Snort mailing list archives

snortsam iptables plugin


From: "Huseyin A. Ozbey" <huseyin () btegitim com>
Date: Sun, 2 Jan 2005 15:26:24 +0200

Dear Sirs
I have problems using snort with the snortsam iptables plugin. When I
patch snort, It says "Patching Snort version 2.0...", does it mean I
coundn't use snort-2.3.0RC2 ?
 
[root@menekse snortsam-patch]# ./patchsnort.sh
/root/snortinstall/silinecek/snort-2.3.0RC2
Patching Snort version 2.0...
patching file spo_alert_fwsam.c
patching file spo_alert_fwsam.h
patching file twofish.c
patching file twofish.h
rm: cannot remove `spo_alert_fwsam.?.orig': No such file or directory
rm: cannot remove `twofish.?.orig': No such file or directory
patching file plugbase.c
patching file plugin_enum.h
Hunk #1 succeeded at 37 with fuzz 1.
Patching Makefiles...
Done
 
My ip configuration is 
eth0 : inet addr:192.168.0.15  Mask:255.255.255.0 -->Outside
eth1 : inet addr:192.168.1.15  BcastMask:255.255.255.0 -->Inside
 
I have attached the files, snort.conf, snortsam.conf and sid-block.map.
Would you please help me why I couldn't see any command in the FORWARD
chain.
 
[root@menekse snortsam-patch]# iptables -L
Chain INPUT (policy ACCEPT)
target     prot opt source               destination         
 
Chain FORWARD (policy ACCEPT)
target     prot opt source               destination         
 
Chain OUTPUT (policy ACCEPT)
target     prot opt source               destination         
[root@menekse snortsam-patch]#
 
Best Regards
 
Huseyin A. Ozbey
 
 
[root@menekse root]# /usr/local/bin/snortsam 
 
SnortSam, v 2.29.
Copyright (c) 2001-2004 Frank Knobbe <frank () knobbe us>. All rights
reserved.
 
Plugin 'fwsam': v 2.2, by Frank Knobbe
Plugin 'fwexec': v 2.3, by Frank Knobbe
Plugin 'pix': v 2.7, by Frank Knobbe
Plugin 'ciscoacl': v 2.8, by Ali Basel <alib () sabanciuniv edu>
Plugin 'netscreen': v 2.7, by Frank Knobbe
Plugin 'ipchains': v 2.7, by Hector A. Paterno
<apaterno () dsnsecurity com>
Plugin 'iptables': v 2.6, by Fabrizio Tivano <fabrizio () sad it>
Plugin 'ebtables': v 2.2, by Bruno Scatolin <ipsystems () uol com br>
Plugin 'watchguard': v 2.3, by Thomas Maier <thomas.maier () arcos de>
Plugin 'email': v 2.7, by Frank Knobbe
 
Parsing config file /etc/snortsam.conf...
Linking plugin 'email'...
Linking plugin 'iptables'...
Checking for existing state file: Present. Reading state.
Starting to listen for Snort alerts.
Accepted connection from 192.168.1.15.
Adding sensor 192.168.1.15 to list.
Had to use initial key!
Snort station 192.168.1.15 using wrong password, trying to re-sync.
Accepted connection from 192.168.1.15.
 
[root@menekse root]# /usr/local/bin/snort -c /etc/snort/snort.conf 
Running in IDS mode
 
Initializing Network Interface eth0
 
        --== Initializing Snort ==--
Initializing Output Plugins!
Decoding Ethernet on interface eth0
Initializing Preprocessors!
Initializing Plug-ins!
Parsing Rules file /etc/snort/snort.conf
 
+++++++++++++++++++++++++++++++++++++++++++++++++++
Initializing rule chains...
,-----------[Flow Config]----------------------
| Stats Interval:  0
| Hash Method:     2
| Memcap:          10485760
| Rows  :          4099
| Overhead Bytes:  16400(%0.16)
`----------------------------------------------
No arguments to frag2 directive, setting defaults to:
    Fragment timeout: 60 seconds
    Fragment memory cap: 4194304 bytes
    Fragment min_ttl:   0
    Fragment ttl_limit: 5
    Fragment Problems: 0
    Self preservation threshold: 500
    Self preservation period: 90
    Suspend threshold: 1000
    Suspend period: 30
Stream4 config:
    Stateful inspection: ACTIVE
    Session statistics: INACTIVE
    Session timeout: 30 seconds
    Session memory cap: 8388608 bytes
    State alerts: INACTIVE
    Evasion alerts: INACTIVE
    Scan alerts: INACTIVE
    Log Flushed Streams: INACTIVE
    MinTTL: 1
    TTL Limit: 5
    Async Link: 0
    State Protection: 0
    Self preservation threshold: 50
    Self preservation period: 90
    Suspend threshold: 200
    Suspend period: 30
    Enforce TCP State: INACTIVE
    Midstream Drop Alerts: INACTIVE
 
Stream4_reassemble config:
    Server reassembly: INACTIVE
    Client reassembly: ACTIVE
    Reassembler alerts: ACTIVE
    Zero out flushed packets: INACTIVE
    flush_data_diff_size: 500
    Ports: 21 23 25 53 80 110 111 143 513 1433 
    Emergency Ports: 21 23 25 53 80 110 111 143 513 1433 
HttpInspect Config:
    GLOBAL CONFIG
      Max Pipeline Requests:    0
      Inspection Type:          STATELESS
      Detect Proxy Usage:       NO
      IIS Unicode Map Filename: /etc/snort/unicode.map
      IIS Unicode Map Codepage: 1252
    DEFAULT SERVER CONFIG:
      Ports: 80 8080 8180 
      Flow Depth: 300
      Max Chunk Length: 500000
      Inspect Pipeline Requests: YES
      URI Discovery Strict Mode: NO
      Allow Proxy Usage: NO
      Disable Alerting: NO
      Oversize Dir Length: 500
      Only inspect URI: NO
      Ascii: YES alert: NO
      Double Decoding: YES alert: YES
      %U Encoding: YES alert: YES
      Bare Byte: YES alert: YES
      Base36: OFF
      UTF 8: OFF
      IIS Unicode: YES alert: YES
      Multiple Slash: YES alert: NO
      IIS Backslash: YES alert: NO
      Directory Traversal: YES alert: NO
      Web Root Traversal: YES alert: YES
      Apache WhiteSpace: YES alert: NO
      IIS Delimiter: YES alert: NO
      IIS Unicode Map: GLOBAL IIS UNICODE MAP CONFIG
      Non-RFC Compliant Characters: NONE
rpc_decode arguments:
    Ports to decode RPC on: 111 32771 
    alert_fragments: INACTIVE
    alert_large_fragments: ACTIVE
    alert_incomplete: ACTIVE
    alert_multiple_requests: ACTIVE
telnet_decode arguments:
    Ports to decode telnet on: 21 23 25 119 
Portscan Detection Config:
    Detect Protocols:  TCP UDP ICMP IP
    Detect Scan Type:  portscan portsweep decoy_portscan
distributed_portscan
    Sensitivity Level: Low
    Memcap (in bytes): 10000000
    Number of Nodes:   36900
 
database: compiled support for ( mysql )
database: configured to use mysql
database:          user = snort
database: password is set
database: database name = snort
database:          host = localhost
database:   sensor name = 192.168.0.15
database:     sensor id = 1
database: schema version = 106
database: using the "log" facility
INFO => [Alert_FWsam](AlertFWsamSetup) Using sid-map file:
/etc/snort/sid-block.map
INFO => [Alert_FWsam](FWsamCheckIn) Connected to host 192.168.1.15.
2190 Snort rules read...
2190 Option Chains linked into 191 Chain Headers
0 Dynamic rules
+++++++++++++++++++++++++++++++++++++++++++++++++++
 
 
+-----------------------[thresholding-config]---------------------------
-------
| memory-cap : 1048576 bytes
+-----------------------[thresholding-global]---------------------------
-------
| none
+-----------------------[thresholding-local]----------------------------
-------
| gen-id=1      sig-id=2495      type=Both       tracking=dst count=20
seconds=60 
| gen-id=1      sig-id=2496      type=Both       tracking=dst count=20
seconds=60 
| gen-id=1      sig-id=2275       type=Threshold tracking=dst count=5
seconds=60 
| gen-id=1      sig-id=2924       type=Threshold tracking=src count=10
seconds=60 
| gen-id=1      sig-id=2494      type=Both       tracking=dst count=20
seconds=60 
| gen-id=1      sig-id=2923       type=Threshold tracking=src count=10
seconds=60 
| gen-id=1      sig-id=2523      type=Both       tracking=dst count=10
seconds=10 
+-----------------------[suppression]-----------------------------------
-------
------------------------------------------------------------------------
-------
Rule application order: ->activation->dynamic->alert->pass->log
Log directory = /var/log/snort
 
        --== Initialization Complete ==--
 
   ,,_     -*> Snort! <*-
  o"  )~   Version 2.3.0RC2 (Build 9)
   ''''    By Martin Roesch & The Snort Team:
http://www.snort.org/team.html
           (C) Copyright 1998-2004 Sourcefire Inc, et al.
 
 

Attachment: sid-block.map
Description:

Attachment: snort.conf
Description:

Attachment: snortsam.conf
Description:


Current thread: