></p>

</div>

<p class=MsoNormal><o:p> </o:p></p>

<p class=MsoNormal style='margin-bottom:12.0pt'>If you didn't compile with <br>
<br>
./configure --enable-decoder-preprocessor-rules<br>
<br>
Then alerting works the old way.<br>
<br>
Cheers,<br>
-matt<o:p></o:p></p>

<div>

<p class=MsoNormal>On Wed, Feb 3, 2010 at 11:00 AM, Andy Berryman <<a
href="mailto:aberryman@...14758...">aberryman@...14758...</a>> wrote:<o:p></o:p></p>

<p class=MsoNormal>Well, if I'm not loading the preprocessor rules, why do I
get http_inspect alerts and portscan alerts? Do the preprocessors generate
alerts on the default settings regardless if a rule is applied or not?<br>
<br>
Thanks,<br>
<span style='color:#888888'>Andy</span><o:p></o:p></p>

<div>

<div>

<p class=MsoNormal><br>
-----Original Message-----<br>
From: Nigel Houghton [mailto:<a href="mailto:nhoughton@...1935...">nhoughton@...1935...</a>]<br>
Sent: Wednesday, February 03, 2010 9:43 AM<br>
To: Andy Berryman<br>
Cc: Snort Users List<br>
Subject: Re: [Snort-users] Trying to trouble shoot snort isntall.<br>
<br>
On Wed, Feb 3, 2010 at 10:13 AM, Matt Watchinski<br>
<<a href="mailto:mwatchinski@...1935...">mwatchinski@...1935...</a>>
wrote:<br>
> Did you tell snort you want to use the preproc and decoder rules?  I
don't<br>
> see the rules included in your pasted conf.  You have to first enable
the<br>
> use of this feature with:<br>
><br>
> ./configure --enable-decoder-preprocessor-rules<br>
><br>
> Then add the rules files from here:<br>
><br>
> src/snort-2.8.5.1/preproc_rules/decoder.rules<br>
> src/snort-2.8.5.1/preproc_rules/preprocessor.rules<br>
><br>
> Cheers,<br>
> -matt<br>
><br>
> On Tue, Feb 2, 2010 at 4:53 PM, Andy Berryman <<a
href="mailto:aberryman@...14758...">aberryman@...14758...</a>> wrote:<br>
>><br>
>> Can someone point me in the right direction please? I'm trying to
figure<br>
>> out if I'm chasing my tail here. Basically when I start snort I tail
syslog<br>
>> and see this.<br>
>><br>
>><br>
>><br>
>> Feb  2 21:26:59 (none) snort[19257]:<br>
>> +++++++++++++++++++++++++++++++++++++++++++++++++++<br>
>><br>
>> Feb  2 21:26:59 (none) snort[19257]: Initializing rule chains...<br>
>><br>
>> Feb  2 21:27:15 (none) snort[19257]: 5866 Snort rules read<br>
>><br>
>> Feb  2 21:27:15 (none) snort[19257]:     5866
detection rules<br>
>><br>
>> Feb  2 21:27:15 (none) snort[19257]:     0
decoder rules<br>
>><br>
>> Feb  2 21:27:15 (none) snort[19257]:     0
preprocessor rules<br>
>><br>
>> Feb  2 21:27:15 (none) snort[19257]: 5866 Option Chains linked
into 624<br>
>> Chain Headers<br>
>><br>
>> Feb  2 21:27:15 (none) snort[19257]: 0 Dynamic rules<br>
>><br>
>> Feb  2 21:27:15 (none) snort[19257]:<br>
>> +++++++++++++++++++++++++++++++++++++++++++++++++++<br>
>><br>
>><br>
>><br>
>><br>
>><br>
>> Doesn't that tell me that it's not loading any of the preprocessor,<br>
>> decoder, or dynamic rules?<br>
>><br>
>><br>
>><br>
>><br>
>><br>
>> Here is more from syslog where it says it is loading them I thought.<br>
>><br>
>> Loading all dynamic engine libs from /snort_lib/snort_dynamicengine...<br>
>><br>
>> Feb  2 21:30:14 (none) snort[19434]:   Loading dynamic
engine<br>
>> /snort_lib/snort_dynamicengine/libsf_engine.so...<br>
>><br>
>> Feb  2 21:30:14 (none) snort[19434]: done<br>
>><br>
>> Feb  2 21:30:14 (none) snort[19434]:   Finished Loading
all dynamic engine<br>
>> libs from /snort_lib/snort_dynamicengine<br>
>><br>
>> Feb  2 21:30:14 (none) snort[19434]: Loading all dynamic
detection libs<br>
>> from /snort_lib/snort_dynamicrules...<br>
>><br>
>> Feb  2 21:30:14 (none) snort[19434]:   Loading dynamic
detection library<br>
>> /snort_lib/snort_dynamicrules/bad-traffic.so...<br>
>><br>
>> Feb  2 21:30:14 (none) snort[19434]: done<br>
>><br>
>> Feb  2 21:30:14 (none) snort[19434]:   Loading dynamic
detection library<br>
>> /snort_lib/snort_dynamicrules/chat.so...<br>
>><br>
>> Feb  2 21:30:14 (none) snort[19434]: done<br>
>><br>
>> Feb  2 21:30:14 (none) snort[19434]:   Loading dynamic
detection library<br>
>>  /snort_lib/snort_dynamicrules/dos.so...<br>
>><br>
>> Feb  2 21:30:14 (none) snort[19434]: done<br>
>><br>
>> Feb  2 21:30:14 (none) snort[19434]:   Loading dynamic
detection library<br>
>> /snort_lib/snort_dynamicrules/exploit.so...<br>
>><br>
>> Feb  2 21:30:14 (none) snort[19434]: done<br>
>><br>
>> Feb  2 21:30:14 (none) snort[19434]:   Loading dynamic
detection library<br>
>> /snort_lib/snort_dynamicrules/imap.so...<br>
>><br>
>> Feb  2 21:30:14 (none) snort[19434]: done<br>
>><br>
>> Feb  2 21:30:14 (none) snort[19434]:   Loading dynamic
detection library<br>
>> /snort_lib/snort_dynamicrules/misc.so...<br>
>><br>
>> Feb  2 21:30:14 (none) snort[19434]: done<br>
>><br>
>> Feb  2 21:30:14 (none) snort[19434]:   Loading dynamic
detection library<br>
>> /snort_lib/snort_dynamicrules/multimedia.so...<br>
>><br>
>> Feb  2 21:30:14 (none) snort[19434]: done<br>
>><br>
>> Feb  2 21:30:14 (none) snort[19434]:   Loading dynamic
detection library<br>
>> /snort_lib/snort_dynamicrules/netbios.so...<br>
>><br>
>> Feb  2 21:30:14 (none) snort[19434]: done<br>
>><br>
>> Feb  2 21:30:14 (none) snort[19434]:   Loading dynamic
detection library<br>
>> /snort_lib/snort_dynamicrules/nntp.so...<br>
>><br>
>> Feb  2 21:30:14 (none) snort[19434]: done<br>
>><br>
>> Feb  2 21:30:14 (none) snort[19434]:   Loading dynamic
detection library<br>
>> /snort_lib/snort_dynamicrules/p2p.so...<br>
>><br>
>> Feb  2 21:30:14 (none) snort[19434]: done<br>
>><br>
>> Feb  2 21:30:14 (none) snort[19434]:   Loading dynamic
detection library<br>
>> /snort_lib/snort_dynamicrules/smtp.so...<br>
>><br>
>> Feb  2 21:30:14 (none) snort[19434]: done<br>
>><br>
>> Feb  2 21:30:14 (none) snort[19434]:   Loading dynamic
detection library<br>
>> /snort_lib/snort_dynamicrules/sql.so...<br>
>><br>
>> Feb  2 21:30:14 (none) snort[19434]: done<br>
>><br>
>> Feb  2 21:30:14 (none) snort[19434]:   Loading dynamic
detection library<br>
>> /snort_lib/snort_dynamicrules/web-client.so...<br>
>><br>
>> Feb  2 21:30:14 (none) snort[19434]: done<br>
>><br>
>> Feb  2 21:30:14 (none) snort[19434]:   Loading dynamic
detection library<br>
>> /snort_lib/snort_dynamicrules/web-misc.so...<br>
>><br>
>> Feb  2 21:30:14 (none) snort[19434]: done<br>
>><br>
>> Feb  2 21:30:14 (none) snort[19434]:   Loading dynamic
detection library<br>
>> /snort_lib/snort_dynamicrules/web-activex.so...<br>
>><br>
>> Feb  2 21:30:14 (none) snort[19434]: done<br>
>><br>
>> Feb  2 21:30:14 (none) snort[19434]:   Loading dynamic
detection library<br>
>> /snort_lib/snort_dynamicrules/web-iis.so...<br>
>><br>
>> Feb  2 21:30:14 (none) snort[19434]: done<br>
>><br>
>> Feb  2 21:30:14 (none) snort[19434]:   Finished Loading
all dynamic<br>
>> detection libs from /snort_lib/snort_dynamicrules<br>
>><br>
>> Feb  2 21:30:14 (none) snort[19434]: Loading all dynamic
preprocessor libs<br>
>> from /snort_lib/snort_dynamicpreprocessor...<br>
>><br>
>> Feb  2 21:30:14 (none) snort[19434]:   Loading dynamic
preprocessor<br>
>> library /snort_lib/snort_dynamicpreprocessor/libsf_dce2_preproc.so...<br>
>><br>
>> Feb  2 21:30:14 (none) snort[19434]: done<br>
>><br>
>> Feb  2 21:30:14 (none) snort[19434]:   Loading dynamic
preprocessor<br>
>> library
/snort_lib/snort_dynamicpreprocessor/libsf_dcerpc_preproc.so...<br>
>><br>
>> Feb  2 21:30:14 (none) snort[19434]: done<br>
>><br>
>> Feb  2 21:30:14 (none) snort[19434]:   Loading dynamic
preprocessor<br>
>> library /snort_lib/snort_dynamicpreprocessor/libsf_dns_preproc.so...<br>
>><br>
>> Feb  2 21:30:14 (none) snort[19434]: done<br>
>><br>
>> Feb  2 21:30:14 (none) snort[19434]:   Loading dynamic
preprocessor<br>
>> library /snort_lib/snort_dynamicpreprocessor/libsf_ftptelnet_preproc.so...<br>
>><br>
>> Feb  2 21:30:14 (none) snort[19434]: done<br>
>><br>
>> Feb  2 21:30:14 (none) snort[19434]:   Loading dynamic
preprocessor<br>
>> library /snort_lib/snort_dynamicpreprocessor/libsf_smtp_preproc.so...<br>
>><br>
>> Feb  2 21:30:14 (none) snort[19434]: done<br>
>><br>
>> Feb  2 21:30:14 (none) snort[19434]:   Loading dynamic
preprocessor<br>
>> library /snort_lib/snort_dynamicpreprocessor/libsf_ssh_preproc.so...<br>
>><br>
>> Feb  2 21:30:14 (none) snort[19434]: done<br>
>><br>
>> Feb  2 21:30:14 (none) snort[19434]:   Loading dynamic
preprocessor<br>
>> library /snort_lib/snort_dynamicpreprocessor/libsf_ssl_preproc.so...<br>
>><br>
>> Feb  2 21:30:14 (none) snort[19434]: done<br>
>><br>
>> Feb  2 21:30:14 (none) snort[19434]:   Finished Loading
all dynamic<br>
>> preprocessor libs from /snort_lib/snort_dynamicpreprocessor<br>
>><br>
>><br>
>><br>
>><br>
>><br>
>> Here's my snort.conf<br>
>><br>
>><br>
>><br>
>> var HOME_NET [<a href="http://10.27.1.0/24,10.10.1.0/24,10.150.1.0/24"
target="_blank">10.27.1.0/24,10.10.1.0/24,10.150.1.0/24</a>]<br>
>><br>
>> var EXTERNAL_NET !$HOME_NET<br>
>><br>
>> var DNS_SERVERS 10.27.1.2<br>
>><br>
>> var SMTP_SERVERS $HOME_NET<br>
>><br>
>> var HTTP_SERVERS $HOME_NET<br>
>><br>
>> var SQL_SERVERS $HOME_NET<br>
>><br>
>> var TELNET_SERVERS $HOME_NET<br>
>><br>
>> var SNMP_SERVERS $HOME_NET<br>
>><br>
>> var HTTP_PORTS 80<br>
>><br>
>> var SHELLCODE_PORTS !80<br>
>><br>
>> var ORACLE_PORTS 1521<br>
>><br>
>> var SSH_PORTS 22<br>
>><br>
>> var AIM_SERVERS<br>
>> [<a
href="http://64.12.24.0/23,64.12.28.0/23,64.12.161.0/24,64.12.163.0/24,64.12.200.0/24,205.188.3.0/24,205.188.5.0/24,205.188.7.0/24,205.188.9.0/24,205.188.153.0/24,205.188.179.0/24,205.188.248.0/24"
target="_blank">64.12.24.0/23,64.12.28.0/23,64.12.161.0/24,64.12.163.0/24,64.12.200.0/24,205.188.3.0/24,205.188.5.0/24,205.188.7.0/24,205.188.9.0/24,205.188.153.0/24,205.188.179.0/24,205.188.248.0/24</a>]<br>
>><br>
>> var RULE_PATH  /snort/conf<br>
>><br>
>> var SORULE_PATH /snort/conf/so_rules<br>
>><br>
>> #config detection: search-method ac<br>
>><br>
>> config disable_decode_alerts<br>
>><br>
>> config disable_tcpopt_experimental_alerts<br>
>><br>
>> config profile_rules: print 20, sort total_ticks, filename<br>
>> rule_profiles.txt<br>
>><br>
>> dynamicdetection directory /snort_lib/snort_dynamicrules<br>
>><br>
>> dynamicpreprocessor directory /snort_lib/snort_dynamicpreprocessor<br>
>><br>
>> dynamicengine directory /snort_lib/snort_dynamicengine<br>
>><br>
>> config flowbits_size: 256<br>
>><br>
>> include classification.config<br>
>><br>
>> include reference.config<br>
>><br>
>> include $RULE_PATH/general.rules<br>
>><br>
>> include $RULE_PATH/local.rules<br>
>><br>
>> #include $RULE_PATH/so.rules<br>
>><br>
>> include $SORULE_PATH/bad-traffic.rules<br>
>><br>
>> include $SORULE_PATH/chat.rules<br>
>><br>
>> include $SORULE_PATH/dos.rules<br>
>><br>
>> include $SORULE_PATH/exploit.rules<br>
>><br>
>> include $SORULE_PATH/imap.rules<br>
>><br>
>> include $SORULE_PATH/misc.rules<br>
>><br>
>> include $SORULE_PATH/multimedia.rules<br>
>><br>
>> include $SORULE_PATH/netbios.rules<br>
>><br>
>> include $SORULE_PATH/nntp.rules<br>
>><br>
>> include $SORULE_PATH/p2p.rules<br>
>><br>
>> include $SORULE_PATH/smtp.rules<br>
>><br>
>> include $SORULE_PATH/sql.rules<br>
>><br>
>> include $SORULE_PATH/web-client.rules<br>
>><br>
>> include $SORULE_PATH/web-misc.rules<br>
>><br>
>> preprocessor frag3_global: max_frags 65536<br>
>><br>
>> preprocessor frag3_engine: policy first detect_anomalies timeout 1800<br>
>><br>
>> preprocessor stream5_global: max_tcp 8192, track_tcp yes, track_udp no<br>
>><br>
>> preprocessor stream5_tcp: policy first<br>
>><br>
>> preprocessor http_inspect: global iis_unicode_map unicode.map 1252<br>
>><br>
>> preprocessor http_inspect_server: server default profile all ports {
80<br>
>> 8080 8180 } oversize_dir_length 500 no_alerts<br>
>><br>
>> preprocessor rpc_decode: 111 32771<br>
>><br>
>> #preprocessor bo<br>
>><br>
>> #preprocessor flow: stats_interval 0 hash 2<br>
>><br>
>> preprocessor sfportscan: proto  { all } \<br>
>><br>
>>
                        
scan_type { all } \<br>
>><br>
>>
                        
memcap { 10000000 } \<br>
>><br>
>>
                        
sense_level { medium }<br>
>><br>
>> preprocessor perfmonitor: \<br>
>><br>
>> time 30 events flow max console pktcnt 10000<br>
>><br>
>> preprocessor arpspoof<br>
>><br>
>> preprocessor dcerpc2<br>
>><br>
>> #preprocessor ssl: noinspect_encrypted<br>
>><br>
>> output queue: /var/log/snort/queue/ /snort/conf/sidfile<br>
>><br>
>> #output alert_syslog: LOG_AUTH LOG_ALERT<br>
>><br>
>><br>
>><br>
>><br>
>><br>
>> Thanks,<br>
>><br>
>> Andy Berryman<br>
>><br>
>> Cymtec Systems<br>
>><br>
>> <a href="mailto:support@...14758...">support@...14758...</a><br>
>><br>
>><br>
>><br>
>><br>
>><br>
>><br>
>>
------------------------------------------------------------------------------<br>
>> The Planet: dedicated and managed hosting, cloud storage, colocation<br>
>> Stay online with enterprise data centers and the best network in the<br>
>> business<br>
>> Choose flexible plans and management services without long-term
contracts<br>
>> Personal 24x7 support from experience hosting pros just a phone call
away.<br>
>> <a href="http://p.sf.net/sfu/theplanet-com" target="_blank">http://p.sf.net/sfu/theplanet-com</a><br>
>> _______________________________________________<br>
>> Snort-users mailing list<br>
>> <a href="mailto:Snort-users@lists.sourceforge.net">Snort-users@lists.sourceforge.net</a><br>
>> Go to this URL to change user options or unsubscribe:<br>
>> <a href="https://lists.sourceforge.net/lists/listinfo/snort-users"
target="_blank">https://lists.sourceforge.net/lists/listinfo/snort-users</a><br>
>> Snort-users list archive:<br>
>> <a href="http://www.geocrawler.com/redir-sf.php3?list=snort-users"
target="_blank">http://www.geocrawler.com/redir-sf.php3?list=snort-users</a><br>
><br>
><br>
><br>
> --<br>
> Matthew Watchinski<br>
> Sr. Director Vulnerability Research Team (VRT)<br>
> Sourcefire, Inc.<br>
> Office: 410-423-1928<br>
> <a href="http://vrt-sourcefire.blogspot.com" target="_blank">http://vrt-sourcefire.blogspot.com</a>
&& <a href="http://www.snort.org/vrt/" target="_blank">http://www.snort.org/vrt/</a><br>
><br>
>
------------------------------------------------------------------------------<br>
> The Planet: dedicated and managed hosting, cloud storage, colocation<br>
> Stay online with enterprise data centers and the best network in the<br>
> business<br>
> Choose flexible plans and management services without long-term contracts<br>
> Personal 24x7 support from experience hosting pros just a phone call away.<br>
> <a href="http://p.sf.net/sfu/theplanet-com" target="_blank">http://p.sf.net/sfu/theplanet-com</a><br>
> _______________________________________________<br>
> Snort-users mailing list<br>
> <a href="mailto:Snort-users@lists.sourceforge.net">Snort-users@lists.sourceforge.net</a><br>
> Go to this URL to change user options or unsubscribe:<br>
> <a href="https://lists.sourceforge.net/lists/listinfo/snort-users"
target="_blank">https://lists.sourceforge.net/lists/listinfo/snort-users</a><br>
> Snort-users list archive:<br>
> <a href="http://www.geocrawler.com/redir-sf.php3?list=snort-users"
target="_blank">http://www.geocrawler.com/redir-sf.php3?list=snort-users</a><br>
><br>
<br>
<br>
Also, if the shared object rules didn't get activated there is some<br>
more output from snort after the output you pasted that would be<br>
useful.<br>
<br>
Make sure you dumped the shared object rule stubs into your SORULE_PATH.<br>
<br>
 # snort -c /snort/conf/snort.conf
--dump-dynamic-rules=/snort/conf/so_rules<br>
<br>
--<br>
Nigel Houghton<br>
Head Mentalist<br>
SF VRT<br>
<a href="http://vrt-sourcefire.blogspot.com" target="_blank">http://vrt-sourcefire.blogspot.com</a>
&& <a href="http://www.snort.org/vrt/" target="_blank">http://www.snort.org/vrt/</a><br>
<br>
<br>
<br>
------------------------------------------------------------------------------<br>
The Planet: dedicated and managed hosting, cloud storage, colocation<br>
Stay online with enterprise data centers and the best network in the business<br>
Choose flexible plans and management services without long-term contracts<br>
Personal 24x7 support from experience hosting pros just a phone call away.<br>
<a href="http://p.sf.net/sfu/theplanet-com" target="_blank">http://p.sf.net/sfu/theplanet-com</a><br>
_______________________________________________<br>
Snort-users mailing list<br>
<a href="mailto:Snort-users@lists.sourceforge.net">Snort-users@lists.sourceforge.net</a><br>
Go to this URL to change user options or unsubscribe:<br>
<a href="https://lists.sourceforge.net/lists/listinfo/snort-users%0ASnort-users"
target="_blank">https://lists.sourceforge.net/lists/listinfo/snort-users<br>
Snort-users</a> list archive:<br>
<a href="http://www.geocrawler.com/redir-sf.php3?list=snort-users"
target="_blank">http://www.geocrawler.com/redir-sf.php3?list=snort-users</a><o:p></o:p></p>

</div>

</div>

</div>

<p class=MsoNormal><br>
<br clear=all>
<br>
-- <br>
Matthew Watchinski<br>
Sr. Director Vulnerability Research Team (VRT)<br>
Sourcefire, Inc.<br>
Office: 410-423-1928<br>
<a href="http://vrt-sourcefire.blogspot.com">http://vrt-sourcefire.blogspot.com</a>
&& <a href="http://www.snort.org/vrt/">http://www.snort.org/vrt/</a><o:p></o:p></p>

</div>

</body>

</html>