Snort mailing list archives
Evasive RST's
From: JSeddon () semtech com
Date: Mon, 6 Aug 2001 13:15:21 -0700
My second highest source of alerts is EVASIVE RST: They all look something like this: spp_stream4: EVASIVE RST detection [**] 08/02-21:59:59.323103 a.b.c.d:443 -> d.e.f.g:53366 TCP TTL:235 TOS:0x0 ID:61358 IpLen:20 DgmLen:40 DF *****R** Seq: 0x6D751BAC Ack: 0x0 Win: 0x2238 TcpLen: 20 [Snort log] It is always coming from port 443 (with a couple of exceptions on port 80). The src addresses seem to be web sites that we would expect and approve our employees to visit. That's why I think they are probably false alarms. I've been trying to look up what this pre-processor is trying to detect and haven't been able to find it. Sorry if I've missed it....I've seen some posts in old mail archives but haven't gotten a clear answer to: What is stream4 tripping on? What is an evasive reset? What kind of attack uses this that stream4 wants to tell you about? What makes an EVASIVE RST different from a legit RST? Thanks! James _______________________________________________ Snort-users mailing list Snort-users () lists sourceforge net Go to this URL to change user options or unsubscribe: http://lists.sourceforge.net/lists/listinfo/snort-users Snort-users list archive: http://www.geocrawler.com/redir-sf.php3?list=snort-users
Current thread:
- Evasive RST's JSeddon (Aug 06)