LinuxQuestions.org
Welcome to the most active Linux Forum on the web.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 03-02-2010, 07:57 AM   #1
engelienart
Member
 
Registered: Feb 2009
Location: Netherlands
Distribution: Kubuntu, Debian
Posts: 73

Rep: Reputation: 16
snort alerts explination?


Hi,

I am experiencing alot of outbound traffic from my internal network which is filtered by snort.

These are the descriptions:

DOUBLE DECODING ATTACK
OVERSIZE REQUEST-URI DIRECTORY
TCP Portscan (from my Linux server!)

Even get some attacks from my providers modem?! Thats is on the internetside of my network . . . Strange, strange . . .

I looked around on the internet but I could not find a explination what this is. I saw alot of technical jargon, which I dont understand. Can someone tell me in Dummy speak, what these alerts are?

It is outbound traffic, targetet at several ipadressen. I have installed Spybot search and Destroy on the Windows machines. I have scanned all windows machines with runscanner.exe (www.runscanner.com). I have scanned my server for rootkits (rkhunter) I have deleted all potential bad programs on the windows XP machines (found nothing on the Linuxserver )
but I still get the alerts.

Is it a real alert, or is false alarm?

Thanx for your help!
 
Old 03-02-2010, 10:31 AM   #2
OlRoy
Member
 
Registered: Dec 2002
Posts: 306

Rep: Reputation: 86
With only a few alert messages, I'm afraid no one on the planet capable of determining whether they are false positives or not. It could be anything from snort's variables in the config not being correct, to an actual attack, a false positive, etc.

Anyone who analyzes alerts from an IDS needs a combination of the skills and appropriate data to weed out false positives.

For example does the rule that triggered the alert look very simple which could trigger a lot of false positives, or is it very specific? What is the payload of the packet that triggered the alert? Was there any suspicious activity involving the the source or destination that happened at around the time of the alert?

If you post more information such as the packet contents, make sure you censor any sensitive data.
 
Old 03-03-2010, 07:25 AM   #3
engelienart
Member
 
Registered: Feb 2009
Location: Netherlands
Distribution: Kubuntu, Debian
Posts: 73

Original Poster
Rep: Reputation: 16
Thanx OldRoy.
How can I get that information you are looking for?

Quote:
Originally Posted by OlRoy
For example does the rule that triggered the alert look very simple which could trigger a lot of false positives, or is it very specific? What is the payload of the packet that triggered the alert? Was there any suspicious activity involving the the source or destination that happened at around the time of the alert?
Kind regardz,

Engel
 
Old 03-16-2010, 08:14 PM   #4
unixfool
Member
 
Registered: May 2005
Location: Northern VA
Distribution: Slackware, Ubuntu, FreeBSD, OpenBSD, OS X
Posts: 782
Blog Entries: 8

Rep: Reputation: 158Reputation: 158
OP,

Check your README files in your docs/ directory in your Snort install. The one you want to read is README.http_inspect. That doc will highlight your top two alerts. The bottom one (TCP portscan) will either be addressed by README.http_inspect or your snort.conf file (or whatver your .conf file is named).

Note that you WILL see outbound port scans (that is, originating from your LAN IP(s)) if you haven't yet tuned the portscan parameters. This is Snort doing its job, as the insider threat in corporate (and home) environments is substantial. This preprocessor can pick up legitimate network services polling, also. You can either filter these, threshold them, or investigate them. I think it is a worthwhile alert, even if it alerts to a host on my LAN. More than likely, it is benign but at least something is looking for outbound or internal traffic...this is something that may not show in your FW or systems' logs.
 
Old 03-17-2010, 03:49 AM   #5
engelienart
Member
 
Registered: Feb 2009
Location: Netherlands
Distribution: Kubuntu, Debian
Posts: 73

Original Poster
Rep: Reputation: 16
Thanx alot. I will investigate asap
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Snort - no portscan and tcp alerts in snort av.dubey Linux - Software 6 07-11-2008 09:56 PM
snort alerts lord-fu Linux - Security 1 11-25-2005 03:28 PM
Snort Alerts ?? zahra79 Linux - Networking 5 06-22-2005 05:11 AM
Suggestions for best way to get snort alerts zuessh Linux - Security 9 08-29-2004 09:40 PM
Snort Alerts knight_ridda Linux - Security 13 06-21-2003 04:32 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 12:01 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration