[Oisf-devel] FP on IP frag and sig use udp port 0 ?

Victor Julien victor at inliniac.net
Wed Jul 3 11:20:24 UTC 2013


On 05/21/2013 10:47 AM, Anoop Saldanha wrote:
> On Tue, May 21, 2013 at 2:01 PM, Victor Julien <victor at inliniac.net> wrote:
>> On 05/08/2013 12:04 PM, Anoop Saldanha wrote:
>>> On Wed, May 8, 2013 at 5:27 AM, rmkml <rmkml at yahoo.fr> wrote:
>>>> Hi,
>>>>
>>>> Im curious if anyone confirm this please ?
>>>> (if yes Im open a new redmine ticket)
>>>>
>>>> ok testing Suricata with joigned pcap file contains one IP fragmented packet
>>>> without UDP layer like this (tshark output):
>>>>
>>>> ...
>>>> Internet Protocol Version 4, Src: 192.168.1.2 (192.168.1.2), Dst:
>>>> 192.168.1.1 (192.168.1.1)
>>>>     Version: 4
>>>>     Header length: 20 bytes
>>>>     Differentiated Services Field: 0x00
>>>>         0000 00.. = Default (0x00)
>>>>         .... ..00 = Not-ECT (Not ECN-Capable Transport) (0x00)
>>>>     Total Length: 1500
>>>>     Identification: 0x1061 (4193)
>>>>     Flags: 0x01 (More Fragments)
>>>>         0... .... = Reserved bit: Not set
>>>>         .0.. .... = Don't fragment: Not set
>>>>         ..1. .... = More fragments: Set
>>>>     Fragment offset: 1480
>>>>     Time to live: 64
>>>>     Protocol: UDP (17)
>>>>     Header checksum: 0xc0a3 [correct]
>>>>         [Good: True]
>>>>         [Bad: False]
>>>>     Source: 192.168.1.2 (192.168.1.2)
>>>>     Destination: 192.168.1.1 (192.168.1.1)
>>>> Data (1480 bytes)
>>>> 0000  41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41   AAAAAAAAAAAAAAAA
>>>> ...
>>>>
>>>> Testing with this simply very old sig:
>>>> alert udp any any <> any 0 (msg:"BAD-TRAFFIC udp port 0 traffic";
>>>> classtype:misc-activity; sid:525; rev:1;)
>>>>
>>>> product Suricata FP alert:
>>>> 05/06/2013-23:49:28.176296 [**] [1:525:1] BAD-TRAFFIC udp port 0 traffic
>>>> [**] [Classification: Misc activity] [Priority: 3] {UDP} 192.168.1.2:0 ->
>>>> 192.168.1.1:0
>>>>
>>>> Of course snort not fire.
>>>>
>>>
>>> Seems right to me.
>>>
>>> We treat it as an ip only sig, the the upper layer protocol is
>>> determined from the ip packet.
>>>
>>
>> Don't think I agree. The packet is a fragment without the actual UDP
>> layer. So we have no UDP port info for the packet and thus we can't say
>> port 0 matched.
>>
> 
> Right.  I overlooked the port part.
> 

Opened #846 and #847 for this.

-- 
---------------------------------------------
Victor Julien
http://www.inliniac.net/
PGP: http://www.inliniac.net/victorjulien.asc
---------------------------------------------



More information about the Oisf-devel mailing list