[Oisf-users] Suricata not detecting nmap scan?
rmkml
rmkml at yahoo.fr
Thu Oct 23 14:42:36 UTC 2014
Could you check:
https://redmine.openinfosecfoundation.org/projects/suricata/wiki/Setting_up_IPSinline_for_Linux
Well, if I understand correctly, Suricata log http request without
nfqueue, if yes: you don't need nfqueue ;) (for suricata)
or you need a "IPS" mode ?
could you change $HOME_NET to any ? (because translation)
Same with $EXTERNAL_NET to any please (for testing)
like this:
alert http any any -> any any (...
Regards
@Rmkml
On Thu, 23 Oct 2014, Claudio Kuenzler wrote:
>
>
> Thx Claudio,
>
>
> Well thank you! :)
>
>
> ok, could you enable log on http/dns for testing please ? do you have log after ?
>
>
> Actually the logging of http works. Already before I disabled the checksum validation. I see typical requests to the web server.
> And I also see my nmap request in the http log - that's why I'm confused. Suricata sees the traffic from nmap going by, logging it in the http log but does not alert?
>
>
> where you start nmap please ? internal -> external ? external -> internal ?
>
>
> I launched nmap from my machine at home in internal network, being natted to an external IP and then straight to the server listening on a public IP, where suricata is installed. The http traffic is then natted from the public to an internal ip.
> So: internal -> NAT -> external -> NAT -> internal
>
>
> what is your nfqueue configuraton please ?
>
>
> That's exactly the point where I am not sure. Do I have to add an ipfilter rule for the NFQUEUE or not?
> Currently there is no NFQUEUE rule nor any special configuration I did on the machine (concerning NFQUEUE).
>
>
> are you sure nmap check http please ? (http is avalaible ? fw is open ?)
>
>
> The nmap command is "nmap -Pn -sS -A -f TARGETIP". Yes, it does check for http information, as I can see in the output:
>
> 80/tcp open http nginx
> |_http-title: XXX
> |_http-methods: No Allow or Public header in OPTIONS response (status code 200)
> 443/tcp open http nginx
> |_http-methods: No Allow or Public header in OPTIONS response (status code 400)
> |_http-title: 400 The plain HTTP request was sent to HTTPS port
> | ssl-cert: Subject: commonName=*.smartlinksa.ch/organizationName=XXXX/stateOrProvinceName=XXXX/countryName=CH
>
>
>
> could you record network packet like full tcpdump please ?
>
>
> Will do that if necessary (and send you private). But I still have some hope its due to the "non-configured" NFQUEUE situation. I have so far believed that this would not be necessary for suricata to run, but maybe it is? As stated above, that's the point
> where I am not sure.
>
>
More information about the Oisf-users
mailing list