Within the disabled.conf I've added ET TOR as to disable tor-based alerts. Prior to doing so here's the output of sudo rule-update:
Processing /etc/nsm/pulledpork/enablesid.conf....
Modified 0 rules
Done
Processing /etc/nsm/pulledpork/dropsid.conf....
Modified 0 rules
Done
Processing /etc/nsm/pulledpork/disablesid.conf....
Modified 51 rules
Done
Setting Flowbit State....
Enabled 54 flowbits
Done
Writing /etc/nsm/rules/downloaded.rules....
Done
Generating sid-msg.map....
Done
Writing v1 /etc/nsm/rules/sid-msg.map....
Done
Writing /var/log/nsm/sid_changes.log....
Done
Rule Stats...
New:-------46
Deleted:---12
Enabled Rules:----26841
Dropped Rules:----0
Disabled Rules:---24236
Total Rules:------51077
No IP Blacklist Changes
Done
Once I add the ET TOR into the disabled.conf file and ran sudo rule-update and the number of enabled rules dropped by 18,367 rules. I understand that some rules are dependent on others but this seems like a drastic change. Is it bad practice to be disabling rules by category?
Here's the output after the change:
Processing /etc/nsm/pulledpork/enablesid.conf....
Modified 0 rules
Done
Processing /etc/nsm/pulledpork/dropsid.conf....
Modified 0 rules
Done
Processing /etc/nsm/pulledpork/disablesid.conf....
Modified 18373 rules
Done
Setting Flowbit State....
Enabled 9 flowbits
Done
Writing /etc/nsm/rules/downloaded.rules....
Done
Generating sid-msg.map....
Done
Writing v1 /etc/nsm/rules/sid-msg.map....
Done
Writing /var/log/nsm/sid_changes.log....
Done
Rule Stats...
New:-------46
Deleted:---12
Enabled Rules:----8474
Dropped Rules:----0
Disabled Rules:---42603
Total Rules:------51077
No IP Blacklist Changes
Done
Thanks!
Kevin
Kevin,
I'm not sure I would say disabling entire categories is bad practice--it all depends on your environment and what you care about.
You can see the listing of categories and the rule count for each in downloaded.rules by running:
cut -d\" -f2 /etc/nsm/rules/downloaded.rules | awk '{print $1, $2}'|sort |uniq -c |sort -nr
Thanks,
Wes
Hi Kevin
Can you provide the content of disablesid.conf
Regards,
Lysemose
--
Follow Security Onion on Twitter!
https://twitter.com/securityonion
---
You received this message because you are subscribed to the Google Groups "security-onion" group.
To unsubscribe from this group and stop receiving emails from it, send an email to security-onio...@googlegroups.com.
To post to this group, send email to securit...@googlegroups.com.
Visit this group at https://groups.google.com/group/security-onion.
For more options, visit https://groups.google.com/d/optout.
You could try "emerging-tor" to see if the results are different.
https://github.com/shirkdog/pulledpork/blob/master/doc/README.CATEGORIES
Thanks,
Wes
Tried commenting out all the rules and ran a rule-update to get a clear idea of the number of rules it would affect. The total enabled rules were 26,841.
Then went back and tried using only "emerging-tor" followed by a rule update and the enabled rule count is still at 26,841. So there was no change using emerging-tor in the disabled.conf file.
Thanks,
Kevin
Kevin,
Try using "ET-emerging-tor". This seems to work for me.
Thanks,
Wes
Gave that a shot and still no change in the number of disabled rules. I'm running suricata, is there anything that differs from how rules would be disabled in snort?
Thanks!
Kevin
Kevin,
It may be a bit different for Suricata.
Try the following:
"ET-tor"
Thanks,
Wes
That seemed to do the trick and adjusted the rules down by the proper amount. So are other categories supposed to be listed like ET-*subject*, VRT-*subject*, GPL-*subject*?
Thanks!
Kevin
For Suricata, this looks to be so.
For Snort, it appears something similar to the following would work:
"ET-emerging-tor" (works for me)
https://github.com/shirkdog/pulledpork/blob/master/doc/README.CATEGORIES
The easiest way to know the specific syntax would probably be to look through downloaded.rules for what whatever category you are looking for.
Thanks,
Wes