Snort mailing list archives

Re: snort syslog and barnyard2


From: "Joel Esler (jesler)" <jesler () cisco com>
Date: Wed, 1 Oct 2014 18:56:56 +0000

Sorry, I didn’t mean to say it wasn’t there at all.  I meant “with those options” but it didn’t come out right!  Sorry 
about that.

Thanks Mike.

--
Joel Esler
Open Source Manager
Threat Intelligence Team Lead
Talos

On Oct 1, 2014, at 2:38 PM, Shirkdog <shirkdog () gmail com> wrote:

The latest source has support for this:
/*
# syslog_full
#-------------------------------
# Available as both a log and alert output plugin.  Used to output
data via TCP/UDP or LOCAL ie(syslog())
# Arguments:
#      sensor_name $sensor_name         - unique sensor name
#      server $server                   - server the device will report to
#      local                            - if defined, ignore all
remote information and use syslog() to send message.
#      protocol $protocol               - protocol device will report
over (tcp/udp)
#      port $port                       - destination port device will
report to (default: 514)
#      delimiters $delimiters           - define a character that will
delimit message sections ex:  "|", will use | as message section
delimiters. (default: |)
#      separators $separators           - define field separator
included in each message ex: " " ,  will use space as field separator.
           (default: [:space:])
#      operation_mode $operaion_mode    - default | complete : default
mode is compatible with default snort syslog message, complete prints
more information such as the raw packet (hexed)
#      log_priority   $log_priority     - used by local option for
syslog priority call. (man syslog(3) for supported options) (default:
LOG_INFO)
#      log_facility  $log_facility      - used by local option for
syslog facility call. (man syslog(3) for supported options) (default:
LOG_USER)
#      payload_encoding                 - (default: hex)  support
hex/ascii/base64 for log_syslog_full using operation_mode complete
only.

# Usage Examples:
# output alert_syslog_full: sensor_name snortIds1-eth2, server
xxx.xxx.xxx.xxx, protocol udp, port 514, operation_mode default
# output alert_syslog_full: sensor_name snortIds1-eth2, server
xxx.xxx.xxx.xxx, protocol udp, port 514, operation_mode complete
# output log_syslog_full: sensor_name snortIds1-eth2, server
xxx.xxx.xxx.xxx, protocol udp, port 514, operation_mode default
# output log_syslog_full: sensor_name snortIds1-eth2, server
xxx.xxx.xxx.xxx, protocol udp, port 514, operation_mode complete
# output alert_syslog_full: sensor_name snortIds1-eth2, server
xxx.xxx.xxx.xxx, protocol udp, port 514
# output log_syslog_full: sensor_name snortIds1-eth2, server
xxx.xxx.xxx.xxx, protocol udp, port 514
# output alert_syslog_full: sensor_name snortIds1-eth2, local
# output log_syslog_full: sensor_name snortIds1-eth2, local,
log_priority LOG_CRIT,log_facility LOG_CRON

---
Michael Shirk


On Wed, Oct 1, 2014 at 2:26 PM, Joel Esler (jesler) <jesler () cisco com> wrote:
Packet data is not present in the syslog output at all.

--
Joel Esler
Open Source Manager
Threat Intelligence Team Lead
Talos

On Oct 1, 2014, at 2:00 PM, John Hally <JHally () EBSCO COM> wrote:

Hi All,

I’m trying to get snort and/or barnyard2 to send full alerts to a remote
syslog server for analysis with thinks like splunk, etc.  I think I may have
found a bug in barnyard2, but I wanted to put it out to the list to see if
anyone else is successful at this.  I’m trying to send it to LOCAL3 so that
I can parse off the logs into its own file in rsylog.conf.

No matter what I try, I will only get ‘fast’ alert data in /var/log/messages
on my rsyslog server (not the local3.* entry as expected).   The
"operation_mode complete” switch is supposed to set the alerts to full
logging, but it doesn’t work remote or locally.

In barnyard2 config:

output alert_syslog_full: sensor_name snortSensor, server x.x.x.x, protocol
udp, port 514, operation_mode complete, log_priority LOG_ALERT, log_facility
LOG_LOCAL3

/etc/rsylog.conf entry:

local3.*
/var/log/snortsyslog/snort.log


Output from messages after barnyard2 startup:

Oct 1 12:46:50 sensor barnyard2: Barnyard2 spooler: Event cache size set to
[2048]
Oct 1 12:46:50 sensor barnyard2: Log directory = /var/log/snort
Oct 1 12:46:50 sensor barnyard2: INFO database: Defaulting
Reconnect/Transaction Error limit to 10
Oct 1 12:46:50 sensor barnyard2: INFO database: Defaulting Reconnect sleep
time to 5 second
Oct 1 12:46:50 sensor barnyard2: using operation_mode: complete
Oct 1 12:46:50 sensor barnyard2: Using default delimiters for syslog
messages "|"
Oct 1 12:46:50 sensor barnyard2: Using default field separators for syslog
messages " "
Oct 1 12:46:50 sensor barnyard2: spo_syslog_full config:
Oct 1 12:46:50 sensor barnyard2: #011Detail Level: Fast
Oct 1 12:46:50 sensor barnyard2: #011Syslog Server: x.x.x.x:514
Oct 1 12:46:50 sensor barnyard2: #011Reporting Protocol: udp
Oct 1 12:46:50 sensor barnyard2: Initializing daemon mode
Oct 1 12:46:50 sensor barnyard2: Daemon parent exiting
Oct 1 12:46:50 sensor barnyard2: Daemon initialized, signaled parent pid:
13339
Oct 1 12:46:50 sensor barnyard2: PID path stat checked out ok, PID path set
to /var/run/
Oct 1 12:46:50 sensor barnyard2: Writing PID "13340" to file
"/var/run//barnyard2_eth1.pid"


Sample syslog entry:

Oct  1 11:59:51 sensor | [SNORTIDS[ALERT]: [sensor-eth1] ] || 2014-10-01
11:59:54.967+-04 1 [1:1000022:1] LOCAL-RULE Possible login.aspx Brute Force
Account Access || web-application-attack || 6 x.x.x.x y.y.y.y || 20175 80 ||
#012 |


The output in unified2/mysql is the full payload and you can see the full
HTTP POST.

Am I missing something?

Thanks in advance,

John.
------------------------------------------------------------------------------
Meet PCI DSS 3.0 Compliance Requirements with EventLog Analyzer
Achieve PCI DSS 3.0 Compliant Status with Out-of-the-box PCI DSS Reports
Are you Audit-Ready for PCI DSS 3.0 Compliance? Download White paper
Comply to PCI DSS 3.0 Requirement 10 and 11.5 with EventLog Analyzer
http://pubads.g.doubleclick.net/gampad/clk?id=154622311&iu=/4140/ostg.clktrk_______________________________________________
Snort-users mailing list
Snort-users () lists sourceforge net
Go to this URL to change user options or unsubscribe:
https://lists.sourceforge.net/lists/listinfo/snort-users
Snort-users list archive:
http://sourceforge.net/mailarchive/forum.php?forum_name=snort-users

Please visit http://blog.snort.org to stay current on all the latest Snort
news!



------------------------------------------------------------------------------
Meet PCI DSS 3.0 Compliance Requirements with EventLog Analyzer
Achieve PCI DSS 3.0 Compliant Status with Out-of-the-box PCI DSS Reports
Are you Audit-Ready for PCI DSS 3.0 Compliance? Download White paper
Comply to PCI DSS 3.0 Requirement 10 and 11.5 with EventLog Analyzer
http://pubads.g.doubleclick.net/gampad/clk?id=154622311&iu=/4140/ostg.clktrk
_______________________________________________
Snort-users mailing list
Snort-users () lists sourceforge net
Go to this URL to change user options or unsubscribe:
https://lists.sourceforge.net/lists/listinfo/snort-users
Snort-users list archive:
http://sourceforge.net/mailarchive/forum.php?forum_name=snort-users

Please visit http://blog.snort.org to stay current on all the latest Snort
news!

Attachment: smime.p7s
Description:

------------------------------------------------------------------------------
Meet PCI DSS 3.0 Compliance Requirements with EventLog Analyzer
Achieve PCI DSS 3.0 Compliant Status with Out-of-the-box PCI DSS Reports
Are you Audit-Ready for PCI DSS 3.0 Compliance? Download White paper
Comply to PCI DSS 3.0 Requirement 10 and 11.5 with EventLog Analyzer
http://pubads.g.doubleclick.net/gampad/clk?id=154622311&iu=/4140/ostg.clktrk
_______________________________________________
Snort-users mailing list
Snort-users () lists sourceforge net
Go to this URL to change user options or unsubscribe:
https://lists.sourceforge.net/lists/listinfo/snort-users
Snort-users list archive:
http://sourceforge.net/mailarchive/forum.php?forum_name=snort-users

Please visit http://blog.snort.org to stay current on all the latest Snort news!

Current thread: