[Oisf-users] Drop request depending on priority in fast.log

장대찬 jang9129 at gmail.com
Tue Mar 12 02:37:11 UTC 2013


Hi
I'm using suricata 1.4.1 in IPS mode (drop-yes, NFQUEUE-yes).
It remains logs (fast.log, drop.log) and i think it works well.

When i open fast.log, i can see many attempts to find security
vulnerabilities.

Here is my server log(fast.log)

....
     19 03/01/2013-16:44:03.329046  [**] [1:2001219:18] ET SCAN Potential
SSH Scan [**] [Classification: Attempted Information Leak] [Priority: 2]
{TCP} 117.79.91.214:57586 -> 172.2.80.66:22
     20 03/01/2013-16:44:03.498013  [**] [1:2006546:6] ET SCAN LibSSH Based
Frequent SSH Connections Likely BruteForce Attack! [**] [Classification:
Attempted Administrator Privilege Gain] [Priority: 1] {TCP}
117.79.91.214:57586 -> 172.2.80.66:22
     21 03/01/2013-19:30:05.265391  [**] [1:2006435:7] ET SCAN LibSSH Based
SSH Connection - Often used as a BruteForce Tool [**] [Classification: Misc
activity] [Priority: 3] {TCP} 114.255.20.151:49483 -> 172
 .27.83.61:22
     22 03/02/2013-00:45:23.066206  [**] [1:2006435:7] ET SCAN LibSSH Based
SSH Connection - Often used as a BruteForce Tool [**] [Classification: Misc
activity] [Priority: 3] {TCP} 117.103.67.72:52492 -> 172.        27.83.61:22
     23 03/02/2013-01:19:58.716823  [**] [1:2500064:2794] ET COMPROMISED
Known Compromised or Hostile Host Traffic (33) [**] [Classification: Misc
Attack] [Priority: 2] {TCP} 211.155.230.219:58799 -> 172.27.83        .61:22
     24 03/02/2013-08:10:52.060195  [**] [1:2006435:7] ET SCAN LibSSH Based
SSH Connection - Often used as a BruteForce Tool [**] [Classification: Misc
activity] [Priority: 3] {TCP} 61.234.104.209:41930 -> 172
 .27.83.61:22
     25 03/02/2013-08:11:10.595974  [**] [1:2001219:18] ET SCAN Potential
SSH Scan [**] [Classification: Attempted Information Leak] [Priority: 2]
{TCP} 61.234.104.209:44426 -> 172.2.80.66:22
     26 03/02/2013-08:11:10.994625  [**] [1:2006546:6] ET SCAN LibSSH Based
Frequent SSH Connections Likely BruteForce Attack! [**] [Classification:
Attempted Administrator Privilege Gain] [Priority: 1] {TCP}
61.234.104.209:44426 -> 172.2.80.66:22
     27 03/02/2013-08:12:10.291186  [**] [1:2006435:7] ET SCAN LibSSH Based
SSH Connection - Often used as a BruteForce Tool [**] [Classification: Misc
activity] [Priority: 3] {TCP} 218.7.204.194:58009 -> 172.        27.83.61:22
     28 03/02/2013-08:12:20.918412  [**] [1:2001219:18] ET SCAN Potential
SSH Scan [**] [Classification: Attempted Information Leak] [Priority: 2]
{TCP} 218.7.204.194:35566 -> 172.2.80.66:22
     29 03/02/2013-08:12:21.075942  [**] [1:2006546:6] ET SCAN LibSSH Based
Frequent SSH Connections Likely BruteForce Attack! [**] [Classification:
Attempted Administrator Privilege Gain] [Priority: 1] {TCP}
218.7.204.194:35566 -> 172.2.80.66:22
     30 03/02/2013-09:23:13.147405  [**] [1:2006435:7] ET SCAN LibSSH Based
SSH Connection - Often used as a BruteForce Tool [**] [Classification: Misc
activity] [Priority: 3] {TCP} 64.237.99.107:48374 -> 172.        27.83.61:22
     31 03/02/2013-11:43:28.208922  [**] [1:2006435:7] ET SCAN LibSSH Based
SSH Connection - Often used as a BruteForce Tool [**] [Classification: Misc
activity] [Priority: 3] {TCP} 64.237.99.107:58287 -> 172.        27.83.61:22
     32 03/02/2013-15:59:08.792464  [**] [1:2101145:10] GPL WEB_SERVER
/~root access [**] [Classification: Attempted Information Leak] [Priority:
2] {TCP} 59.9.204.222:5120 -> 172.2.80.66:80
     33 03/02/2013-15:59:08.799788  [**] [1:2101145:10] GPL WEB_SERVER
/~root access [**] [Classification: Attempted Information Leak] [Priority:
2] {TCP} 59.9.204.222:5120 -> 172.2.80.66:80
     34 03/02/2013-15:59:09.235837  [**] [1:2221020:1] SURICATA HTTP
response field missing colon [**] [Classification: Generic Protocol Command
Decode] [Priority: 3] {TCP} 172.2.80.66:80 -> 59.9.204.222:5119
     35 03/02/2013-15:59:09.242015  [**] [1:2221020:1] SURICATA HTTP
response field missing colon [**] [Classification: Generic Protocol Command
Decode] [Priority: 3] {TCP} 172.2.80.66:80 -> 59.9.204.222:5121
     36 03/02/2013-15:59:10.465212  [**] [1:2001343:22] ET WEB_SERVER IIS
ASP.net Auth Bypass / Canonicalization % 5 C [**] [Classification: Web
Application Attack] [Priority: 1] {TCP} 59.9.204.222:5145 -> 172
 .27.83.61:80
     37 03/02/2013-15:59:10.913370  [**] [1:2002997:9] ET WEB_SERVER PHP
Remote File Inclusion (monster list http) [**] [Classification: Web
Application Attack] [Priority: 1] {TCP} 59.9.204.222:5144 -> 172.27.
 83.61:80
....

But when open drop.log, only partially blocked.

(drop.log)
....
     16 03/01/2013-04:00:43.144465: IN= OUT= SRC=59.9.204.222
DST=172.2.80.66 LEN=40 TOS=0x00 TTL=118 ID=28385 PROTO=TCP SPT=7918 DPT=22
SEQ=3927115279 ACK=3927115279 WINDOW=0 RST RES=0x00 URGP=0
     17 03/01/2013-04:01:58.343710: IN= OUT= SRC=172.2.80.66
DST=59.9.204.222 LEN=40 TOS=0x16 TTL=64 ID=63576 PROTO=TCP SPT=22 DPT=7918
SEQ=1805184753 ACK=3927115279 WINDOW=19832 ACK RST RES=0x00 URGP=0
     18 03/02/2013-13:21:15.178478: IN= OUT= SRC=121.156.121.93
DST=172.2.80.66 LEN=64 TOS=0x00 TTL=56 ID=24632 PROTO=TCP SPT=59922 DPT=80
SEQ=2302589101 ACK=1980197093 WINDOW=46 ACK RES=0x00 URGP=0
     19 03/04/2013-01:24:50.061315: IN= OUT= SRC=14.63.160.92
DST=172.2.80.66 LEN=40 TOS=0x00 TTL=59 ID=0 PROTO=TCP SPT=53882 DPT=22
SEQ=1794077933 ACK=0 WINDOW=0 RST RES=0x00 URGP=0
....

So what should i do to drop those requests that depending on priority in
fast.log? (ex. drop requests when priority > 2)
Thanks for taking a look and helping me out - any pointers appreciated.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openinfosecfoundation.org/pipermail/oisf-users/attachments/20130312/9a8834c4/attachment.html>


More information about the Oisf-users mailing list