[Oisf-users] Drops: From none to gigantic in the blink of an eye
Cloherty, Sean E
scloherty at mitre.org
Thu Mar 24 17:33:37 UTC 2016
When I start up - the last line is as below.
24/3/2016 -- 13:32:30 - <Notice> - This is Suricata version 3.0 RELEASE
24/3/2016 -- 13:32:30 - <Info> - CPUs/cores online: 32
24/3/2016 -- 13:32:30 - <Info> - 'default' server has 'request-body-minimal-inspect-size' set to 33882 and 'request-body-inspect-window' set to 4053 after randomization.
24/3/2016 -- 13:32:30 - <Info> - 'default' server has 'response-body-minimal-inspect-size' set to 42119 and 'response-body-inspect-window' set to 16872 after randomization.
24/3/2016 -- 13:32:30 - <Info> - DNS request flood protection level: 500
24/3/2016 -- 13:32:30 - <Info> - DNS per flow memcap (state-memcap): 524288
24/3/2016 -- 13:32:30 - <Info> - DNS global memcap: 16777216
24/3/2016 -- 13:32:30 - <Info> - Protocol detection and parser disabled for modbus protocol.
24/3/2016 -- 13:32:30 - <Info> - Found an MTU of 1500 for 'ens1f1'
24/3/2016 -- 13:32:30 - <Info> - allocated 3670016 bytes of memory for the defrag hash... 65536 buckets of size 56
24/3/2016 -- 13:32:30 - <Info> - preallocated 65535 defrag trackers of size 168
24/3/2016 -- 13:32:30 - <Info> - defrag memory usage: 14679896 bytes, maximum: 2147483648
24/3/2016 -- 13:32:30 - <Info> - AutoFP mode using default "Active Packets" flow load balancer
-----Original Message-----
From: Cooper F. Nelson [mailto:cnelson at ucsd.edu]
Sent: Thursday, March 24, 2016 13:30 PM
To: Cloherty, Sean E <scloherty at mitre.org>; Victor Julien <lists at inliniac.net>; oisf-users at lists.openinfosecfoundation.org
Subject: Re: [Oisf-users] Drops: From none to gigantic in the blink of an eye
It would be in the suricata.log file, the log entries look like this:
> [12105] 24/3/2016 -- 17:07:04 - (flow-manager.c:667) <Info>
> (FlowManager) -- Flow emergency mode over, back to normal... unsetting
> FLOW_EMERGENCY bit (ts.tv_sec: 1458839205, ts.tv_usec:62) flow_spare_q
> status(): 123% flows at the queue
Are you following this article, configuration-wise?
https://home.regit.org/2012/07/suricata-to-10gbps-and-beyond/
What makes you think you are running in "autofp" mode? If you want, you can send your suricata.log file to me and I'll see if I can figure out what the problem is.
-Coop
On 3/24/2016 10:22 AM, Cloherty, Sean E wrote:
> Grepping the stats.log file for 'emergency' came up blank.
>
> -----Original Message-----
> From: Oisf-users
> [mailto:oisf-users-bounces at lists.openinfosecfoundation.org] On Behalf
> Of Victor Julien
> Sent: Thursday, March 24, 2016 11:52 AM
> To: oisf-users at lists.openinfosecfoundation.org
> Subject: Re: [Oisf-users] Drops: From none to gigantic in the blink of
> an eye
>
> On 23-03-16 20:33, Cooper F. Nelson wrote:
>> The thing about SYN floods is that don't generate that much traffic.
>> They are designed to DOS hosts, not networks. And it only takes a
>> few mbits of SYN packets from spoofed source addresses/ports to DOS a
>> suricata sensor, due to flow hashing/tracking.
>>
>> If it's a memory leak you should be able to see that by running top
>> and monitoring memory usage, which looks ok in your case.
>>
>> If it's an issue with the flow memory-cap I would think you be seeing
>> lots of messages in the suricata log about flow-emergency mode.
>
> Good point. The counters didn't show this, while they should have I think.
>
> Sean, did you get flow 'emergency' mode messages in your log or to stdout?
>
> Cheers,
> Victor
>
>>
>> -Coop
>>
>> On 3/23/2016 12:26 PM, Cloherty, Sean E wrote:
>>> Thank you Cooper,
>>>
>>> I will give this a try. Though I would assume that the SYN flood
>>> would still show up as increased network traffic on the interface.
>>> This is a test machine, but I do have it integrated into our
>>> production Zabbix monitor so I can keep an eye on it.
>>>
>>> Does anyone think it might be a symptom of a memory leak? Would it
>>> be worthwhile testing Victor's suggestion before trying the new RC
>>> that was released?
>>
>>
>>
>>
>> _______________________________________________
>> Suricata IDS Users mailing list: oisf-users at openinfosecfoundation.org
>> Site: http://suricata-ids.org | Support:
>> http://suricata-ids.org/support/
>> List:
>> https://lists.openinfosecfoundation.org/mailman/listinfo/oisf-users
>> Suricata User Conference November 9-11 in Washington, DC:
>> http://oisfevents.net
>>
>
>
> --
> ---------------------------------------------
> Victor Julien
> http://www.inliniac.net/
> PGP: http://www.inliniac.net/victorjulien.asc
> ---------------------------------------------
>
> _______________________________________________
> Suricata IDS Users mailing list: oisf-users at openinfosecfoundation.org
> Site: http://suricata-ids.org | Support:
> http://suricata-ids.org/support/
> List:
> https://lists.openinfosecfoundation.org/mailman/listinfo/oisf-users
> Suricata User Conference November 9-11 in Washington, DC:
> http://oisfevents.net _______________________________________________
> Suricata IDS Users mailing list: oisf-users at openinfosecfoundation.org
> Site: http://suricata-ids.org | Support:
> http://suricata-ids.org/support/
> List:
> https://lists.openinfosecfoundation.org/mailman/listinfo/oisf-users
> Suricata User Conference November 9-11 in Washington, DC:
> http://oisfevents.net
>
--
Cooper Nelson
Network Security Analyst
UCSD ITS Security Team
cnelson at ucsd.edu x41042
More information about the Oisf-users
mailing list