Snort mailing list archives

Re: segfault issue


From: Jason Wallace <jason.r.wallace () gmail com>
Date: Mon, 7 Mar 2011 08:49:12 -0500

Cihan,

snort-2.9.0.4-r1 is in portage. You might want to try upgrading if you can.

Thx,
Wally

2011/3/7 Joel Esler <jesler () sourcefire com>:
Okay, please follow the instructions here, and we'll begin investigation.
http://www.snort.org/snort-downloads/submit-a-bug

2011/3/7 <cihan.ayyildiz () securitas com tr>

i compiled shared rules with my own parameteres (for gentoo) (which is
included src directory)

i dont use precompiled rules

i will send my Makefile if you need (compile parameteres or other
variables)

my so rules below.

bad-traffic.so     chat.so     dos.so     exploit.so     imap.so
misc.so     multimedia.so     netbios.so     nntp.so     p2p.so
smtp.so
snmp.so     web-client.so     web-misc.so


Cihan AYYILDIZ
Bilgi İşlem Uzmanı  /  IT Specialist
Sistem & Ağ Yöneticisi  /  System & Network Administrator

Securitas Güvenlik Hizmetleri / Securitas Security Services Turkey
E-mail : cihan.ayyildiz () securitas com tr
Ofis / Office Phone : +90.312.473.59.90 / 114
Cep / Mobile : +90.532.450.18.13        VPN : 2225

if you learn Red Hat, you'll know Red Hat, but if you learn Slackware,
you'll know Linux



From:   Joel Esler <jesler () sourcefire com>
To:     cihan.ayyildiz () securitas com tr
Cc:     snort-users () lists sourceforge net
Date:   07.03.2011 15:08
Subject:        Re: [Snort-users] segfault issue



I'm sorry, what I actually meant was, since we don't spin up rules for
Gentoo, what OS for the Shared Object rules are you running?

Joel

2011/3/7 <cihan.ayyildiz () securitas com tr>
     Hi ;

     I have used all so rules, the list below

     # dynamic library rules
      include $SO_RULE_PATH/bad-traffic.rules
      include $SO_RULE_PATH/chat.rules
      include $SO_RULE_PATH/dos.rules
      include $SO_RULE_PATH/exploit.rules
      include $SO_RULE_PATH/icmp.rules
      include $SO_RULE_PATH/imap.rules
      include $SO_RULE_PATH/misc.rules
      include $SO_RULE_PATH/multimedia.rules
      include $SO_RULE_PATH/netbios.rules
      include $SO_RULE_PATH/nntp.rules
      include $SO_RULE_PATH/p2p.rules
      include $SO_RULE_PATH/smtp.rules
      include $SO_RULE_PATH/sql.rules
      include $SO_RULE_PATH/web-activex.rules
      include $SO_RULE_PATH/web-client.rules
      include $SO_RULE_PATH/web-iis.rules
      include $SO_RULE_PATH/web-misc.rules

     Snort is up and running normally. This issue occurs randomly.
     (maybe
     something triggered)

     regards.

     Cihan AYYILDIZ
     Bilgi İşlem Uzmanı  /  IT Specialist


     if you learn Red Hat, you'll know Red Hat, but if you learn
     Slackware,
     you'll know Linux



     From:   Joel Esler <jesler () sourcefire com>
     To:     cihan.ayyildiz () securitas com tr
     Cc:     snort-users () lists sourceforge net
     Date:   07.03.2011 14:52
     Subject:        Re: [Snort-users] segfault issue



     (follow up to your offlist email, yes I did receive it.)

     Which SO rules are you using on gentoo?

     Does Snort run for awhile and then quit?  or does it quit shortly
     after
     startup?

     Joel

     2011/3/6 <cihan.ayyildiz () securitas com tr>
          Hi Again ;

          Yes,  my shared VRT rules are correct (2.9.0.3 also im a
     subscriber)
          And i
          compiled them with my own parameters (because of gentoo path
          difference)
          then dump with my conf successfully.

          dump printout below

          Running in Rule Dump mode

                 --== Initializing Snort ==--
          Initializing Output Plugins!
          Initializing Preprocessors!
          Initializing Plug-ins!
          Parsing Rules file "/etc/snort/snort.conf"
          PortVar 'HTTP_PORTS' defined :  [ 80 311 591 593 901 1220 1414
     1830
          2301
          2381 2809 3128 3702 5250 7001 7777 7779 8000 8008 8028 8080 8088
     8118
          8123
          8180 8243 8280 8888 9090:9091 9443 9999 11371 ]
          PortVar 'SHELLCODE_PORTS' defined :  [ 0:79 81:65535 ]
          PortVar 'ORACLE_PORTS' defined :  [ 1024:65535 ]
          PortVar 'SSH_PORTS' defined :  [ 22 ]
          WARNING /etc/snort/snort.conf(88) Adapter is in Passive Mode.
     Hence
          switching policy mode to tap.
          Detection:
            Search-Method = AC-Full-Q
             Split Any/Any group = enabled
             Search-Method-Optimizations = enabled
             Maximum pattern length = 20
          Tagged Packet Limit: 256
          Loading dynamic
          engine /usr/lib64/snort_dynamicengine/libsf_engine.so...
          done
          Loading all dynamic detection libs
          from /usr/lib64/snort_dynamicrules...
           Loading dynamic detection
          library /usr/lib64/snort_dynamicrules/web-misc.so... done
           Loading dynamic detection
          library /usr/lib64/snort_dynamicrules/multimedia.so... done
           Loading dynamic detection
          library /usr/lib64/snort_dynamicrules/smtp.so... done
           Loading dynamic detection
          library /usr/lib64/snort_dynamicrules/snmp.so... done
           Loading dynamic detection
          library /usr/lib64/snort_dynamicrules/exploit.so... done
           Loading dynamic detection
          library /usr/lib64/snort_dynamicrules/misc.so... done
           Loading dynamic detection
          library /usr/lib64/snort_dynamicrules/dos.so...
          done
           Loading dynamic detection
          library /usr/lib64/snort_dynamicrules/web-client.so... done
           Loading dynamic detection
          library /usr/lib64/snort_dynamicrules/p2p.so...
          done
           Loading dynamic detection
          library /usr/lib64/snort_dynamicrules/netbios.so... done
           Loading dynamic detection
          library /usr/lib64/snort_dynamicrules/nntp.so... done
           Loading dynamic detection
          library /usr/lib64/snort_dynamicrules/bad-traffic.so... done
           Loading dynamic detection
          library /usr/lib64/snort_dynamicrules/imap.so... done
           Loading dynamic detection
          library /usr/lib64/snort_dynamicrules/chat.so... done
           Finished Loading all dynamic detection libs
          from /usr/lib64/snort_dynamicrules
          Loading all dynamic preprocessor libs
          from /usr/lib64/snort_dynamicpreprocessor...
           Loading dynamic preprocessor

     library /usr/lib64/snort_dynamicpreprocessor/libsf_smtp_preproc.so...
          done
           Loading dynamic preprocessor

     library /usr/lib64/snort_dynamicpreprocessor/libsf_ssh_preproc.so...
          done
           Loading dynamic preprocessor

     library /usr/lib64/snort_dynamicpreprocessor/libsf_dce2_preproc.so...
          done
           Loading dynamic preprocessor

     library /usr/lib64/snort_dynamicpreprocessor/libsf_dns_preproc.so...
          done
           Loading dynamic preprocessor

     library /usr/lib64/snort_dynamicpreprocessor/libsf_ssl_preproc.so...
          done
           Loading dynamic preprocessor

     library /usr/lib64/snort_dynamicpreprocessor/libsf_sdf_preproc.so...
          done
           Loading dynamic preprocessor

     library
/usr/lib64/snort_dynamicpreprocessor/libsf_ftptelnet_preproc.so...


          done
           Finished Loading all dynamic preprocessor libs
          from /usr/lib64/snort_dynamicpreprocessor
          Log directory = /var/log/snort
          WARNING: ip4 normalizations disabled because not inlineWARNING:
     tcp
          normalizations disabled because not inlineWARNING: icmp4
          normalizations
          disabled because not inlineFrag3 global config:
             Max frags: 65536
             Fragment memory cap: 4194304 bytes
          Frag3 engine config:
             Target-based policy: WINDOWS
             Fragment timeout: 180 seconds
             Fragment min_ttl:   1
             Fragment Problems: 1
             Overlap Limit:     10
             Min fragment Length:     100
          Stream5 global config:
             Track TCP sessions: ACTIVE
             Max TCP sessions: 1048576
             Memcap (for reassembly packet storage): 1073741824
             Track UDP sessions: ACTIVE
             Max UDP sessions: 131072
             Track ICMP sessions: INACTIVE
             Log info if session memory consumption exceeds 1048576
             Send up to 0 active responses
          Stream5 TCP Policy config:
             Reassembly Policy: WINDOWS
             Timeout: 86400 seconds
             Limit on TCP Overlaps: 255
             Options:
                 Require 3-Way Handshake: YES
                 3-Way Handshake Timeout: 8600
                 Detect Anomalies: YES
             Reassembly Ports:
               21 client (Footprint)
               22 client (Footprint)
               23 client (Footprint)
               25 client (Footprint)
               42 client (Footprint)
               53 client (Footprint)
               79 client (Footprint)
               80 client (Footprint) server (Footprint)
               109 client (Footprint)
               110 client (Footprint)
               111 client (Footprint)
               113 client (Footprint)
               119 client (Footprint)
               135 client (Footprint)
               136 client (Footprint)
               137 client (Footprint)
               139 client (Footprint)
               143 client (Footprint)
               161 client (Footprint)
               311 client (Footprint) server (Footprint)
          Stream5 UDP Policy config:
             Timeout: 180 seconds
          PerfMonitor config:
             Time:           300 seconds
             Flow Stats:     INACTIVE
             Flow IP Stats:  INACTIVE
             Event Stats:    INACTIVE
             Max Perf Stats: INACTIVE
             Console Mode:   INACTIVE
             File Mode:      /etc/snort/snort.stats
             SnortFile Mode: INACTIVE
             Packet Count:   10000
             Dump Summary:   No
             Max file size:  2147483648
          HttpInspect Config:
             GLOBAL CONFIG
               Max Pipeline Requests:    0
               Inspection Type:          STATELESS
               Detect Proxy Usage:       NO
               IIS Unicode Map Filename: /etc/snort/unicode.map
               IIS Unicode Map Codepage: 1252
               Max Gzip Memory: 838860
               Max Gzip Sessions: 20
               Gzip Compress Depth: 20480
               Gzip Decompress Depth: 20480
             DEFAULT SERVER CONFIG:
               Server profile: All
               Ports: 80 311 591 593 901 1220 1414 1830 2301 2381 2809
     3128
          3702
          5250 7001 7777 7779 8000 8008 8028 8080 8088 8118 8123 8180 8243
     8280
          8888
          9090 9091 9443 9999 11371
               Server Flow Depth: 0
               Client Flow Depth: 0
               Max Chunk Length: 500000
               Max Header Field Length: 750
               Max Number Header Fields: 100
               Inspect Pipeline Requests: YES
               URI Discovery Strict Mode: NO
               Allow Proxy Usage: NO
               Disable Alerting: NO
               Oversize Dir Length: 500
               Only inspect URI: NO
               Normalize HTTP Headers: NO
               Inspect HTTP Cookies: YES
               Inspect HTTP Responses: YES
               Extract Gzip from responses: YES
               Unlimited decompression of gzip data from responses: YES
               Normalize HTTP Cookies: NO
               Enable XFF and True Client IP: NO
               Extended ASCII code support in URI: NO
               Ascii: YES alert: NO
               Double Decoding: YES alert: NO
               %U Encoding: YES alert: YES
               Bare Byte: YES alert: NO
               Base36: OFF
               UTF 8: YES alert: NO
               IIS Unicode: YES alert: NO
               Multiple Slash: YES alert: NO
               IIS Backslash: YES alert: NO
               Directory Traversal: YES alert: NO
               Web Root Traversal: YES alert: NO
               Apache WhiteSpace: YES alert: NO
               IIS Delimiter: YES alert: NO
               IIS Unicode Map: GLOBAL IIS UNICODE MAP CONFIG
               Non-RFC Compliant Characters: 0x00 0x01 0x02 0x03 0x04 0x05
     0x06
          0x07
               Whitespace Characters: 0x09 0x0b 0x0c 0x0d
          rpc_decode arguments:
             Ports to decode RPC on: 111 32770 32771 32772 32773 32774
     32775
          32776
          32777 32778 32779
             alert_fragments: INACTIVE
             alert_large_fragments: INACTIVE
             alert_incomplete: INACTIVE
             alert_multiple_requests: INACTIVE
          Portscan Detection Config:
             Detect Protocols:  TCP UDP ICMP IP
             Detect Scan Type:  portscan portsweep decoy_portscan
          distributed_portscan
             Sensitivity Level: Medium
             Memcap (in bytes): 10000000
             Number of Nodes:   31347
          Dumping dynamic rules...
          Dumping dynamic rules for Library chat 1.0.1
          Dumping dynamic rules for Library imap 1.0.1
          Dumping dynamic rules for Library bad-traffic 1.0.1
          Dumping dynamic rules for Library nntp 1.0.1
          Dumping dynamic rules for Library netbios 1.0.1
          Dumping dynamic rules for Library p2p 1.0.1
          Dumping dynamic rules for Library web-client 1.0.1
          Dumping dynamic rules for Library dos 1.0.1
          Dumping dynamic rules for Library misc 1.0.1
          Dumping dynamic rules for Library exploit 1.0.1
          Dumping dynamic rules for Library snmp 1.0.1
          Dumping dynamic rules for Library smtp 1.0.1
          Dumping dynamic rules for Library multimedia 1.0.1
          Dumping dynamic rules for Library web-misc 1.0.1
           Finished dumping dynamic rules.
          Snort exiting

          Cihan AYYILDIZ
          Bilgi İşlem Uzmanı  /  IT Specialist
          Sistem & Ağ Yöneticisi  /  System & Network Administrator

          Securitas Güvenlik Hizmetleri / Securitas Security Services
     Turkey
          E-mail : cihan.ayyildiz () securitas com tr
          Ofis / Office Phone : +90.312.473.59.90 / 114
          Cep / Mobile : +90.532.450.18.13        VPN : 2225

          if you learn Red Hat, you'll know Red Hat, but if you learn
          Slackware,
          you'll know Linux



          From:   Joel Esler <jesler () sourcefire com>
          To:     cihan.ayyildiz () securitas com tr
          Cc:     snort-users () lists sourceforge net
          Date:   07.03.2011 02:54
          Subject:        Re: [Snort-users] segfault issue



          We received your bug report as well.  Thank you.

          Are you, by chance, using Shared Object rules from the VRT?  And
     if
          you are
          using Shared Object rules, are you sure you are using the
     correct
          ones for
          2.9.0.3?

          If not, then we'll need a good backtrace of the segfault.

          Check out docs/BUGS in the Snort tarball in order to get us a
     core
          from
          Snort.

          Joel

          2011/3/6 <cihan.ayyildiz () securitas com tr>

               Hi All ;

               I have an error like below and crashed the snort....

               kernel: snort[1191]: segfault at 1065a9d32 ip
     00007eff29836143
          sp
               00007fff62456a08 error 6 in libc-2.11.2.so[7eff297b5000
     +150000]


               my os

               Linux  2.6.36-gentoo-r5 #1 SMP Fri Mar 4 20:14:56 EET 2011
          x86_64
               Intel(R)
               Xeon(R) CPU E5620 @ 2.40GHz GenuineIntel GNU/Linux

               my version


                 ,,_     -*> Snort! <*-
                o"  )~   Version 2.9.0.3 (Build 98)
                 ''''    By Martin Roesch & The Snort Team:
               http://www.snort.org/snort/snort-team
                         Copyright (C) 1998-2010 Sourcefire, Inc., et al.
                         Using libpcap version 1.1.1
                         Using PCRE version: 7.9 2009-04-11
                         Using ZLIB version: 1.2.3

               i have emerged snort from portage tree

               which is that

               [ebuild   R   ] net-analyzer/snort-2.9.0.3
               USE="decoder-preprocessor-rules
               dynamicplugin mysql threads zlib -active-response* -aruba
     -debug
               -flexresp3
               -gre -inline-init-failopen* -ipv6 -linux-smp-stats -mpls
          -normalizer*
               -odbc
               -perfprofiling -postgres -ppm -prelude -react*
          -reload-error-restart
               (-selinux) -static -targetbased" 0 kB


               im using in inline mod daq with NFQ

               regards.


               Cihan AYYILDIZ
               Bilgi İşlem Uzmanı  /  IT Specialist
               Sistem & Ağ Yöneticisi  /  System & Network Administrator

               Securitas Güvenlik Hizmetleri / Securitas Security Services
          Turkey
               E-mail : cihan.ayyildiz () securitas com tr
               Ofis / Office Phone : +90.312.473.59.90 / 114
               Cep / Mobile : +90.532.450.18.13        VPN : 2225

               if you learn Red Hat, you'll know Red Hat, but if you learn
               Slackware,
               you'll know Linux





 ------------------------------------------------------------------------------



               What You Don't Know About Data Connectivity CAN Hurt You
               This paper provides an overview of data connectivity,
     details
               its effect on application quality, and explores various
          alternative
               solutions. http://p.sf.net/sfu/progress-d2d
               _______________________________________________
               Snort-users mailing list
               Snort-users () lists sourceforge net
               Go to this URL to change user options or unsubscribe:
               https://lists.sourceforge.net/lists/listinfo/snort-users
               Snort-users list archive:
               http://www.geocrawler.com/redir-sf.php3?list=snort-users



          --
          Joel Esler | http://blog.snort.org | http://vrt-blog.snort.org |
          http://blog.clamav.net





     --
     Joel Esler | http://blog.snort.org | http://vrt-blog.snort.org |
     http://blog.clamav.net





--
Joel Esler | http://blog.snort.org | http://vrt-blog.snort.org |
http://blog.clamav.net





--
Joel Esler | http://blog.snort.org | http://vrt-blog.snort.orghttp://blog.clamav.net


------------------------------------------------------------------------------
What You Don't Know About Data Connectivity CAN Hurt You
This paper provides an overview of data connectivity, details
its effect on application quality, and explores various alternative
solutions. http://p.sf.net/sfu/progress-d2d
_______________________________________________
Snort-users mailing list
Snort-users () lists sourceforge net
Go to this URL to change user options or unsubscribe:
https://lists.sourceforge.net/lists/listinfo/snort-users
Snort-users list archive:
http://www.geocrawler.com/redir-sf.php3?list=snort-users


------------------------------------------------------------------------------
What You Don't Know About Data Connectivity CAN Hurt You
This paper provides an overview of data connectivity, details
its effect on application quality, and explores various alternative
solutions. http://p.sf.net/sfu/progress-d2d
_______________________________________________
Snort-users mailing list
Snort-users () lists sourceforge net
Go to this URL to change user options or unsubscribe:
https://lists.sourceforge.net/lists/listinfo/snort-users
Snort-users list archive:
http://www.geocrawler.com/redir-sf.php3?list=snort-users


Current thread: