[Oisf-users] [Emerging-Sigs] SID: http://docs.emergingthreats.net/2014380/

Victor Julien lists at inliniac.net
Mon Dec 12 20:01:32 UTC 2016


On 12-12-16 20:50, Victor Julien wrote:
> On 12-12-16 20:48, Duane Howard wrote:
>> forking thread to oisf-users...
>>
>> On Mon, Dec 12, 2016 at 11:42 AM, Francis Trudeau
>> <ftrudeau at emergingthreats.net <mailto:ftrudeau at emergingthreats.net>> wrote:
>>
>>     We were seeing FP reports on this as just the depth wasn't doing
>>     enough to make sure the sig was matching on the HTTP headers.  
>>
>>     Suricata, because the POST isn't capitalized, doesn't consider this
>>     HTTP so we couldn't use the HTTP buffers.  Snort on the other hand
>>     looks at this as HTTP, because of the ports, so we could do this:
>>
>> is this a known bug in libhtp? Or rather is it expected? This seems like
>> a bad decision from an IDS perspective? 
> 
> Waiting for a PCAP but pretty sure the claim is inaccurate.

{"timestamp":"2016-12-12T21:00:06.638218+0100","flow_id":5259215214027,"event_type":"http","src_ip":"192.168.1.6","src_port":56388,"dest_ip":"96.43.130.5","dest_port":80,"proto":"TCP","tx_id":0,"http":{"url":"/victor","http_user_agent":"victor","http_content_type":"text/html","http_method":"post","protocol":"HTTP/1.0","status":301,"redirect":"http://www.oisf.net","length":227},"host":"c2758-ips"}

Manual test confirms lowercase 'post' is still correctly ends up in the
'http_method' field.

Cheers,
Victor

> 
> Cheers,
> Victor
> 
> 
>>
>>     alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET POLICY
>>     HTTP POST invalid method case outbound"; flow:established,to_server;
>>     content:"post"; http_method; nocase; content:!"POST"; http_method;
>>     reference:url,www.w3.org/Protocols/rfc2616/rfc2616-sec9.html
>>     <http://www.w3.org/Protocols/rfc2616/rfc2616-sec9.html>;
>>     classtype:bad-unknown; sid:2014380; rev:3;)
>>
>>     The rule that was FPing was rev:2, the Suricata sig skipped from
>>     rev:2 to rev:4 due to internal processes that made it skip a rev in
>>     the final output.  The docs page uses the Suricata version as we are
>>     partial to Suricata ;)
>>
>>     Are you seeing FPs with rev:3 of the Snort signature?
>>
>>     ft
>>
>>
>>
>>
>>     On Mon, Dec 12, 2016 at 8:59 AM, Jim McKibben
>>     <jmckibben at riskanalytics.com <mailto:jmckibben at riskanalytics.com>>
>>     wrote:
>>
>>         The rev 4 of this rule isn't included in
>>         the https://rules.emergingthreats.net/open-nogpl/snort-2.9.0/emerging.rules.tar.gz
>>         <https://rules.emergingthreats.net/open-nogpl/snort-2.9.0/emerging.rules.tar.gz>
>>         package.
>>
>>         Is there a reason for this? It is FPing for sites that contain
>>         the text "post" such as nypost.com <http://nypost.com> and such.
>>         -- 
>>
>>
>>         <https://riskanalytics.com/>
>>
>>         	
>>
>>         *Jim McKibben
>>         *Security Analyst GSEC GWAPT
>>         Office / 913-685-6588 <tel:913-685-6588>
>>         Mobile / 573-424-4848 <tel:573-424-4848>
>>         jmckibben at riskanalytics.com <mailto:jmckibben at riskanalytics.com>
>>
>>         RiskAnalytics <https://riskanalytics.com/>  Twitter
>>         <https://twitter.com/riskanalytics>  LinkedIn
>>         <https://www.linkedin.com/company/riskanalytics-llc>  Facebook
>>         <https://www.facebook.com/riskanalytics?fref=ts>
>>
>>
>>         CONFIDENTIAL:
>>         The information in this email (and any attachments) is
>>         confidential.  If you are not the intended recipient, you must
>>         not read, use or disseminate the information.  Please reply to
>>         the sender and take the steps necessary to delete the message
>>         completely from your computer system.  Although this email and
>>         any attachments are believed to be free of any virus or other
>>         defect that might affect any computer system into which it is
>>         received and opened, it is the responsibility of the recipient
>>         to ensure that it is virus free and no responsibility is
>>         accepted by RiskAnalytics, LLC for any loss or damage arising in
>>         any way from its use.
>>
>>         _______________________________________________
>>         Emerging-sigs mailing list
>>         Emerging-sigs at lists.emergingthreats.net
>>         <mailto:Emerging-sigs at lists.emergingthreats.net>
>>         https://lists.emergingthreats.net/mailman/listinfo/emerging-sigs
>>         <https://lists.emergingthreats.net/mailman/listinfo/emerging-sigs>
>>
>>         Support Emerging Threats! Subscribe to Emerging Threats Pro
>>         http://www.emergingthreats.net
>>
>>
>>
>>
>>     _______________________________________________
>>     Emerging-sigs mailing list
>>     Emerging-sigs at lists.emergingthreats.net
>>     <mailto:Emerging-sigs at lists.emergingthreats.net>
>>     https://lists.emergingthreats.net/mailman/listinfo/emerging-sigs
>>     <https://lists.emergingthreats.net/mailman/listinfo/emerging-sigs>
>>
>>     Support Emerging Threats! Subscribe to Emerging Threats Pro
>>     http://www.emergingthreats.net
>>
>>
>>
>>
>>
>> _______________________________________________
>> Suricata IDS Users mailing list: oisf-users at openinfosecfoundation.org
>> Site: http://suricata-ids.org | Support: http://suricata-ids.org/support/
>> List: https://lists.openinfosecfoundation.org/mailman/listinfo/oisf-users
>> Suricata User Conference November 9-11 in Washington, DC: http://suricon.net
>>
> 
> 


-- 
---------------------------------------------
Victor Julien
http://www.inliniac.net/
PGP: http://www.inliniac.net/victorjulien.asc
---------------------------------------------




More information about the Oisf-users mailing list