[Oisf-users] Most rules fail to load

William Metcalf william.metcalf at gmail.com
Sat Jan 2 22:03:28 UTC 2010


Currently you need a valid classification.config file which can be  
found in the snort source or in the brt rules.  I think in the future  
will get rid of this requirement by setting some sane default  
classification and priority if the file is not present

Regards,

Will

Sent from my iPhone

On Jan 2, 2010, at 11:52 AM, rmkml <rmkml at free.fr> wrote:

> Hi Rich,
> sorry I didn't help,
> but I have one question please, if you run suricata on pcap file (-r  
> option), do you "same" pb please ?
> Regards
> Rmkml
> Crusoe-Researches.com
>
>
> On Sat, 2 Jan 2010, Rich Rumble wrote:
>
>> I've tried on two seperate Fedora boxes now and run into the same
>> issue, most rules fail to load from Snort or ET... only 5 rules  
>> total,
>> out of hundreds if not thousands in all 71 rules files. I assume it's
>> a known issue or " --init-errors-fatal" wouldn't be a arg?
>>
>> Attached is a complete start from this command on Fedora 12
>> 2.6.31.9-174.fc12.i686
>> /usr/local/bin/suricata -c suricata.yaml -i eth0 -s test.rule
>> If it makes a difference I simply made a blank classification.config
>> file as I have no idea what that file should contain or where to find
>> a proper one, and commenting out the line in suricata.yaml had no
>> effect on the error I was recieving for not having one.... I hope  
>> it's
>> just F(edora)12 or me missing a dep or something...
>> The 5 loaded rules come from these two files...
>> [9624] 2/1/2010 -- 16:18:22 - (detect.c:268) <Info>
>> (DetectLoadSigFile) -- 2 successfully loaded from file
>> /etc/suricata/emerging-virus.rules.
>> [9624] 2/1/2010 -- 16:18:26 - (detect.c:268) <Info>
>> (DetectLoadSigFile) -- 3 successfully loaded from file
>> /etc/suricata/emerging-current_events.rules.
>> [9624] 2/1/2010 -- 16:18:26 - (detect.c:268) <Info>
>> (DetectLoadSigFile) -- 0 successfully loaded from file test.rule.
>> [9624] 2/1/2010 -- 16:18:26 - (detect.c:270) <Info>
>> (DetectLoadSigFile) -- 1 sigs failed to load from file test.rule.
>> That sig in test.rule is:
>> alert tcp any any -> $HOME_NET 139:445 (msg:"EXPLOIT Foofus.net
>> Password dumping, dll injection"; flow:to_server,established;
>> content:"|6c 00 73 00 72 00 65 00 6d 00 6f 00 72 00 61|";
>> classtype:suspicious-filename-detect; sid:999999; rev:1;)
>> -rich
>>
> _______________________________________________
> Oisf-users mailing list
> Oisf-users at openinfosecfoundation.org
> http://lists.openinfosecfoundation.org/mailman/listinfo/oisf-users



More information about the Oisf-users mailing list