[Oisf-users] Suricata not detecting nmap scan?

rmkml rmkml at yahoo.fr
Thu Oct 23 15:08:23 UTC 2014


Good!

what's IPs appear on http-log please ? internal IPs ? external/nat IPs ?

What network interface Suricata listen please ? internal ? external ?
(maybe before NAT?)

HOME_NET and EXTERNAL_NET need to understand where Suricata listen...

Regards
@Rmkml


On Thu, 23 Oct 2014, Claudio Kuenzler wrote:

> Halleluja!
> 
> After having changed HOME_NET and EXTERNAL_NET to any:
> 
>     HOME_NET: "any"
> 
>     EXTERNAL_NET: "any"
> 
> ... Suricata is now successfully detecting the scan as alert and is writing the alert into the unified2 file.
> 
> Excellent advice rmkml, thanks.
> 
> Just for the better understanding: If the machine Suricata is installed on a machine which serves as firewall/router, should HOME_NET and EXTERNAL_NET generally be set to "any"?
> 
> On Thu, Oct 23, 2014 at 4:42 PM, rmkml <rmkml at yahoo.fr> wrote:
>       Could you check:
>       https://redmine.openinfosecfoundation.org/projects/suricata/wiki/Setting_up_IPSinline_for_Linux
>
>       Well, if I understand correctly, Suricata log http request without nfqueue, if yes: you don't need nfqueue ;) (for suricata)
>       or you need a "IPS" mode ?
>
>       could you change $HOME_NET to any ? (because translation)
>       Same with $EXTERNAL_NET to any please (for testing)
>
>       like this:
>       alert http any any -> any any (...
>
>       Regards
>       @Rmkml
> 
>
>       On Thu, 23 Oct 2014, Claudio Kuenzler wrote:
> 
> 
>
>                   Thx Claudio,
> 
>
>             Well thank you! :)
>              
>
>                   ok, could you enable log on http/dns for testing please ? do you have log after ?
> 
>
>             Actually the logging of http works. Already before I disabled the checksum validation. I see typical requests to the web server.
>             And I also see my nmap request in the http log - that's why I'm confused. Suricata sees the traffic from nmap going by, logging it in the http log but does not alert?
>              
>
>                   where you start nmap please ? internal -> external ? external -> internal ?
> 
>
>             I launched nmap from my machine at home in internal network, being natted to an external IP and then straight to the server listening on a public IP, where suricata is installed. The http traffic is then natted from the public to an
>             internal ip.
>             So: internal -> NAT -> external -> NAT -> internal
>              
>
>                   what is your nfqueue configuraton please ?
> 
>
>             That's exactly the point where I am not sure. Do I have to add an ipfilter rule for the NFQUEUE or not?
>             Currently there is no NFQUEUE rule nor any special configuration I did on the machine (concerning NFQUEUE).
>              
>
>                   are you sure nmap check http please ? (http is avalaible ? fw is open ?)
> 
>
>             The nmap command is "nmap -Pn -sS -A -f TARGETIP". Yes, it does check for http information, as I can see in the output:
>
>             80/tcp   open   http    nginx
>             |_http-title: XXX
>             |_http-methods: No Allow or Public header in OPTIONS response (status code 200)
>             443/tcp  open   http    nginx
>             |_http-methods: No Allow or Public header in OPTIONS response (status code 400)
>             |_http-title: 400 The plain HTTP request was sent to HTTPS port
>             | ssl-cert: Subject: commonName=*.smartlinksa.ch/organizationName=XXXX/stateOrProvinceName=XXXX/countryName=CH
>
>              
>
>                   could you record network packet like full tcpdump please ?
> 
>
>             Will do that if necessary (and send you private). But I still have some hope its due to the "non-configured" NFQUEUE situation. I have so far believed that this would not be necessary for suricata to run, but maybe it is? As stated
>             above, that's the point
>             where I am not sure.
> 
> 
> 
>


More information about the Oisf-users mailing list