Snort-1 Failed (alert Data) Failed ??

3,096 views
Skip to first unread message

Leon Russell

unread,
Jun 10, 2014, 12:22:50 AM6/10/14
to securit...@googlegroups.com
i have a fail : Snort-1 Failed (alert Data) Failed , i tried to restart services and i got "stail pid file found. deleting file" after the services restarted i ran redacted again and same service failed, message says process will be restared in next 5 min interval. Any idea of whats causing this issue? ?

Shane Castle

unread,
Jun 10, 2014, 1:02:42 AM6/10/14
to securit...@googlegroups.com
Check in /var/log/nsm/<sensor>/snortu-1.log for the reason. I'd give
better location info but you are not showing enough information to
extract the full path ID.

--
Mit besten Grüßen
Shane Castle

Leon Russell

unread,
Jun 10, 2014, 12:21:28 PM6/10/14
to securit...@googlegroups.com

here is status :


Service Status
=========================================================================
Status: HIDS
* ossec_agent (sguil)[ OK ]
Status: Bro
Name Type Host Status Pid Peers Started
manager manager X.X.X.X running 39429 2 10 Jun 15:47:41
proxy proxy X.X.X.X running 39482 2 10 Jun 15:48:09
SO-server-eth1-1 worker X.X.X.X running 39580 2 10 Jun 15:48:24
Status: SO-server-eth1
* netsniff-ng (full packet data)[ OK ]
* pcap_agent (sguil)[ FAIL ]
* snort_agent-1 (sguil)[ OK ]
* snort-1 (alert data)[ FAIL ]
* stale PID file found, process will be restarted at the next 5-minute interval!
* barnyard2-1 (spooler, unified2 format)[ OK ]
* prads (sessions/assets)[ OK ]
* sancp_agent (sguil)[ OK ]
* pads_agent (sguil)[ OK ]
* argus[ OK ]
* http_agent (sguil)[ OK ]

=========================================================================
Interface Status
=========================================================================
eth0 Link encap:Ethernet HWaddr MM:MM:MM:MM:MM:MM
UP BROADCAST RUNNING NOARP PROMISC MULTICAST MTU:1500 Metric:1
RX packets:21886 errors:0 dropped:0 overruns:0 frame:0
TX packets:1 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:8430003 (8.4 MB) TX bytes:90 (90.0 B)

eth1 Link encap:Ethernet HWaddr MM:MM:MM:MM:MM:MM
inet addr:X.X.X.X Bcast:X.X.X.X Mask:X.X.X.X
inet6 addr: X.X.X.X/64 Scope:Link
UP BROADCAST RUNNING PROMISC MULTICAST MTU:1500 Metric:1
RX packets:139148 errors:0 dropped:0 overruns:0 frame:0
TX packets:37364 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:73420800 (73.4 MB) TX bytes:3609307 (3.6 MB)

lo Link encap:Local Loopback
inet addr:X.X.X.X Mask:X.X.X.X
inet6 addr: X.X.X.X/128 Scope:Host
UP LOOPBACK RUNNING MTU:16436 Metric:1
RX packets:130382 errors:0 dropped:0 overruns:0 frame:0
TX packets:130382 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
RX bytes:123751667 (123.7 MB) TX bytes:123751667 (123.7 MB)


=========================================================================
Link Statistics
=========================================================================
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 16436 qdisc noqueue state UNKNOWN
link/loopback MM:MM:MM:MM:MM:MM brd MM:MM:MM:MM:MM:MM
RX: bytes packets errors dropped overrun mcast
123751667 130382 0 0 0 0
RX errors: length crc frame fifo missed
0 0 0 0 0
TX: bytes packets errors dropped carrier collsns
123751667 130382 0 0 0 0
TX errors: aborted fifo window heartbeat
0 0 0 0
2: eth0: <BROADCAST,MULTICAST,NOARP,PROMISC,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UP qlen 1000
link/ether MM:MM:MM:MM:MM:MM brd MM:MM:MM:MM:MM:MM
RX: bytes packets errors dropped overrun mcast
8430003 21886 0 0 0 0
RX errors: length crc frame fifo missed
0 0 0 0 0
TX: bytes packets errors dropped carrier collsns
90 1 0 0 0 0
TX errors: aborted fifo window heartbeat
0 0 0 0
3: eth1: <BROADCAST,MULTICAST,PROMISC,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UP qlen 1000
link/ether MM:MM:MM:MM:MM:MM brd MM:MM:MM:MM:MM:MM
RX: bytes packets errors dropped overrun mcast
73420800 139148 0 0 0 0
RX errors: length crc frame fifo missed
0 0 0 0 0
TX: bytes packets errors dropped carrier collsns
3609307 37364 0 0 0 0
TX errors: aborted fifo window heartbeat
0 0 0 0

=========================================================================
Disk Usage
=========================================================================
Filesystem Size Used Avail Use% Mounted on
/dev/sda1 16G 5.0G 10G 34% /
udev 2.0G 4.0K 2.0G 1% /dev
tmpfs 395M 832K 394M 1% /run
none 5.0M 0 5.0M 0% /run/lock
none 2.0G 88K 2.0G 1% /run/shm

=========================================================================
Network Sockets
=========================================================================
COMMAND PID USER FD TYPE DEVICE SIZE/OFF NODE NAME
avahi-dae 788 avahi 12u IPv4 8298 0t0 UDP *:5353
avahi-dae 788 avahi 13u IPv6 8299 0t0 UDP *:5353
avahi-dae 788 avahi 14u IPv4 8300 0t0 UDP *:38139
avahi-dae 788 avahi 15u IPv6 8301 0t0 UDP *:39804
cupsd 792 root 8u IPv6 21616 0t0 TCP [X.X.X.X]:631 (LISTEN)
cupsd 792 root 9u IPv4 21617 0t0 TCP X.X.X.X:631 (LISTEN)
sshd 1492 root 3r IPv4 10318 0t0 TCP *:ssh_port (LISTEN)
sshd 1492 root 4u IPv6 10320 0t0 TCP *:ssh_port (LISTEN)
starman 2538 www-data 5u IPv6 13469 0t0 TCP *:3154 (LISTEN)
starman 2545 www-data 5u IPv6 13469 0t0 TCP *:3154 (LISTEN)
starman 2563 www-data 5u IPv6 13469 0t0 TCP *:3154 (LISTEN)
starman 2585 www-data 5u IPv6 13469 0t0 TCP *:3154 (LISTEN)
starman 2587 www-data 5u IPv6 13469 0t0 TCP *:3154 (LISTEN)
starman 2588 www-data 5u IPv6 13469 0t0 TCP *:3154 (LISTEN)
ntpd 2594 ntp 16u IPv4 13551 0t0 UDP *:123
ntpd 2594 ntp 17u IPv6 13552 0t0 UDP *:123
ntpd 2594 ntp 18u IPv4 13560 0t0 UDP X.X.X.X:123
ntpd 2594 ntp 19u IPv4 13561 0t0 UDP X.X.X.X:123
ntpd 2594 ntp 20u IPv6 13562 0t0 UDP [X.X.X.X]:123
ntpd 2594 ntp 21u IPv6 13563 0t0 UDP [X.X.X.X]:123
ossec-csy 37437 ossecm 5u IPv4 585939 0t0 UDP X.X.X.X:45012->X.X.X.X:514
salt-mini 38899 root 10u IPv4 611606 0t0 TCP X.X.X.X:38286->X.X.X.X:4506 (SYN_SENT)
tclsh 39289 root 3u IPv4 590081 0t0 TCP X.X.X.X:51086->X.X.X.X:7736 (ESTABLISHED)
bro 39429 root 4u IPv4 590082 0t0 UDP X.X.X.X:41092->X.X.X.X:53
bro 39482 root 4u IPv4 590092 0t0 UDP X.X.X.X:40510->X.X.X.X:53
mysqld 39497 mysql 10u IPv4 590320 0t0 TCP X.X.X.X:50000 (LISTEN)
bro 39580 root 4u IPv4 590319 0t0 UDP X.X.X.X:44034->X.X.X.X:53
bro 39775 root 0u IPv4 590762 0t0 TCP X.X.X.X:41661->X.X.X.X:47761 (ESTABLISHED)
bro 39775 root 1u IPv4 590768 0t0 TCP *:47762 (LISTEN)
bro 39775 root 2u IPv6 590769 0t0 TCP *:47762 (LISTEN)
bro 39775 root 4u IPv4 590092 0t0 UDP X.X.X.X:40510->X.X.X.X:53
bro 39775 root 24u IPv4 591051 0t0 TCP X.X.X.X:47762->X.X.X.X:39652 (ESTABLISHED)
bro 39777 root 0u IPv4 590755 0t0 TCP *:47761 (LISTEN)
bro 39777 root 1u IPv6 590756 0t0 TCP *:47761 (LISTEN)
bro 39777 root 2u IPv4 590764 0t0 TCP X.X.X.X:47761->X.X.X.X:41661 (ESTABLISHED)
bro 39777 root 4u IPv4 590082 0t0 UDP X.X.X.X:41092->X.X.X.X:53
bro 39777 root 18u IPv4 591059 0t0 TCP X.X.X.X:47761->X.X.X.X:41663 (ESTABLISHED)
bro 39915 root 0u IPv4 591050 0t0 TCP X.X.X.X:39652->X.X.X.X:47762 (ESTABLISHED)
bro 39915 root 1u IPv4 591058 0t0 TCP X.X.X.X:41663->X.X.X.X:47761 (ESTABLISHED)
bro 39915 root 2u IPv4 591062 0t0 TCP *:47763 (LISTEN)
bro 39915 root 4u IPv4 590319 0t0 UDP X.X.X.X:44034->X.X.X.X:53
bro 39915 root 20u IPv6 591063 0t0 TCP *:47763 (LISTEN)
tclsh 39920 root 3u IPv4 591150 0t0 TCP X.X.X.X:51091->X.X.X.X:7736 (ESTABLISHED)
tclsh 39920 root 4u IPv4 591185 0t0 TCP X.X.X.X:8001 (LISTEN)
tclsh 39920 root 5u IPv4 593939 0t0 TCP X.X.X.X:8001->X.X.X.X:36662 (ESTABLISHED)
barnyard2 40027 root 3u IPv4 593938 0t0 TCP X.X.X.X:36662->X.X.X.X:8001 (ESTABLISHED)
barnyard2 40027 root 4u IPv4 604245 0t0 TCP X.X.X.X:46567->X.X.X.X:3306 (ESTABLISHED)
tclsh 40108 root 3u IPv4 591879 0t0 TCP X.X.X.X:51093->X.X.X.X:7736 (ESTABLISHED)
tclsh 40348 root 3u IPv4 592640 0t0 TCP X.X.X.X:51095->X.X.X.X:7736 (ESTABLISHED)
tclsh 40550 root 3u IPv4 593198 0t0 TCP X.X.X.X:51098->X.X.X.X:7736 (ESTABLISHED)
searchd 41387 sphinxsearch 7u IPv4 596328 0t0 TCP *:9306 (LISTEN)
searchd 41387 sphinxsearch 8u IPv4 596329 0t0 TCP *:9312 (LISTEN)
syslog-ng 41396 root 12u IPv4 596386 0t0 TCP *:514 (LISTEN)
syslog-ng 41396 root 13u IPv4 596387 0t0 UDP *:514
ssh 43601 root 3r IPv4 604189 0t0 TCP X.X.X.X:37293->X.X.X.X:ssh_port (ESTABLISHED)
ssh 43601 root 4u IPv6 604192 0t0 TCP [X.X.X.X]:3306 (LISTEN)
ssh 43601 root 5u IPv4 604193 0t0 TCP X.X.X.X:3306 (LISTEN)
ssh 43601 root 6u IPv4 604246 0t0 TCP X.X.X.X:3306->X.X.X.X:46567 (ESTABLISHED)

=========================================================================
CPU Usage
=========================================================================
top - 16:13:14 up 14:51, 1 user, load average: 2.19, 2.37, 5.00
Tasks: 216 total, 2 running, 212 sleeping, 0 stopped, 2 zombie
Cpu(s): 8.9%us, 2.5%sy, 0.0%ni, 87.3%id, 1.2%wa, 0.0%hi, 0.1%si, 0.0%st
Mem: 4042816k total, 3637164k used, 405652k free, 174984k buffers
Swap: 6213656k total, 9300k used, 6204356k free, 1395056k cached

%CPU %MEM COMMAND
35.5 3.3 /usr/bin/indexer --config /etc/sphinxsearch/sphinx.conf --rotate temp_83
14.6 1.3 perl /opt/elsa/web/cron.pl -c /etc/elsa_web.conf
9.4 0.0 /var/ossec/bin/ossec-syscheckd
6.1 2.6 /opt/bro/bin/bro -i eth1 -U .status -p broctl -p broctl-live -p local -p SO-server-eth1-1 local.bro broctl base/frameworks/cluster local-worker.bro broctl/auto
5.2 1.5 barnyard2 -c /etc/nsm/SO-server-eth1/barnyard2-1.conf -d /nsm/sensor_data/SO-server-eth1/snort-1 -f snort.unified2 -w /etc/nsm/SO-server-eth1/barnyard2.waldo-1 -i 1 -U
4.4 0.5 /opt/bro/bin/bro -U .status -p broctl -p broctl-live -p local -p proxy local.bro broctl base/frameworks/cluster local-proxy broctl/auto
4.4 0.6 /opt/bro/bin/bro -U .status -p broctl -p broctl-live -p local -p manager local.bro broctl base/frameworks/cluster local-manager.bro broctl/auto
2.9 2.2 /opt/bro/bin/bro -i eth1 -U .status -p broctl -p broctl-live -p local -p SO-server-eth1-1 local.bro broctl base/frameworks/cluster local-worker.bro broctl/auto
2.5 0.8 /opt/bro/bin/bro -U .status -p broctl -p broctl-live -p local -p manager local.bro broctl base/frameworks/cluster local-manager.bro broctl/auto
2.2 0.6 /usr/bin/python /usr/bin/salt-minion
2.1 1.4 /usr/sbin/mysqld
2.0 0.6 /opt/bro/bin/bro -U .status -p broctl -p broctl-live -p local -p proxy local.bro broctl base/frameworks/cluster local-proxy broctl/auto
1.7 7.6 /usr/bin/searchd --nodetach
1.5 0.1 bash
1.0 1.0 perl /opt/elsa/node/elsa.pl -c /etc/elsa_node.conf
0.7 0.1 tclsh /etc/nsm/ossec/ossec_agent.tcl -o -f /var/ossec/logs/alerts/alerts.log -i X.X.X.X -p 5 -c /etc/nsm/ossec/ossec_agent.conf
0.6 0.3 /usr/bin/xfce4-terminal
0.5 2.3 delayed_job
0.3 0.0 CRON
0.3 0.0 /var/ossec/bin/ossec-analysisd
0.2 0.1 argus -i eth1 -F /etc/nsm/SO-server-eth1/argus.conf -w /nsm/sensor_data/SO-server-eth1/argus/2014-06-10.log
0.2 0.0 sudo sostat-redacted
0.2 0.0 [jbd2/sda1-8]
0.2 0.0 su -c salt-minion
0.1 3.8 /usr/lib/firefox/firefox
0.1 0.0 [kworker/0:1]
0.1 1.8 netsniff-ng -i eth1 -o /nsm/sensor_data/SO-server-eth1/dailylogs/2014-06-10/ --user 1001 --group 1001 -s --prefix snort.log. --verbose --ring-size 64 iB --interval 150 iB --mmap
0.1 0.9 /usr/bin/X :0 -auth /var/run/lightdm/root/:0 -nolisten tcp vt7 -novtswitch -background none
0.1 0.1 prads -i eth1 -c /etc/nsm/SO-server-eth1/prads.conf -u sguil -g sguil -L /nsm/sensor_data/SO-server-eth1/sancp/ -f /nsm/sensor_data/SO-server-eth1/pads.fifo -b ip or (vlan and ip)
0.0 0.1 /usr/sbin/syslog-ng -p /var/run/syslog-ng.pid
0.0 0.0 /bin/sh -c perl /opt/elsa/web/cron.pl -c /etc/elsa_web.conf > /dev/null 2>&1
0.0 0.1 tclsh /usr/bin/pads_agent.tcl -c /etc/nsm/SO-server-eth1/pads_agent.conf
0.0 0.1 tclsh /usr/bin/sancp_agent.tcl -c /etc/nsm/SO-server-eth1/sancp_agent.conf
0.0 0.0 [flush-8:0]
0.0 0.0 [kswapd0]
0.0 0.0 [watchdog/0]
0.0 2.7 starman worker -I/opt/elsa/web/lib --user=www-data --listen :3154 --daemonize --pid /var/run/starman.pid --error-log /var/log/starman.log /opt/elsa/web/lib/Web.psgi
0.0 0.8 pidgin
0.0 2.6 starman worker -I/opt/elsa/web/lib --user=www-data --listen :3154 --daemonize --pid /var/run/starman.pid --error-log /var/log/starman.log /opt/elsa/web/lib/Web.psgi
0.0 0.6 xfdesktop
0.0 2.7 starman worker -I/opt/elsa/web/lib --user=www-data --listen :3154 --daemonize --pid /var/run/starman.pid --error-log /var/log/starman.log /opt/elsa/web/lib/Web.psgi
0.0 2.6 starman worker -I/opt/elsa/web/lib --user=www-data --listen :3154 --daemonize --pid /var/run/starman.pid --error-log /var/log/starman.log /opt/elsa/web/lib/Web.psgi
0.0 2.7 starman worker -I/opt/elsa/web/lib --user=www-data --listen :3154 --daemonize --pid /var/run/starman.pid --error-log /var/log/starman.log /opt/elsa/web/lib/Web.psgi
0.0 0.1 tclsh /usr/bin/snort_agent.tcl -c /etc/nsm/SO-server-eth1/snort_agent-1.conf
0.0 0.0 avahi-daemon: running [SO-server.local]
0.0 0.1 tclsh /usr/bin/http_agent.tcl -c /etc/nsm/SO-server-eth1/http_agent.conf -e /etc/nsm/SO-server-eth1/http_agent.exclude -f /nsm/bro/logs/current/http_eth1.log
0.0 0.4 nm-applet
0.0 0.0 /usr/sbin/ntpd -p /var/run/ntpd.pid -g -u 118:126
0.0 0.1 /usr/lib/policykit-1/polkitd --no-debug
0.0 0.0 //bin/dbus-daemon --fork --print-pid 5 --print-address 7 --session
0.0 0.5 /usr/bin/python /usr/share/system-config-printer/applet.py
0.0 0.0 /sbin/init
0.0 0.0 /usr/bin/ssh -q -N -o ServerAliveInterval 60 -o ServerAliveCountMax 3 -i /root/.ssh/securityonion -L 3306:X.X.X.X:3306 -R 50000:localhost:3154 secu...@X.X.X.X
0.0 0.0 bash /opt/bro/share/broctl/scripts/run-bro -1 -U .status -p broctl -p broctl-live -p local -p manager local.bro broctl base/frameworks/cluster local-manager.bro broctl/auto
0.0 0.1 /usr/bin/pulseaudio --start --log-target=syslog
0.0 0.1 /usr/lib/indicator-messages/indicator-messages-service
0.0 0.2 xfwm4 --replace
0.0 0.3 update-notifier
0.0 0.0 /usr/sbin/console-kit-daemon --no-daemon
0.0 0.5 xfce4-panel
0.0 0.0 [ksoftirqd/0]
0.0 0.1 /usr/lib/policykit-1-gnome/polkit-gnome-authentication-agent-1
0.0 0.0 dbus-daemon --system --fork --activation=upstart
0.0 0.0 su -s /bin/sh -c exec "$0" "$@" sphinxsearch -- /usr/bin/searchd --nodetach
0.0 0.3 /usr/lib/x86_64-linux-gnu/xfce4/panel-plugins/xfce4-indicator-plugin 5 16777250 indicator Indicator Plugin An indicator of something that needs your attention on the desktop
0.0 0.0 [kworker/u:0]
0.0 0.0 xscreensaver -no-splash
0.0 0.0 /usr/lib/rtkit/rtkit-daemon
0.0 0.0 /usr/lib/udisks/udisks-daemon
0.0 0.1 /usr/lib/accountsservice/accounts-daemon
0.0 0.7 /usr/bin/python /usr/bin/blueman-applet
0.0 0.0 cron
0.0 0.0 /usr/sbin/cupsd -F
0.0 0.0 /bin/sh -c perl /opt/elsa/node/elsa.pl -c /etc/elsa_node.conf
0.0 0.0 supervising syslog-ng
0.0 0.2 starman master -I/opt/elsa/web/lib --user=www-data --listen :3154 --daemonize --pid /var/run/starman.pid --error-log /var/log/starman.log /opt/elsa/web/lib/Web.psgi
0.0 0.1 /usr/lib/upower/upowerd
0.0 0.2 /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper /usr/lib/xfce4/panel-plugins/libdatetime.so 7 16777251 datetime DateTime Date and Time plugin with a simple calendar
0.0 0.0 cat /nsm/sensor_data/SO-server-eth1/pads.fifo
0.0 0.0 upstart-socket-bridge --daemon
0.0 0.0 [sh] <defunct>
0.0 0.2 /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libxfsm-logout-plugin.so 9 16777257 xfsm-logout-plugin Session Menu Shows a menu with options to lock the screen, suspend, shutdown, or log out
0.0 0.0 [kthreadd]
0.0 0.1 Thunar --daemon
0.0 0.1 /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libsystray.so 4 16777249 systray Notification Area Area where notification icons appear
0.0 0.0 /var/ossec/bin/ossec-logcollector
0.0 0.1 xfce4-power-manager
0.0 0.1 /usr/lib/gvfs/gvfs-gdu-volume-monitor
0.0 0.2 /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libthunar-tpa.so 24 16777264 thunar-tpa Trash Applet Display the trash can
0.0 0.0 /sbin/udevd --daemon
0.0 0.0 upstart-udev-bridge --daemon
0.0 0.0 /usr/lib/gvfs/gvfsd-trash --spawner :1.12 /org/gtk/gvfs/exec_spaw/0
0.0 0.1 /usr/lib/indicator-sound/indicator-sound-service
0.0 0.0 /usr/bin/ssh-agent /usr/bin/dbus-launch --exit-with-session startxfce4
0.0 0.0 atd
0.0 0.0 /var/ossec/bin/ossec-monitord
0.0 0.0 xfce4-settings-helper
0.0 0.0 /usr/lib/x86_64-linux-gnu/gconf/gconfd-2
0.0 0.1 /usr/lib/indicator-application/indicator-application-service
0.0 0.0 [sync_supers]
0.0 0.0 /sbin/udevd --daemon
0.0 0.0 /usr/lib/xfce4/xfconf/xfconfd
0.0 0.2 xfce4-volumed
0.0 0.1 /usr/bin/gnome-keyring-daemon --start --foreground --components=secrets
0.0 0.0 /usr/lib/gvfs/gvfsd
0.0 0.0 /var/ossec/bin/ossec-csyslogd
0.0 0.0 /usr/bin/obex-data-server --no-daemon
0.0 0.0 /usr/sbin/bluetoothd
0.0 0.0 xfsettingsd --force
0.0 0.0 //bin/dbus-daemon --fork --print-pid 5 --print-address 7 --session
0.0 0.1 xfce4-session
0.0 0.0 /usr/lib/gvfs/gvfs-afc-volume-monitor
0.0 0.0 [khungtaskd]
0.0 0.1 lightdm
0.0 0.0 /usr/lib/gvfs/gvfs-gphoto2-volume-monitor
0.0 0.1 lightdm --session-child 12 15
0.0 0.0 [scsi_eh_30]
0.0 0.0 [scsi_eh_31]
0.0 0.0 /bin/sh /etc/xdg/xfce4/xinitrc -- /etc/X11/xinit/xserverrc
0.0 0.0 /sbin/getty -8 38400 tty1
0.0 0.1 /usr/lib/at-spi2-core/at-spi-bus-launcher
0.0 0.0 [migration/0]
0.0 0.0 [cpuset]
0.0 0.0 [khelper]
0.0 0.0 [kdevtmpfs]
0.0 0.0 [netns]
0.0 0.0 [bdi-default]
0.0 0.0 [kintegrityd]
0.0 0.0 [kblockd]
0.0 0.0 [ata_sff]
0.0 0.0 [khubd]
0.0 0.0 [md]
0.0 0.0 [ksmd]
0.0 0.0 [khugepaged]
0.0 0.0 [fsnotify_mark]
0.0 0.0 [ecryptfs-kthrea]
0.0 0.0 [crypto]
0.0 0.0 [kthrotld]
0.0 0.0 [scsi_eh_0]
0.0 0.0 [scsi_eh_1]
0.0 0.0 [scsi_eh_2]
0.0 0.0 [scsi_eh_3]
0.0 0.0 [scsi_eh_4]
0.0 0.0 [scsi_eh_5]
0.0 0.0 [scsi_eh_6]
0.0 0.0 [scsi_eh_7]
0.0 0.0 [scsi_eh_8]
0.0 0.0 [scsi_eh_9]
0.0 0.0 [scsi_eh_10]
0.0 0.0 [scsi_eh_11]
0.0 0.0 [scsi_eh_12]
0.0 0.0 [scsi_eh_13]
0.0 0.0 [scsi_eh_14]
0.0 0.0 [scsi_eh_15]
0.0 0.0 [scsi_eh_16]
0.0 0.0 [scsi_eh_17]
0.0 0.0 [scsi_eh_18]
0.0 0.0 [scsi_eh_19]
0.0 0.0 [scsi_eh_20]
0.0 0.0 [scsi_eh_21]
0.0 0.0 [scsi_eh_22]
0.0 0.0 [scsi_eh_23]
0.0 0.0 [scsi_eh_24]
0.0 0.0 [scsi_eh_25]
0.0 0.0 [scsi_eh_26]
0.0 0.0 [scsi_eh_27]
0.0 0.0 [scsi_eh_28]
0.0 0.0 [scsi_eh_29]
0.0 0.0 [kworker/u:32]
0.0 0.0 [devfreq_wq]
0.0 0.0 [mpt_poll_0]
0.0 0.0 [mpt/0]
0.0 0.0 [scsi_eh_32]
0.0 0.0 [ttm_swap]
0.0 0.0 [ext4-dio-unwrit]
0.0 0.0 [krfcommd]
0.0 0.0 avahi-daemon: chroot helper
0.0 0.0 [hci0]
0.0 0.0 [kmpathd]
0.0 0.0 [kmpath_handlerd]
0.0 0.0 /sbin/udevd --daemon
0.0 0.0 [kpsmoused]
0.0 0.0 /usr/sbin/sshd -D
0.0 0.0 /sbin/getty -8 38400 tty4
0.0 0.0 /sbin/getty -8 38400 tty5
0.0 0.0 /sbin/getty -8 38400 tty2
0.0 0.0 /sbin/getty -8 38400 tty3
0.0 0.0 /sbin/getty -8 38400 tty6
0.0 0.0 acpid -c /etc/acpi/events -s /var/run/acpid.socket
0.0 0.0 /usr/bin/dbus-launch --exit-with-session startxfce4
0.0 0.0 /usr/lib/gvfs//gvfs-fuse-daemon -f /home/SO-user/.gvfs
0.0 0.0 udisks-daemon: not polling any devices
0.0 0.0 dbus-launch --autolaunch 7eee5fce1d633a4dee1892fe00000012 --binary-syntax --close-stderr
0.0 0.0 /var/ossec/bin/ossec-execd
0.0 0.0 bash /opt/bro/share/broctl/scripts/run-bro -1 -U .status -p broctl -p broctl-live -p local -p proxy local.bro broctl base/frameworks/cluster local-proxy broctl/auto
0.0 0.0 tail -n 0 -F /var/ossec/logs/alerts/alerts.log
0.0 0.0 bash /opt/bro/share/broctl/scripts/run-bro -1 -i eth1 -U .status -p broctl -p broctl-live -p local -p SO-server-eth1-1 local.bro broctl base/frameworks/cluster local-worker.bro broctl/auto
0.0 0.0 tail -n 0 -F /nsm/bro/logs/current/http_eth1.log
0.0 0.0 [kworker/0:0]
0.0 0.0 /usr/lib/autossh/autossh -M 0 -q -N -o ServerAliveInterval 60 -o ServerAliveCountMax 3 -i /root/.ssh/securityonion -L 3306:X.X.X.X:3306 -R 50000:localhost:3154 secu...@X.X.X.X
0.0 0.0 sh -c grep -v "^#" /etc/nsm/sensortab |awk '{print $4}' |while read SENSOR; do echo -n "$SENSOR: "; RX1=`ifconfig $SENSOR |awk '/RX packets/ {print $2}' |cut -d\: -f2`; sleep 600; RX2=`ifconfig $SENSOR |awk '/RX packets/ {print $2}' |cut -d\: -f2`; expr $RX2 - $RX1; done
0.0 0.0 sh -c grep -v "^#" /etc/nsm/sensortab |awk '{print $4}' |while read SENSOR; do echo -n "$SENSOR: "; RX1=`ifconfig $SENSOR |awk '/RX packets/ {print $2}' |cut -d\: -f2`; sleep 600; RX2=`ifconfig $SENSOR |awk '/RX packets/ {print $2}' |cut -d\: -f2`; expr $RX2 - $RX1; done
0.0 0.0 sleep 600
0.0 0.0 [xfce4-terminal] <defunct>
0.0 0.0 /bin/bash /usr/bin/sostat-redacted
0.0 0.0 /bin/bash /usr/bin/sostat
0.0 0.0 sed -r s/(\b[0-9]{1,3}\.){3}[0-9]{1,3}\b/X.X.X.X/g
0.0 0.0 sed -r s/([0-9a-fA-F]{2}:){5}[0-9a-fA-F]{2}/MM:MM:MM:MM:MM:MM/g
0.0 0.0 sed -r s/(([0-9a-fA-F]{1,4}:){7,7}[0-9a-fA-F]{1,4}|([0-9a-fA-F]{1,4}:){1,7}:|([0-9a-fA-F]{1,4}:){1,6}:[0-9a-fA-F]{1,4}|([0-9a-fA-F]{1,4}:){1,5}(:[0-9a-fA-F]{1,4}){1,2}|([0-9a-fA-F]{1,4}:){1,4}(:[0-9a-fA-F]{1,4}){1,3}|([0-9a-fA-F]{1,4}:){1,3}(:[0-9a-fA-F]{1,4}){1,4}|([0-9a-fA-F]{1,4}:){1,2}(:[0-9a-fA-F]{1,4}){1,5}|[0-9a-fA-F]{1,4}:((:[0-9a-fA-F]{1,4}){1,6})|:((:[0-9a-fA-F]{1,4}){1,7}|:)|fe80:(:[0-9a-fA-F]{0,4}){0,4}%[0-9a-zA-Z]{1,}|::(ffff(:0{1,4}){0,1}:){0,1}((25[0-5]|(2[0-4]|1{0,1}[0-9]){0,1}[0-9]).){3,3}(25[0-5]|(2[0-4]|1{0,1}[0-9]){0,1}[0-9])|([0-9a-fA-F]{1,4}:){1,4}:((25[0-5]|(2[0-4]|1{0,1}[0-9]){0,1}[0-9]).){3,3}(25[0-5]|(2[0-4]|1{0,1}[0-9]){0,1}[0-9]))\b/X.X.X.X/g
0.0 0.0 sed -r s/X:ssh_port/X:ssh_port/g
0.0 0.0 sed -r s/\*:ssh_port/*:ssh_port/g
0.0 0.0 sed -r s/SO-server/SO-server/g
0.0 0.0 sed -r s/SO-node/SO-node/g
0.0 0.0 sed -r s/SO-user/SO-user/g
0.0 0.0 ps -eo pcpu,pmem,args --sort -pcpu

=========================================================================
Log Archive
=========================================================================
/nsm/sensor_data/SO-server-eth1/dailylogs/ - 1 days
7.2M .
7.2M ./2014-06-10

/nsm/bro/logs/ - 7 days
21M .
452K ./2014-06-04
3.9M ./2014-06-05
4.5M ./2014-06-06
3.6M ./2014-06-07
2.3M ./2014-06-08
1.5M ./2014-06-09
192K ./2014-06-10
4.2M ./stats

=========================================================================
Bro netstats
=========================================================================
Average packet loss as percent across all Bro workers: 0.000000

SO-server-eth1-1: 1402416795.575872 recvd=10923 dropped=0 link=10923

=========================================================================
IDS Engine (snort) packet drops
=========================================================================
ERROR: No stats found in /nsm/sensor_data/*/snort-*.stats

=========================================================================
pf_ring stats
=========================================================================
PF_RING Version : 5.6.1 ($Revision: $)
Total rings : 1

Standard (non DNA) Options
Ring slots : 4096
Slot version : 15
Capture TX : Yes [RX+TX]
IP Defragment : No
Socket Mode : Standard
Transparent mode : Yes [mode 0]
Total plugins : 0
Cluster Fragment Queue : 0
Cluster Fragment Discard : 0

/proc/net/pf_ring/39580-eth1.4
Appl. Name : <unknown>
Tot Packets : 10926
Tot Pkt Lost : 0
TX: Send Errors : 0
Reflect: Fwd Errors: 0
Min Num Slots : 8151
Num Free Slots : 8151

=========================================================================
Netsniff-NG - Reported Packet Loss (per interval)
=========================================================================
0 Loss

=========================================================================
Snorby Events Summary for yesterday
=========================================================================
Total
0

=========================================================================
Top 50 All Time Snorby Events
=========================================================================
Total
0

=========================================================================
ELSA
=========================================================================
Syslog-ng
Checking for process:
41395 supervising syslog-ng
41396 /usr/sbin/syslog-ng -p /var/run/syslog-ng.pid
Checking for connection:
Connection to localhost 514 port [tcp/shell] succeeded!

MySQL
Checking for process:
39497 /usr/sbin/mysqld
Checking for connection:
Connection to localhost 50000 port [tcp/*] succeeded!

Sphinx
Checking for process:
41364 su -s /bin/sh -c exec "$0" "$@" sphinxsearch -- /usr/bin/searchd --nodetach
45421 /usr/bin/indexer --config /etc/sphinxsearch/sphinx.conf --rotate temp_83
Checking for connection:
Connection to localhost 9306 port [tcp/*] succeeded!

ELSA Buffers in Queue:
-rw-r--r-- 1 root root 6414 Jun 10 16:13 /nsm/elsa/data/elsa/tmp/buffers/1402416778.18762
-rw-r--r-- 1 root root 68 Jun 10 16:13 /nsm/elsa/data/elsa/tmp/buffers/host_stats.tsv

ELSA Directory Sizes:
384M /nsm/elsa/data
1.1M /var/lib/mysql/syslog
19M /var/lib/mysql/syslog_data

ELSA Index Date Range:
MIN(start) MAX(end)
2014-06-04 15:35:57 2014-06-10 16:12:57

autossh
Checking for process:
43599 /usr/lib/autossh/autossh -M 0 -q -N -o ServerAliveInterval 60 -o ServerAliveCountMax 3 -i /root/.ssh/securityonion -L 3306:X.X.X.X:3306 -R 50000:localhost:3154 secu...@X.X.X.X

Checking APIKEY:
APIKEY not found on master server.

starman
Checking for processes:
2538 starman master -I/opt/elsa/web/lib --user=www-data --listen :3154 --daemonize --pid /var/run/starman.pid --error-log /var/log/starman.log /opt/elsa/web/lib/Web.psgi
2545 starman worker -I/opt/elsa/web/lib --user=www-data --listen :3154 --daemonize --pid /var/run/starman.pid --error-log /var/log/starman.log /opt/elsa/web/lib/Web.psgi
2563 starman worker -I/opt/elsa/web/lib --user=www-data --listen :3154 --daemonize --pid /var/run/starman.pid --error-log /var/log/starman.log /opt/elsa/web/lib/Web.psgi
2585 starman worker -I/opt/elsa/web/lib --user=www-data --listen :3154 --daemonize --pid /var/run/starman.pid --error-log /var/log/starman.log /opt/elsa/web/lib/Web.psgi
2587 starman worker -I/opt/elsa/web/lib --user=www-data --listen :3154 --daemonize --pid /var/run/starman.pid --error-log /var/log/starman.log /opt/elsa/web/lib/Web.psgi
2588 starman worker -I/opt/elsa/web/lib --user=www-data --listen :3154 --daemonize --pid /var/run/starman.pid --error-log /var/log/starman.log /opt/elsa/web/lib/Web.psgi
lex@lex-virtual-machine:~$
lex@lex-virtual-machine:~$ cd /var/log/nsm/
lex@lex-virtual-machine:/var/log/nsm$ ls
lex-virtual-machine-eth1 sensor-clean.log sosetup.log
ossec_agent.log so-elsa watchdog.log
lex@lex-virtual-machine:/var/log/nsm$

Heine Lysemose

unread,
Jun 10, 2014, 2:17:48 PM6/10/14
to securit...@googlegroups.com

Hi

Check Shane's comment.

Regards,
Lysemose

--
You received this message because you are subscribed to the Google Groups "security-onion" group.
To unsubscribe from this group and stop receiving emails from it, send an email to security-onio...@googlegroups.com.
To post to this group, send email to securit...@googlegroups.com.
Visit this group at http://groups.google.com/group/security-onion.
For more options, visit https://groups.google.com/d/optout.
Message has been deleted

Doug Burks

unread,
Jun 10, 2014, 3:27:04 PM6/10/14
to securit...@googlegroups.com
Have you checked /var/log/nsm/SO-server-eth1/snortu-1.log?

On Tue, Jun 10, 2014 at 3:24 PM, Leon Russell <lrusse...@gmail.com> wrote:
> i cant seem to find that log, its definitely not at that path
>
> --
> You received this message because you are subscribed to the Google Groups "security-onion" group.
> To unsubscribe from this group and stop receiving emails from it, send an email to security-onio...@googlegroups.com.
> To post to this group, send email to securit...@googlegroups.com.
> Visit this group at http://groups.google.com/group/security-onion.
> For more options, visit https://groups.google.com/d/optout.



--
Doug Burks

Leon Russell

unread,
Jun 10, 2014, 3:28:20 PM6/10/14
to securit...@googlegroups.com
Should i post that log here ? im in it but dont know what im looking at

Leon Russell

unread,
Jun 10, 2014, 3:29:54 PM6/10/14
to securit...@googlegroups.com
Executing: snort -c /etc/nsm/lex-virtual-machine-eth1/snort.conf -u sguil -g sguil -i eth1 -F /etc/nsm/lex-virtual-machine-eth1/bpf-ids.conf -l /nsm/sensor_data/lex-virtual-machine-eth1/snort-1 --perfmon-file /nsm/sensor_data/lex-virtual-machine-eth1/snort-1.stats -U -m 112
Running in IDS mode

--== Initializing Snort ==--
Initializing Output Plugins!
Initializing Preprocessors!
Initializing Plug-ins!
Parsing Rules file "/etc/nsm/lex-virtual-machine-eth1/snort.conf"
PortVar 'DNP3_PORTS' defined : [ 20000 ]
PortVar 'HTTP_PORTS' defined : [ 36 80:90 311 383 555 591 593 631 801 808 818 901 972 1158 1220 1414 1533 1741 1830 2231 2301 2381 2809 3029 3037 3057 3128 3443 3702 4000 4343 4848 5117 5250 6080 6173 6988 7000:7001 7144:7145 7510 7770 7777 7779 8000 8008 8014 8028 8080:8082 8085 8088 8090 8118 8123 8180:8181 8222 8243 8280 8300 8500 8509 8800 8888 8899 9000 9060 9080 9090:9091 9111 9443 9999:10000 11371 12601 15489 29991 33300 34412 34443:34444 41080 44449 50000 50002 51423 53331 55252 55555 56712 ]
PortVar 'SHELLCODE_PORTS' defined : [ 0:79 81:65535 ]
PortVar 'ORACLE_PORTS' defined : [ 1024:65535 ]
PortVar 'SSH_PORTS' defined : [ 22 ]
PortVar 'FTP_PORTS' defined : [ 21 2100 3535 ]
PortVar 'SIP_PORTS' defined : [ 5060:5061 5600 ]
PortVar 'FILE_DATA_PORTS' defined : [ 36 80:90 110 143 311 383 555 591 593 631 801 808 818 901 972 1158 1220 1414 1533 1741 1830 2231 2301 2381 2809 3029 3037 3057 3128 3443 3702 4000 4343 4848 5117 5250 6080 6173 6988 7000:7001 7144:7145 7510 7770 7777 7779 8000 8008 8014 8028 8080:8082 8085 8088 8090 8118 8123 8180:8181 8222 8243 8280 8300 8500 8509 8800 8888 8899 9000 9060 9080 9090:9091 9111 9443 9999:10000 11371 12601 15489 29991 33300 34412 34443:34444 41080 44449 50000 50002 51423 53331 55252 55555 56712 ]
PortVar 'GTP_PORTS' defined : [ 2123 2152 3386 ]
Detection:
Search-Method = AC-Full-Q
Split Any/Any group = enabled
Search-Method-Optimizations = enabled
Maximum pattern length = 20
WARNING: /etc/nsm/lex-virtual-machine-eth1/classification.config(9) Duplicate classification "/etc/nsm/lex-virtual-machine-eth1/classification.config"found, ignoring this line

WARNING: /etc/nsm/lex-virtual-machine-eth1/classification.config(20) Duplicate classification "/etc/nsm/lex-virtual-machine-eth1/classification.config"found, ignoring this line

WARNING: /etc/nsm/lex-virtual-machine-eth1/classification.config(27) Duplicate classification "/etc/nsm/lex-virtual-machine-eth1/classification.config"found, ignoring this line

WARNING: /etc/nsm/lex-virtual-machine-eth1/classification.config(29) Duplicate classification "/etc/nsm/lex-virtual-machine-eth1/classification.config"found, ignoring this line

WARNING: /etc/nsm/lex-virtual-machine-eth1/classification.config(36) Duplicate classification "/etc/nsm/lex-virtual-machine-eth1/classification.config"found, ignoring this line

WARNING: /etc/nsm/lex-virtual-machine-eth1/classification.config(38) Duplicate classification "/etc/nsm/lex-virtual-machine-eth1/classification.config"found, ignoring this line

WARNING: /etc/nsm/lex-virtual-machine-eth1/classification.config(40) Duplicate classification "/etc/nsm/lex-virtual-machine-eth1/classification.config"found, ignoring this line

WARNING: /etc/nsm/lex-virtual-machine-eth1/classification.config(42) Duplicate classification "/etc/nsm/lex-virtual-machine-eth1/classification.config"found, ignoring this line

WARNING: /etc/nsm/lex-virtual-machine-eth1/classification.config(44) Duplicate classification "/etc/nsm/lex-virtual-machine-eth1/classification.config"found, ignoring this line

WARNING: /etc/nsm/lex-virtual-machine-eth1/classification.config(48) Duplicate classification "/etc/nsm/lex-virtual-machine-eth1/classification.config"found, ignoring this line

WARNING: /etc/nsm/lex-virtual-machine-eth1/classification.config(50) Duplicate classification "/etc/nsm/lex-virtual-machine-eth1/classification.config"found, ignoring this line

Tagged Packet Limit: 256
Reading filter from bpf file: /etc/nsm/lex-virtual-machine-eth1/bpf-ids.conf
Snort BPF option:
Loading dynamic engine /usr/lib/snort_dynamicengine/libsf_engine.so... done
Loading all dynamic detection libs from /usr/local/lib/snort_dynamicrules...
WARNING: No dynamic libraries found in directory /usr/local/lib/snort_dynamicrules.
Finished Loading all dynamic detection libs from /usr/local/lib/snort_dynamicrules
Loading all dynamic preprocessor libs from /usr/lib/snort_dynamicpreprocessor/...
Loading dynamic preprocessor library /usr/lib/snort_dynamicpreprocessor//libsf_sip_preproc.so... done
Loading dynamic preprocessor library /usr/lib/snort_dynamicpreprocessor//libsf_dns_preproc.so... done
Loading dynamic preprocessor library /usr/lib/snort_dynamicpreprocessor//libsf_sdf_preproc.so... done
Loading dynamic preprocessor library /usr/lib/snort_dynamicpreprocessor//libsf_imap_preproc.so... done
Loading dynamic preprocessor library /usr/lib/snort_dynamicpreprocessor//libsf_pop_preproc.so... done
Loading dynamic preprocessor library /usr/lib/snort_dynamicpreprocessor//libsf_ftptelnet_preproc.so... done
Loading dynamic preprocessor library /usr/lib/snort_dynamicpreprocessor//libsf_ssh_preproc.so... done
Loading dynamic preprocessor library /usr/lib/snort_dynamicpreprocessor//libsf_gtp_preproc.so... done
Loading dynamic preprocessor library /usr/lib/snort_dynamicpreprocessor//libsf_dce2_preproc.so... done
Loading dynamic preprocessor library /usr/lib/snort_dynamicpreprocessor//libsf_modbus_preproc.so... done
Loading dynamic preprocessor library /usr/lib/snort_dynamicpreprocessor//libsf_dnp3_preproc.so... done
Loading dynamic preprocessor library /usr/lib/snort_dynamicpreprocessor//libsf_reputation_preproc.so... done
Loading dynamic preprocessor library /usr/lib/snort_dynamicpreprocessor//libsf_smtp_preproc.so... done
Loading dynamic preprocessor library /usr/lib/snort_dynamicpreprocessor//libsf_ssl_preproc.so... done
Finished Loading all dynamic preprocessor libs from /usr/lib/snort_dynamicpreprocessor/
Log directory = /nsm/sensor_data/lex-virtual-machine-eth1/snort-1
WARNING: ip4 normalizations disabled because not inline.
WARNING: tcp normalizations disabled because not inline.
WARNING: icmp4 normalizations disabled because not inline.
WARNING: ip6 normalizations disabled because not inline.
WARNING: icmp6 normalizations disabled because not inline.
Frag3 global config:
Max frags: 65536
Fragment memory cap: 4194304 bytes
Frag3 engine config:
Bound Address: default
Target-based policy: WINDOWS
Fragment timeout: 180 seconds
Fragment min_ttl: 1
Fragment Anomalies: Alert
Overlap Limit: 10
Min fragment Length: 100
Stream5 global config:
Track TCP sessions: ACTIVE
Max TCP sessions: 262144
TCP cache pruning timeout: 30 seconds
TCP cache nominal timeout: 3600 seconds
Memcap (for reassembly packet storage): 8388608
Track UDP sessions: ACTIVE
Max UDP sessions: 131072
UDP cache pruning timeout: 30 seconds
UDP cache nominal timeout: 180 seconds
Track ICMP sessions: INACTIVE
Track IP sessions: INACTIVE
Log info if session memory consumption exceeds 1048576
Send up to 2 active responses
Wait at least 5 seconds between responses
Protocol Aware Flushing: ACTIVE
Maximum Flush Point: 16000
Max Expected Streams: 768
Stream5 TCP Policy config:
Bound Address: default
Reassembly Policy: WINDOWS
Timeout: 180 seconds
Limit on TCP Overlaps: 10
Maximum number of bytes to queue per session: 1048576
Maximum number of segs to queue per session: 2621
Options:
Require 3-Way Handshake: YES
3-Way Handshake Timeout: 180
Detect Anomalies: YES
Reassembly Ports:
21 client (Footprint)
22 client (Footprint)
23 client (Footprint)
25 client (Footprint)
36 client (Footprint) server (Footprint)
42 client (Footprint)
53 client (Footprint)
70 client (Footprint)
79 client (Footprint)
80 client (Footprint) server (Footprint)
81 client (Footprint) server (Footprint)
82 client (Footprint) server (Footprint)
83 client (Footprint) server (Footprint)
84 client (Footprint) server (Footprint)
85 client (Footprint) server (Footprint)
86 client (Footprint) server (Footprint)
87 client (Footprint) server (Footprint)
88 client (Footprint) server (Footprint)
89 client (Footprint) server (Footprint)
90 client (Footprint) server (Footprint)
additional ports configured but not printed.
Stream5 UDP Policy config:
Timeout: 180 seconds
PerfMonitor config:
Sample Time: 300 seconds
Packet Count: 10000
Max File Size: 2147483647
Base Stats: ACTIVE
Base Stats File: /nsm/sensor_data/lex-virtual-machine-eth1/snort-1.stats
Max Perf Stats: INACTIVE
Flow Stats: INACTIVE
Event Stats: INACTIVE
Flow IP Stats: INACTIVE
Console Mode: INACTIVE
HttpInspect Config:
GLOBAL CONFIG
Max Pipeline Requests: 0
Inspection Type: STATELESS
Detect Proxy Usage: NO
IIS Unicode Map Filename: /etc/nsm/lex-virtual-machine-eth1/unicode.map
IIS Unicode Map Codepage: 1252
Memcap used for logging URI and Hostname: 150994944
Max Gzip Memory: 838860
Max Gzip Sessions: 5518
Gzip Compress Depth: 65535
Gzip Decompress Depth: 65535
DEFAULT SERVER CONFIG:
Server profile: All
Ports (PAF): 36 80 81 82 83 84 85 86 87 88 89 90 311 383 555 591 593 631 801 808 818 901 972 1158 1220 1414 1741 1830 2231 2301 2381 2809 3029 3037 3057 3128 3443 3702 4000 4343 4848 5117 5250 6080 6173 6988 7000 7001 7144 7145 7510 7770 7777 7779 8000 8008 8014 8028 8080 8081 8082 8085 8088 8090 8118 8123 8180 8181 8222 8243 8280 8300 8500 8509 8800 8888 8899 9000 9060 9080 9090 9091 9111 9443 9999 10000 11371 12601 15489 29991 33300 34412 34443 34444 41080 44449 50000 50002 51423 53331 55252 55555 56712
Server Flow Depth: 0
Client Flow Depth: 0
Max Chunk Length: 500000
Small Chunk Length Evasion: chunk size <= 10, threshold >= 5 times
Max Header Field Length: 750
Max Number Header Fields: 100
Max Number of WhiteSpaces allowed with header folding: 200
Inspect Pipeline Requests: YES
URI Discovery Strict Mode: NO
Allow Proxy Usage: NO
Disable Alerting: NO
Oversize Dir Length: 500
Only inspect URI: NO
Normalize HTTP Headers: NO
Inspect HTTP Cookies: YES
Inspect HTTP Responses: YES
Extract Gzip from responses: YES
Unlimited decompression of gzip data from responses: YES
Normalize Javascripts in HTTP Responses: YES
Max Number of WhiteSpaces allowed with Javascript Obfuscation in HTTP responses: 200
Normalize HTTP Cookies: NO
Enable XFF and True Client IP: NO
Log HTTP URI data: NO
Log HTTP Hostname data: NO
Extended ASCII code support in URI: NO
Ascii: YES alert: NO
Double Decoding: YES alert: NO
%U Encoding: YES alert: YES
Bare Byte: YES alert: NO
UTF 8: YES alert: NO
IIS Unicode: YES alert: NO
Multiple Slash: YES alert: NO
IIS Backslash: YES alert: NO
Directory Traversal: YES alert: NO
Web Root Traversal: YES alert: NO
Apache WhiteSpace: YES alert: NO
IIS Delimiter: YES alert: NO
IIS Unicode Map: GLOBAL IIS UNICODE MAP CONFIG
Non-RFC Compliant Characters: 0x00 0x01 0x02 0x03 0x04 0x05 0x06 0x07
Whitespace Characters: 0x09 0x0b 0x0c 0x0d
rpc_decode arguments:
Ports to decode RPC on: 111 32770 32771 32772 32773 32774 32775 32776 32777 32778 32779
alert_fragments: INACTIVE
alert_large_fragments: INACTIVE
alert_incomplete: INACTIVE
alert_multiple_requests: INACTIVE
FTPTelnet Config:
GLOBAL CONFIG
Inspection Type: stateful
Check for Encrypted Traffic: YES alert: NO
Continue to check encrypted data: YES
TELNET CONFIG:
Ports: 23
Are You There Threshold: 20
Normalize: YES
Detect Anomalies: YES
FTP CONFIG:
FTP Server: default
Ports (PAF): 21 2100 3535
Check for Telnet Cmds: YES alert: YES
Ignore Telnet Cmd Operations: YES alert: YES
Identify open data channels: NO
FTP Client: default
Check for Bounce Attacks: YES alert: YES
Check for Telnet Cmds: YES alert: YES
Ignore Telnet Cmd Operations: YES alert: YES
Max Response Length: 256
SMTP Config:
Ports: 25 465 587 691
Inspection Type: Stateful
Normalize: ATRN AUTH BDAT DATA DEBUG EHLO EMAL ESAM ESND ESOM ETRN EVFY EXPN HELO HELP IDENT MAIL NOOP ONEX QUEU QUIT RCPT RSET SAML SEND STARTTLS SOML TICK TIME TURN TURNME VERB VRFY X-EXPS XADR XAUTH XCIR XEXCH50 XGEN XLICENSE X-LINK2STATE XQUE XSTA XTRN XUSR CHUNKING X-ADAT X-DRCP X-ERCP X-EXCH50
Ignore Data: No
Ignore TLS Data: No
Ignore SMTP Alerts: No
Max Command Line Length: 512
Max Specific Command Line Length:
ATRN:255 AUTH:246 BDAT:255 DATA:246 DEBUG:255
EHLO:500 EMAL:255 ESAM:255 ESND:255 ESOM:255
ETRN:246 EVFY:255 EXPN:255 HELO:500 HELP:500
IDENT:255 MAIL:260 NOOP:255 ONEX:246 QUEU:246
QUIT:246 RCPT:300 RSET:246 SAML:246 SEND:246
SIZE:255 STARTTLS:246 SOML:246 TICK:246 TIME:246
TURN:246 TURNME:246 VERB:246 VRFY:255 X-EXPS:246
XADR:246 XAUTH:246 XCIR:246 XEXCH50:246 XGEN:246
XLICENSE:246 X-LINK2STATE:246 XQUE:246 XSTA:246 XTRN:246
XUSR:246
Max Header Line Length: 1000
Max Response Line Length: 512
X-Link2State Alert: Yes
Drop on X-Link2State Alert: No
Alert on commands: None
Alert on unknown commands: No
SMTP Memcap: 838860
MIME Max Mem: 838860
Base64 Decoding: Enabled
Base64 Decoding Depth: Unlimited
Quoted-Printable Decoding: Enabled
Quoted-Printable Decoding Depth: Unlimited
Unix-to-Unix Decoding: Enabled
Unix-to-Unix Decoding Depth: Unlimited
Non-Encoded MIME attachment Extraction: Enabled
Non-Encoded MIME attachment Extraction Depth: Unlimited
Log Attachment filename: Enabled
Log MAIL FROM Address: Enabled
Log RCPT TO Addresses: Enabled
Log Email Headers: Enabled
Email Hdrs Log Depth: 1464
SSH config:
Autodetection: ENABLED
Challenge-Response Overflow Alert: ENABLED
SSH1 CRC32 Alert: ENABLED
Server Version String Overflow Alert: ENABLED
Protocol Mismatch Alert: ENABLED
Bad Message Direction Alert: DISABLED
Bad Payload Size Alert: DISABLED
Unrecognized Version Alert: DISABLED
Max Encrypted Packets: 20
Max Server Version String Length: 100
MaxClientBytes: 19600 (Default)
Ports:
22
DCE/RPC 2 Preprocessor Configuration
Global Configuration
DCE/RPC Defragmentation: Enabled
Memcap: 102400 KB
Events: co
SMB Fingerprint policy: Disabled
Server Default Configuration
Policy: WinXP
Detect ports (PAF)
SMB: 139 445
TCP: 135
UDP: 135
RPC over HTTP server: 593
RPC over HTTP proxy: None
Autodetect ports (PAF)
SMB: None
TCP: 1025-65535
UDP: 1025-65535
RPC over HTTP server: 1025-65535
RPC over HTTP proxy: None
Invalid SMB shares: C$ D$ ADMIN$
Maximum SMB command chaining: 3 commands
DNS config:
DNS Client rdata txt Overflow Alert: ACTIVE
Obsolete DNS RR Types Alert: INACTIVE
Experimental DNS RR Types Alert: INACTIVE
Ports: 53
SSLPP config:
Encrypted packets: not inspected
Ports:
443 465 563 636 989
992 993 994 995 7801
7802 7900 7901 7902 7903
7904 7905 7906 7907 7908
7909 7910 7911 7912 7913
7914 7915 7916 7917 7918
7919 7920
Server side data is trusted
Sensitive Data preprocessor config:
Global Alert Threshold: 25
Masked Output: DISABLED
SIP config:
Max number of sessions: 40000
Max number of dialogs in a session: 4 (Default)
Status: ENABLED
Ignore media channel: DISABLED
Max URI length: 512
Max Call ID length: 80
Max Request name length: 20 (Default)
Max From length: 256 (Default)
Max To length: 256 (Default)
Max Via length: 1024 (Default)
Max Contact length: 512
Max Content length: 2048
Ports:
5060 5061 5600
Methods:
invite cancel ack bye register options refer subscribe update join info message notify benotify do qauth sprack publish service unsubscribe prack
IMAP Config:
Ports: 143
IMAP Memcap: 838860
MIME Max Mem: 838860
Base64 Decoding: Enabled
Base64 Decoding Depth: Unlimited
Quoted-Printable Decoding: Enabled
Quoted-Printable Decoding Depth: Unlimited
Unix-to-Unix Decoding: Enabled
Unix-to-Unix Decoding Depth: Unlimited
Non-Encoded MIME attachment Extraction: Enabled
Non-Encoded MIME attachment Extraction Depth: Unlimited
POP Config:
Ports: 110
POP Memcap: 838860
MIME Max Mem: 838860
Base64 Decoding: Enabled
Base64 Decoding Depth: Unlimited
Quoted-Printable Decoding: Enabled
Quoted-Printable Decoding Depth: Unlimited
Unix-to-Unix Decoding: Enabled
Unix-to-Unix Decoding Depth: Unlimited
Non-Encoded MIME attachment Extraction: Enabled
Non-Encoded MIME attachment Extraction Depth: Unlimited
Modbus config:
Ports:
502
DNP3 config:
Memcap: 262144
Check Link-Layer CRCs: ENABLED
Ports:
20000
Reputation config:
WARNING: Can't find any whitelist/blacklist entries. Reputation Preprocessor disabled.

+++++++++++++++++++++++++++++++++++++++++++++++++++
Initializing rule chains...
WARNING: /etc/nsm/rules/downloaded.rules(11) threshold (in rule) is deprecated; use detection_filter instead.

ERROR: /etc/nsm/rules/downloaded.rules(17876) Unknown rule option: 'view/Main/TorRules'.
Fatal Error, Quitting..

Doug Burks

unread,
Jun 10, 2014, 3:40:33 PM6/10/14
to securit...@googlegroups.com
The error is at the end of the log:

ERROR: /etc/nsm/rules/downloaded.rules(17876) Unknown rule option:
'view/Main/TorRules'.

Did you manually modify /etc/nsm/rules/downloaded.rules?

What is the output of the following?
sed -n 17876,17876p /etc/nsm/rules/downloaded.rules

Have you tried running "sudo rule-update" to download a new copy of the rules?
> --
> You received this message because you are subscribed to the Google Groups "security-onion" group.
> To unsubscribe from this group and stop receiving emails from it, send an email to security-onio...@googlegroups.com.
> To post to this group, send email to securit...@googlegroups.com.
> Visit this group at http://groups.google.com/group/security-onion.
> For more options, visit https://groups.google.com/d/optout.



--
Doug Burks

Leon Russell

unread,
Jun 10, 2014, 4:09:57 PM6/10/14
to securit...@googlegroups.com


Doug,
i did not modify any files, trust me lol im having to many basic issues to be modifying anything on my own, here is the out put you requested :

sed -n 17876p /etc/nsm/rules/downloaded.rules
alert udp [78.46.227.193,78.46.32.98,78.46.36.134,78.46.43.195,78.46.66.112,78.46.92.210,78.46.94.141,78.47.134.6,78.47.139.98,78.47.145.153] any -> $HOME_NET any (msg:"ET TOR Known Tor Exit Node UDP Traffic (272)"; reference:url,doc.emergingthreats.net/bin/view/Main/TorRules; threshold: type limit, track by_src, seconds 60, count 1; classtype:misc-attack; flowbits:set,ET.TorIP;view/Main/TorRules; threshold: type limit, track by_src, seconds 60, count 1; classtype:misc-attack; flowbits:set,ET.TorIP; sid:2522359; rev:1868;)

Doug Burks

unread,
Jun 10, 2014, 4:19:03 PM6/10/14
to securit...@googlegroups.com
Have you tried running "sudo rule-update" to download a new copy of the rules?

Leon Russell

unread,
Jun 11, 2014, 10:52:48 AM6/11/14
to securit...@googlegroups.com

Doug,

The rules update did not resolves the snort-1 failure, but
t i also noticed this lie in redcted :

grep: /nsm/sensor_data/*/snort-*.stats: No such file or directory??

could this relate to the issue ??

Doug Burks

unread,
Jun 11, 2014, 11:29:56 AM6/11/14
to securit...@googlegroups.com
That's related, but it's not the root cause of the issue. The root
cause is the incorrectly formatted rule in
/etc/nsm/rules/downloaded.rules. If you have Internet access,
rule-update should update that file with the latest rules.

Do you have full Internet access?

Please attach the full output of the following command:
sudo rule-update


--
Doug Burks

Leon Russell

unread,
Jun 11, 2014, 2:32:41 PM6/11/14
to securit...@googlegroups.com

i have full internet, just so you know this is a sensor only install, i notice it saying that fail under So-server-eth1. Could the fail pertain to something on the server end ? stand by for the full output of the rule-update

Leon Russell

unread,
Jun 11, 2014, 5:48:27 PM6/11/14
to securit...@googlegroups.com
ok doug the rules update actually cleared that fail this time, i ran the update once before and it did not clear it but its good now. Thanks
Reply all
Reply to author
Forward
0 new messages