[Oisf-users] [Emerging-Sigs] SID: http://docs.emergingthreats.net/2014380/
Victor Julien
lists at inliniac.net
Mon Dec 12 19:50:29 UTC 2016
On 12-12-16 20:48, Duane Howard wrote:
> forking thread to oisf-users...
>
> On Mon, Dec 12, 2016 at 11:42 AM, Francis Trudeau
> <ftrudeau at emergingthreats.net <mailto:ftrudeau at emergingthreats.net>> wrote:
>
> We were seeing FP reports on this as just the depth wasn't doing
> enough to make sure the sig was matching on the HTTP headers.
>
> Suricata, because the POST isn't capitalized, doesn't consider this
> HTTP so we couldn't use the HTTP buffers. Snort on the other hand
> looks at this as HTTP, because of the ports, so we could do this:
>
> is this a known bug in libhtp? Or rather is it expected? This seems like
> a bad decision from an IDS perspective?
Waiting for a PCAP but pretty sure the claim is inaccurate.
Cheers,
Victor
>
> alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET POLICY
> HTTP POST invalid method case outbound"; flow:established,to_server;
> content:"post"; http_method; nocase; content:!"POST"; http_method;
> reference:url,www.w3.org/Protocols/rfc2616/rfc2616-sec9.html
> <http://www.w3.org/Protocols/rfc2616/rfc2616-sec9.html>;
> classtype:bad-unknown; sid:2014380; rev:3;)
>
> The rule that was FPing was rev:2, the Suricata sig skipped from
> rev:2 to rev:4 due to internal processes that made it skip a rev in
> the final output. The docs page uses the Suricata version as we are
> partial to Suricata ;)
>
> Are you seeing FPs with rev:3 of the Snort signature?
>
> ft
>
>
>
>
> On Mon, Dec 12, 2016 at 8:59 AM, Jim McKibben
> <jmckibben at riskanalytics.com <mailto:jmckibben at riskanalytics.com>>
> wrote:
>
> The rev 4 of this rule isn't included in
> the https://rules.emergingthreats.net/open-nogpl/snort-2.9.0/emerging.rules.tar.gz
> <https://rules.emergingthreats.net/open-nogpl/snort-2.9.0/emerging.rules.tar.gz>
> package.
>
> Is there a reason for this? It is FPing for sites that contain
> the text "post" such as nypost.com <http://nypost.com> and such.
> --
>
>
> <https://riskanalytics.com/>
>
>
>
> *Jim McKibben
> *Security Analyst GSEC GWAPT
> Office / 913-685-6588 <tel:913-685-6588>
> Mobile / 573-424-4848 <tel:573-424-4848>
> jmckibben at riskanalytics.com <mailto:jmckibben at riskanalytics.com>
>
> RiskAnalytics <https://riskanalytics.com/> Twitter
> <https://twitter.com/riskanalytics> LinkedIn
> <https://www.linkedin.com/company/riskanalytics-llc> Facebook
> <https://www.facebook.com/riskanalytics?fref=ts>
>
>
> CONFIDENTIAL:
> The information in this email (and any attachments) is
> confidential. If you are not the intended recipient, you must
> not read, use or disseminate the information. Please reply to
> the sender and take the steps necessary to delete the message
> completely from your computer system. Although this email and
> any attachments are believed to be free of any virus or other
> defect that might affect any computer system into which it is
> received and opened, it is the responsibility of the recipient
> to ensure that it is virus free and no responsibility is
> accepted by RiskAnalytics, LLC for any loss or damage arising in
> any way from its use.
>
> _______________________________________________
> Emerging-sigs mailing list
> Emerging-sigs at lists.emergingthreats.net
> <mailto:Emerging-sigs at lists.emergingthreats.net>
> https://lists.emergingthreats.net/mailman/listinfo/emerging-sigs
> <https://lists.emergingthreats.net/mailman/listinfo/emerging-sigs>
>
> Support Emerging Threats! Subscribe to Emerging Threats Pro
> http://www.emergingthreats.net
>
>
>
>
> _______________________________________________
> Emerging-sigs mailing list
> Emerging-sigs at lists.emergingthreats.net
> <mailto:Emerging-sigs at lists.emergingthreats.net>
> https://lists.emergingthreats.net/mailman/listinfo/emerging-sigs
> <https://lists.emergingthreats.net/mailman/listinfo/emerging-sigs>
>
> Support Emerging Threats! Subscribe to Emerging Threats Pro
> http://www.emergingthreats.net
>
>
>
>
>
> _______________________________________________
> Suricata IDS Users mailing list: oisf-users at openinfosecfoundation.org
> Site: http://suricata-ids.org | Support: http://suricata-ids.org/support/
> List: https://lists.openinfosecfoundation.org/mailman/listinfo/oisf-users
> Suricata User Conference November 9-11 in Washington, DC: http://suricon.net
>
--
---------------------------------------------
Victor Julien
http://www.inliniac.net/
PGP: http://www.inliniac.net/victorjulien.asc
---------------------------------------------
More information about the Oisf-users
mailing list