first of all, I am sorry if this topic has been brought up yet in any way.
So far I haven't found anything that would help me out in this case.
As many if you for sure know, this specific rule is triggering on many
false/positives. I have yet set various suppressions on this rule and they
all work - except for one specific session.
suppress gen_id 1, sig_id 2101411, track by_dst, ip 192.168.xx.x
After I have edited the threshold.conf I perform
"sudo nsm_sensor_ps-restart --only-snort-alert"
to restart the snort sensors and apply the suppression.
What I have tried so far:
* suppressing by_dst
* suppressing by_src
* suppressing the hole alert (for testing)
* Adding the source subnet to #HOME_NET in snort.conf
What I haven't done:
Like described in https://code.google.com/p/security-onion/wiki/ManagingAlerts I could create a local rule for that alert, classifying the dst IP in the $OVERACTIVE variable, but I would definately like to find out, why the suppression is not working.
The rule mentioned:
alert udp $EXTERNAL_NET any -> $HOME_NET 161 (msg:"GPL SNMP public access udp"; content:"public"; fast_pattern:only; reference:bugtraq,2112; reference:bugtraq,4088; reference:bugtraq,4089; reference:cve,1999-0517; reference:cve,2002-0012; reference:cve,2002-0013; classtype:attempted-recon; sid:2101411; rev:12;)
I highly appreciate any ideas, sorry if I left out necessary information.
Best wishes,
Tom
I have that SID added to my Disabled file in
[ /etc/nsm/pulledpork/disabledsid.conf ]
# GPL SNMP public access UDP
1:2101411
Did you add the suppression to the following file?
[ /etc/nsm/{ Sensor Interface folder }/threshold.conf ]
Hi
Have you tried, sudo rule-update, after you have updated the threshold.conf file?
Regards,
Lysemose
--
You received this message because you are subscribed to the Google Groups "security-onion" group.
To unsubscribe from this group and stop receiving emails from it, send an email to security-onio...@googlegroups.com.
To post to this group, send email to securit...@googlegroups.com.
Visit this group at http://groups.google.com/group/security-onion.
For more options, visit https://groups.google.com/d/optout.
I have, thanks though!
@Shane Castle:
I appreciate your rant :-) As you mentioned earlier, this Alert is definately an interesting and important one and I fully agree, so by my understanding it would be better to suppress a specific case.
Sadly I am forced to not show the full IP addresses, but I can for sure say that these are correct.
Entry copied out of Threshold.conf:
suppress gen_id 1, sig_id 2101411, track by_dst, ip 192.168.xx.2
Event copied out of Snorby:
Sensor1 192.168.xx.1 192.168.xx.2 GPL SNMP public access udp 6:17 PM
Generator ID Sig. ID Sig.
1 2101411 12
You are definately right about negating $HOME_NET instead of "any" for $EXTERNAL_NET and I will change it asap. Am I correct that a suppression should work regardless of this setting?
Also, even though by_dst pays no attention to by_src, if I suppress either, it should suppress this specific event occuring for the mentioned by_dst IP, shouldn't it? (Not considering which way might be more intelligent in my specific case)
I highly appreciate your help, thanks a lot!
Have a good time,
Tom