Snort mailing list archives

Re: AppId FTP service detector problem


From: Meridoff via Snort-devel <snort-devel () lists snort org>
Date: Thu, 5 Nov 2020 20:18:10 +0300

Sure, here it is.

My client is WIndows7 running FileZilla to go to anonymous ftp at
ftp.botik.ru.

My gate is Linux with snort 3.0.1 (build 4), Lua 5.1, that do nat
masquerade for  Internet access from LAN.

Snort is in NFQ/TAP mode. Nfqueue  rule is setup OK and works. Using only 1
thread in snort (for simplicity).

Configs and pcaps are included.

Files description:

1. configBAD (when no alerts at all) - is the same as configOK (when alerts
work fine), except included snort-malware-other.rules
2. m.rules - is my appid rules, in case of configOK rule "FTP" is alerted
3. pcap files - are the same FTP traffic for both cases - OK and BAD.
4. snort3-malware-other.rules -is compressed rar of standart rules file
from snot.org ( snort3-malware-other.rules ). Password: 123.

In all cases FTP access to the server is successful.




ср, 4 нояб. 2020 г. в 17:44, Shravan Rangarajuvenkata (shrarang) <
shrarang () cisco com>:

We tried to reproduce this issue locally but could not.



Is it possible for you to send a pcap with the traffic for which you are
seeing this issue? Can you also send your snort3 configuration (the Lua
files)?



Thanks,

Shravan



*From: *Snort-devel <snort-devel-bounces () lists snort org> on behalf of
"Shravan Rangarajuvenkata (shrarang) via Snort-devel" <
snort-devel () lists snort org>
*Reply-To: *"Shravan Rangarajuvenkata (shrarang)" <shrarang () cisco com>
*Date: *Friday, October 23, 2020 at 5:12 PM
*To: *Meridoff <oagvozd () gmail com>, "snort-devel () lists snort org" <
snort-devel () lists snort org>
*Subject: *Re: [Snort-devel] AppId FTP service detector problem



Thanks for reporting the issue! We will try to reproduce this issue
locally and will reach out to you if we need any help.



Thanks,

Shravan



*From: *Snort-devel <snort-devel-bounces () lists snort org> on behalf of
Meridoff via Snort-devel <snort-devel () lists snort org>
*Reply-To: *Meridoff <oagvozd () gmail com>
*Date: *Friday, October 23, 2020 at 2:17 PM
*To: *"snort-devel () lists snort org" <snort-devel () lists snort org>
*Subject: *[Snort-devel] AppId FTP service detector problem



Hello, I have manual rules with appid:ftp ,ftp_data and other ftp_* appids
rules.



None of them are working on FTP-traffic if I use snort3-malware-other
rules (and may be some others).



If I use only my manual appid ftp rule, then all is OK:
ftp/ftp_data/ftp_passive and so on are WORKS fine!



When I include  snort3-malware-other rule file in config : manual appid
rule doesn't work.



Inspectors ftp-server/client/wizard/binder are in config.



I've recognized that some rules with sid 21256 and 21255 can fluences to
this problem.



Some AppidDebug in my log when problem occurs:



Oct 23 18:55:35 ns snort[29636]: AppIdDbg 10.0.1.3 49283 -> 193.232.174.1
21 6 AS=0 ID=0 ftp service candidate returned in-process (10)
Oct 23 18:55:35 ns snort[29636]: AppIdDbg 10.0.1.3 49283 -> 193.232.174.1
21 6 AS=0 ID=0 smtp service candidate returned no-match (100)
Oct 23 18:55:35 ns snort[29636]: AppIdDbg 10.0.1.3 49283 -> 193.232.174.1
21 6 AS=0 ID=0 ftp service candidate returned in-process (10)
Oct 23 18:55:35 ns snort[29636]: AppIdDbg 10.0.1.3 49283 -> 193.232.174.1
21 6 AS=0 ID=0 pop3 client candidate returned in-process (10)
Oct 23 18:55:35 ns snort[29636]: AppIdDbg 10.0.1.3 49283 -> 193.232.174.1
21 6 AS=0 ID=0 ftp service candidate returned success (0)
Oct 23 18:55:35 ns snort[29636]: AppIdDbg 10.0.1.3 49283 -> 193.232.174.1
21 6 AS=0 ID=0 Published event for changes: service, version
Oct 23 18:55:35 ns snort[29636]: AppIdDbg 10.0.1.3 49283 -> 193.232.174.1
21 6 AS=0 ID=0 ftp service detector returned in-process (10)
Oct 23 18:55:35 ns snort[29636]: AppIdDbg 10.0.1.3 49283 -> 193.232.174.1
21 6 AS=0 ID=0 pop3 client candidate returned success (0)
Oct 23 18:55:35 ns snort[29636]: AppIdDbg 10.0.1.3 49283 -> 193.232.174.1
21 6 AS=0 ID=0 ftp service detector returned in-process (10)
Oct 23 18:55:41 ns snort[29636]: message repeated 11 times: [ AppIdDbg
10.0.1.3 49283 -> 193.232.174.1 21 6 AS=0 ID=0 ftp service detector
returned in-process (10)]
Oct 23 18:55:41 ns snort[29636]: AppIdDbg 10.0.1.3 49283 -> 193.232.174.1
21 6 AS=0 ID=0 Related flow created for 10.0.1.3-0 -> 193.232.174.1-44689 6
Oct 23 18:55:41 ns snort[29636]: AppIdDbg 10.0.1.3 49283 -> 193.232.174.1
21 6 AS=0 ID=0 ftp service detector returned in-process (10)
Oct 23 18:55:41 ns snort[29636]: AppIdDbg 10.0.1.3 49283 -> 193.232.174.1
21 6 AS=0 ID=0 Published event for changes: payload
Oct 23 18:55:41 ns snort[29636]: AppIdDbg 10.0.1.3 49284 -> 193.232.174.1
44689 6 AS=0 ID=0 Published event for changes: service
Oct 23 18:55:41 ns snort[29636]: AppIdDbg 10.0.1.3 49284 -> 193.232.174.1
44689 6 AS=0 ID=0* Ignoring connection with service FTP Data (166)*
Oct 23 18:55:41 ns snort[29636]: AppIdDbg 10.0.1.3 49283 -> 193.232.174.1
21 6 AS=0 ID=0 *ftp service detector returned in-process (10)*
Oct 23 18:55:41 ns snort[29636]: message repeated 2 times: [ AppIdDbg
10.0.1.3 49283 -> 193.232.174.1 21 6 AS=0 ID=0 ftp service detector
returned in-process (10)]
Oct 23 19:05:41 ns snort[29636]: AppIdDbg 193.232.174.1 21 -> 10.0.1.3
49283 6 AS=0 ID=0 New AppId mid-stream session
Oct 23 19:05:41 ns snort[29636]: AppIdDbg 193.232.174.1 21 -> 10.0.1.3
49283 6 AS=0 ID=0 ftp service detector returned in-process (10)
Oct 23 19:05:41 ns snort[29636]: AppIdDbg 193.232.174.1 21 -> 10.0.1.3
49283 6 AS=0 ID=0 Published event for changes: service
Oct 23 19:05:42 ns snort[29636]: AppIdDbg 10.0.1.3 49283 -> 193.232.174.1
21 6 AS=0 ID=0* Packet out-of-order, not-ok mid-stream flow*



Thanks.



Attachment: ftpOK.pcap
Description:

Attachment: m.rules
Description:

Attachment: configBAD.lua
Description:

Attachment: configOK.lua
Description:

Attachment: ftp.pcap
Description:

Attachment: snort3-malware-other.rar
Description:

_______________________________________________
Snort-devel mailing list
Snort-devel () lists snort org
https://lists.snort.org/mailman/listinfo/snort-devel

Please visit http://blog.snort.org for the latest news about Snort!

Current thread: