Snort mailing list archives

Re: segfault issue


From: Joel Esler <jesler () sourcefire com>
Date: Mon, 7 Mar 2011 08:08:02 -0500

I'm sorry, what I actually meant was, since we don't spin up rules for
Gentoo, what OS for the Shared Object rules are you running?

Joel

2011/3/7 <cihan.ayyildiz () securitas com tr>

Hi ;

I have used all so rules, the list below

# dynamic library rules
 include $SO_RULE_PATH/bad-traffic.rules
 include $SO_RULE_PATH/chat.rules
 include $SO_RULE_PATH/dos.rules
 include $SO_RULE_PATH/exploit.rules
 include $SO_RULE_PATH/icmp.rules
 include $SO_RULE_PATH/imap.rules
 include $SO_RULE_PATH/misc.rules
 include $SO_RULE_PATH/multimedia.rules
 include $SO_RULE_PATH/netbios.rules
 include $SO_RULE_PATH/nntp.rules
 include $SO_RULE_PATH/p2p.rules
 include $SO_RULE_PATH/smtp.rules
 include $SO_RULE_PATH/sql.rules
 include $SO_RULE_PATH/web-activex.rules
 include $SO_RULE_PATH/web-client.rules
 include $SO_RULE_PATH/web-iis.rules
 include $SO_RULE_PATH/web-misc.rules

Snort is up and running normally. This issue occurs randomly.   (maybe
something triggered)

regards.

Cihan AYYILDIZ
Bilgi İşlem Uzmanı  /  IT Specialist


if you learn Red Hat, you'll know Red Hat, but if you learn Slackware,
you'll know Linux



From:   Joel Esler <jesler () sourcefire com>
To:     cihan.ayyildiz () securitas com tr
Cc:     snort-users () lists sourceforge net
Date:   07.03.2011 14:52
Subject:        Re: [Snort-users] segfault issue



(follow up to your offlist email, yes I did receive it.)

Which SO rules are you using on gentoo?

Does Snort run for awhile and then quit?  or does it quit shortly after
startup?

Joel

2011/3/6 <cihan.ayyildiz () securitas com tr>
     Hi Again ;

     Yes,  my shared VRT rules are correct (2.9.0.3 also im a subscriber)
     And i
     compiled them with my own parameters (because of gentoo path
     difference)
     then dump with my conf successfully.

     dump printout below

     Running in Rule Dump mode

            --== Initializing Snort ==--
     Initializing Output Plugins!
     Initializing Preprocessors!
     Initializing Plug-ins!
     Parsing Rules file "/etc/snort/snort.conf"
     PortVar 'HTTP_PORTS' defined :  [ 80 311 591 593 901 1220 1414 1830
     2301
     2381 2809 3128 3702 5250 7001 7777 7779 8000 8008 8028 8080 8088 8118
     8123
     8180 8243 8280 8888 9090:9091 9443 9999 11371 ]
     PortVar 'SHELLCODE_PORTS' defined :  [ 0:79 81:65535 ]
     PortVar 'ORACLE_PORTS' defined :  [ 1024:65535 ]
     PortVar 'SSH_PORTS' defined :  [ 22 ]
     WARNING /etc/snort/snort.conf(88) Adapter is in Passive Mode. Hence
     switching policy mode to tap.
     Detection:
       Search-Method = AC-Full-Q
        Split Any/Any group = enabled
        Search-Method-Optimizations = enabled
        Maximum pattern length = 20
     Tagged Packet Limit: 256
     Loading dynamic
     engine /usr/lib64/snort_dynamicengine/libsf_engine.so...
     done
     Loading all dynamic detection libs
     from /usr/lib64/snort_dynamicrules...
      Loading dynamic detection
     library /usr/lib64/snort_dynamicrules/web-misc.so... done
      Loading dynamic detection
     library /usr/lib64/snort_dynamicrules/multimedia.so... done
      Loading dynamic detection
     library /usr/lib64/snort_dynamicrules/smtp.so... done
      Loading dynamic detection
     library /usr/lib64/snort_dynamicrules/snmp.so... done
      Loading dynamic detection
     library /usr/lib64/snort_dynamicrules/exploit.so... done
      Loading dynamic detection
     library /usr/lib64/snort_dynamicrules/misc.so... done
      Loading dynamic detection
     library /usr/lib64/snort_dynamicrules/dos.so...
     done
      Loading dynamic detection
     library /usr/lib64/snort_dynamicrules/web-client.so... done
      Loading dynamic detection
     library /usr/lib64/snort_dynamicrules/p2p.so...
     done
      Loading dynamic detection
     library /usr/lib64/snort_dynamicrules/netbios.so... done
      Loading dynamic detection
     library /usr/lib64/snort_dynamicrules/nntp.so... done
      Loading dynamic detection
     library /usr/lib64/snort_dynamicrules/bad-traffic.so... done
      Loading dynamic detection
     library /usr/lib64/snort_dynamicrules/imap.so... done
      Loading dynamic detection
     library /usr/lib64/snort_dynamicrules/chat.so... done
      Finished Loading all dynamic detection libs
     from /usr/lib64/snort_dynamicrules
     Loading all dynamic preprocessor libs
     from /usr/lib64/snort_dynamicpreprocessor...
      Loading dynamic preprocessor
     library /usr/lib64/snort_dynamicpreprocessor/libsf_smtp_preproc.so...
     done
      Loading dynamic preprocessor
     library /usr/lib64/snort_dynamicpreprocessor/libsf_ssh_preproc.so...
     done
      Loading dynamic preprocessor
     library /usr/lib64/snort_dynamicpreprocessor/libsf_dce2_preproc.so...
     done
      Loading dynamic preprocessor
     library /usr/lib64/snort_dynamicpreprocessor/libsf_dns_preproc.so...
     done
      Loading dynamic preprocessor
     library /usr/lib64/snort_dynamicpreprocessor/libsf_ssl_preproc.so...
     done
      Loading dynamic preprocessor
     library /usr/lib64/snort_dynamicpreprocessor/libsf_sdf_preproc.so...
     done
      Loading dynamic preprocessor
     library
/usr/lib64/snort_dynamicpreprocessor/libsf_ftptelnet_preproc.so...

     done
      Finished Loading all dynamic preprocessor libs
     from /usr/lib64/snort_dynamicpreprocessor
     Log directory = /var/log/snort
     WARNING: ip4 normalizations disabled because not inlineWARNING: tcp
     normalizations disabled because not inlineWARNING: icmp4
     normalizations
     disabled because not inlineFrag3 global config:
        Max frags: 65536
        Fragment memory cap: 4194304 bytes
     Frag3 engine config:
        Target-based policy: WINDOWS
        Fragment timeout: 180 seconds
        Fragment min_ttl:   1
        Fragment Problems: 1
        Overlap Limit:     10
        Min fragment Length:     100
     Stream5 global config:
        Track TCP sessions: ACTIVE
        Max TCP sessions: 1048576
        Memcap (for reassembly packet storage): 1073741824
        Track UDP sessions: ACTIVE
        Max UDP sessions: 131072
        Track ICMP sessions: INACTIVE
        Log info if session memory consumption exceeds 1048576
        Send up to 0 active responses
     Stream5 TCP Policy config:
        Reassembly Policy: WINDOWS
        Timeout: 86400 seconds
        Limit on TCP Overlaps: 255
        Options:
            Require 3-Way Handshake: YES
            3-Way Handshake Timeout: 8600
            Detect Anomalies: YES
        Reassembly Ports:
          21 client (Footprint)
          22 client (Footprint)
          23 client (Footprint)
          25 client (Footprint)
          42 client (Footprint)
          53 client (Footprint)
          79 client (Footprint)
          80 client (Footprint) server (Footprint)
          109 client (Footprint)
          110 client (Footprint)
          111 client (Footprint)
          113 client (Footprint)
          119 client (Footprint)
          135 client (Footprint)
          136 client (Footprint)
          137 client (Footprint)
          139 client (Footprint)
          143 client (Footprint)
          161 client (Footprint)
          311 client (Footprint) server (Footprint)
     Stream5 UDP Policy config:
        Timeout: 180 seconds
     PerfMonitor config:
        Time:           300 seconds
        Flow Stats:     INACTIVE
        Flow IP Stats:  INACTIVE
        Event Stats:    INACTIVE
        Max Perf Stats: INACTIVE
        Console Mode:   INACTIVE
        File Mode:      /etc/snort/snort.stats
        SnortFile Mode: INACTIVE
        Packet Count:   10000
        Dump Summary:   No
        Max file size:  2147483648
     HttpInspect Config:
        GLOBAL CONFIG
          Max Pipeline Requests:    0
          Inspection Type:          STATELESS
          Detect Proxy Usage:       NO
          IIS Unicode Map Filename: /etc/snort/unicode.map
          IIS Unicode Map Codepage: 1252
          Max Gzip Memory: 838860
          Max Gzip Sessions: 20
          Gzip Compress Depth: 20480
          Gzip Decompress Depth: 20480
        DEFAULT SERVER CONFIG:
          Server profile: All
          Ports: 80 311 591 593 901 1220 1414 1830 2301 2381 2809 3128
     3702
     5250 7001 7777 7779 8000 8008 8028 8080 8088 8118 8123 8180 8243 8280
     8888
     9090 9091 9443 9999 11371
          Server Flow Depth: 0
          Client Flow Depth: 0
          Max Chunk Length: 500000
          Max Header Field Length: 750
          Max Number Header Fields: 100
          Inspect Pipeline Requests: YES
          URI Discovery Strict Mode: NO
          Allow Proxy Usage: NO
          Disable Alerting: NO
          Oversize Dir Length: 500
          Only inspect URI: NO
          Normalize HTTP Headers: NO
          Inspect HTTP Cookies: YES
          Inspect HTTP Responses: YES
          Extract Gzip from responses: YES
          Unlimited decompression of gzip data from responses: YES
          Normalize HTTP Cookies: NO
          Enable XFF and True Client IP: NO
          Extended ASCII code support in URI: NO
          Ascii: YES alert: NO
          Double Decoding: YES alert: NO
          %U Encoding: YES alert: YES
          Bare Byte: YES alert: NO
          Base36: OFF
          UTF 8: YES alert: NO
          IIS Unicode: YES alert: NO
          Multiple Slash: YES alert: NO
          IIS Backslash: YES alert: NO
          Directory Traversal: YES alert: NO
          Web Root Traversal: YES alert: NO
          Apache WhiteSpace: YES alert: NO
          IIS Delimiter: YES alert: NO
          IIS Unicode Map: GLOBAL IIS UNICODE MAP CONFIG
          Non-RFC Compliant Characters: 0x00 0x01 0x02 0x03 0x04 0x05 0x06
     0x07
          Whitespace Characters: 0x09 0x0b 0x0c 0x0d
     rpc_decode arguments:
        Ports to decode RPC on: 111 32770 32771 32772 32773 32774 32775
     32776
     32777 32778 32779
        alert_fragments: INACTIVE
        alert_large_fragments: INACTIVE
        alert_incomplete: INACTIVE
        alert_multiple_requests: INACTIVE
     Portscan Detection Config:
        Detect Protocols:  TCP UDP ICMP IP
        Detect Scan Type:  portscan portsweep decoy_portscan
     distributed_portscan
        Sensitivity Level: Medium
        Memcap (in bytes): 10000000
        Number of Nodes:   31347
     Dumping dynamic rules...
     Dumping dynamic rules for Library chat 1.0.1
     Dumping dynamic rules for Library imap 1.0.1
     Dumping dynamic rules for Library bad-traffic 1.0.1
     Dumping dynamic rules for Library nntp 1.0.1
     Dumping dynamic rules for Library netbios 1.0.1
     Dumping dynamic rules for Library p2p 1.0.1
     Dumping dynamic rules for Library web-client 1.0.1
     Dumping dynamic rules for Library dos 1.0.1
     Dumping dynamic rules for Library misc 1.0.1
     Dumping dynamic rules for Library exploit 1.0.1
     Dumping dynamic rules for Library snmp 1.0.1
     Dumping dynamic rules for Library smtp 1.0.1
     Dumping dynamic rules for Library multimedia 1.0.1
     Dumping dynamic rules for Library web-misc 1.0.1
      Finished dumping dynamic rules.
     Snort exiting

     Cihan AYYILDIZ
     Bilgi İşlem Uzmanı  /  IT Specialist
     Sistem & Ağ Yöneticisi  /  System & Network Administrator

     Securitas Güvenlik Hizmetleri / Securitas Security Services Turkey
     E-mail : cihan.ayyildiz () securitas com tr
     Ofis / Office Phone : +90.312.473.59.90 / 114
     Cep / Mobile : +90.532.450.18.13        VPN : 2225

     if you learn Red Hat, you'll know Red Hat, but if you learn
     Slackware,
     you'll know Linux



     From:   Joel Esler <jesler () sourcefire com>
     To:     cihan.ayyildiz () securitas com tr
     Cc:     snort-users () lists sourceforge net
     Date:   07.03.2011 02:54
     Subject:        Re: [Snort-users] segfault issue



     We received your bug report as well.  Thank you.

     Are you, by chance, using Shared Object rules from the VRT?  And if
     you are
     using Shared Object rules, are you sure you are using the correct
     ones for
     2.9.0.3?

     If not, then we'll need a good backtrace of the segfault.

     Check out docs/BUGS in the Snort tarball in order to get us a core
     from
     Snort.

     Joel

     2011/3/6 <cihan.ayyildiz () securitas com tr>

          Hi All ;

          I have an error like below and crashed the snort....

          kernel: snort[1191]: segfault at 1065a9d32 ip 00007eff29836143
     sp
          00007fff62456a08 error 6 in libc-2.11.2.so[7eff297b5000+150000]


          my os

          Linux  2.6.36-gentoo-r5 #1 SMP Fri Mar 4 20:14:56 EET 2011
     x86_64
          Intel(R)
          Xeon(R) CPU E5620 @ 2.40GHz GenuineIntel GNU/Linux

          my version


            ,,_     -*> Snort! <*-
           o"  )~   Version 2.9.0.3 (Build 98)
            ''''    By Martin Roesch & The Snort Team:
          http://www.snort.org/snort/snort-team
                    Copyright (C) 1998-2010 Sourcefire, Inc., et al.
                    Using libpcap version 1.1.1
                    Using PCRE version: 7.9 2009-04-11
                    Using ZLIB version: 1.2.3

          i have emerged snort from portage tree

          which is that

          [ebuild   R   ] net-analyzer/snort-2.9.0.3
          USE="decoder-preprocessor-rules
          dynamicplugin mysql threads zlib -active-response* -aruba -debug
          -flexresp3
          -gre -inline-init-failopen* -ipv6 -linux-smp-stats -mpls
     -normalizer*
          -odbc
          -perfprofiling -postgres -ppm -prelude -react*
     -reload-error-restart
          (-selinux) -static -targetbased" 0 kB


          im using in inline mod daq with NFQ

          regards.


          Cihan AYYILDIZ
          Bilgi İşlem Uzmanı  /  IT Specialist
          Sistem & Ağ Yöneticisi  /  System & Network Administrator

          Securitas Güvenlik Hizmetleri / Securitas Security Services
     Turkey
          E-mail : cihan.ayyildiz () securitas com tr
          Ofis / Office Phone : +90.312.473.59.90 / 114
          Cep / Mobile : +90.532.450.18.13        VPN : 2225

          if you learn Red Hat, you'll know Red Hat, but if you learn
          Slackware,
          you'll know Linux




 ------------------------------------------------------------------------------


          What You Don't Know About Data Connectivity CAN Hurt You
          This paper provides an overview of data connectivity, details
          its effect on application quality, and explores various
     alternative
          solutions. http://p.sf.net/sfu/progress-d2d
          _______________________________________________
          Snort-users mailing list
          Snort-users () lists sourceforge net
          Go to this URL to change user options or unsubscribe:
          https://lists.sourceforge.net/lists/listinfo/snort-users
          Snort-users list archive:
          http://www.geocrawler.com/redir-sf.php3?list=snort-users



     --
     Joel Esler | http://blog.snort.org | http://vrt-blog.snort.org |
     http://blog.clamav.net





--
Joel Esler | http://blog.snort.org | http://vrt-blog.snort.org |
http://blog.clamav.net





-- 
Joel Esler | http://blog.snort.org | http://vrt-blog.snort.org |
http://blog.clamav.net
------------------------------------------------------------------------------
What You Don't Know About Data Connectivity CAN Hurt You
This paper provides an overview of data connectivity, details
its effect on application quality, and explores various alternative
solutions. http://p.sf.net/sfu/progress-d2d
_______________________________________________
Snort-users mailing list
Snort-users () lists sourceforge net
Go to this URL to change user options or unsubscribe:
https://lists.sourceforge.net/lists/listinfo/snort-users
Snort-users list archive:
http://www.geocrawler.com/redir-sf.php3?list=snort-users

Current thread: