Snort mailing list archives

Re: Snort BPF.filter doesn't work


From: "Nicholas Mavis (nmavis)" <nmavis () cisco com>
Date: Thu, 3 Jul 2014 17:19:21 +0000

Robert,

Can you provide the following:

  1.  Copy of your snort.conf
  2.  The syntax in which you are starting Snort
  3.  What version of Snort are you using?

-Nick

From: Robert Millott <robm () millottandassociates com<mailto:robm () millottandassociates com>>
Date: Thursday, July 3, 2014 at 1:16 PM
To: nmavis <nmavis () cisco com<mailto:nmavis () cisco com>>, snort-users <snort-users () lists sourceforge 
net<mailto:snort-users () lists sourceforge net>>
Subject: Re: [Snort-users] Snort BPF.filter doesn't work

Nick
  Thanx for the suggestion. Unfortunately, same results.  The startup screen shows it reads the file, but the alert 
keeps showing up in my logs.




On Thu, Jul 3, 2014 at 1:10 PM, Nicholas Mavis (nmavis) <nmavis () cisco com<mailto:nmavis () cisco com>> wrote:
Robert,

Try the following without any additions:

not host 192.168.1.1

-Nick

From: Robert Millott <robm () millottandassociates com<mailto:robm () millottandassociates com>>
Date: Thursday, July 3, 2014 at 12:14 PM
To: "snort-users () lists sourceforge net<mailto:snort-users () lists sourceforge net>" <snort-users () lists 
sourceforge net<mailto:snort-users () lists sourceforge net>>
Subject: [Snort-users] Snort BPF.filter doesn't work

I am trying to filter some data.  I created a rule in my misc.rules that I know will always fire, ie

alert tcp any any -> 192.168.1.1 80 (msg:"my test rule"; sid: 60999; rev:1)

That rule fires constantly whenever I go to the website at 192.168.1.1

I then create a /etc/snort/bpf.filter that contains one line

!(host 192.168.1.1)

I then edited snort.conf and uncomment the bfp.filter line so it reads

config bpf_file: /etc/snort/bpf.filter

When I run snort and watch /var/log/messages, the above alert continues to fire.

I also tried using it with the command line option of -F /etc/snort/bpf.filter. This didn't work either.

I also tried bpf.filter to read
(not host 192.168.1.1)
that didn't work either.

When I start snort, I see the line that reads

Snort BPF Option:
!(host 192.168.1.1)

and yet I still see my above test alert message in my /var/log/messages.

Anyone know why the bpf.filter isn't filtering the data?



--
Robert Millott
President, Millott and Associates
(443) 255-3588



--
Robert Millott
President, Millott and Associates
(443) 255-3588
------------------------------------------------------------------------------
Open source business process management suite built on Java and Eclipse
Turn processes into business applications with Bonita BPM Community Edition
Quickly connect people, data, and systems into organized workflows
Winner of BOSSIE, CODIE, OW2 and Gartner awards
http://p.sf.net/sfu/Bonitasoft
_______________________________________________
Snort-users mailing list
Snort-users () lists sourceforge net
Go to this URL to change user options or unsubscribe:
https://lists.sourceforge.net/lists/listinfo/snort-users
Snort-users list archive:
http://sourceforge.net/mailarchive/forum.php?forum_name=snort-users

Please visit http://blog.snort.org to stay current on all the latest Snort news!

Current thread: