[Oisf-users] xbit 'expire' keyword?

Victor Julien lists at inliniac.net
Mon Oct 17 21:19:20 UTC 2016


On 17-10-16 23:13, John Devine wrote:
> Hi all,
> 
> So I am messing around with xbits in suricata and have created two
> custom rules:
> 
> alert ip any any -> any any (msg:"CUSTOM XBITS!"; \
> xbits:set, testthisbit, track ip_src, expire 360; sid:5000000001;)
> 
> alert ip any any -> any any (msg:"XBITS!"; \
> xbits:isset, testthisbit, track ip_src; sid:5000000002;)
> 
> My understanding is that the 'expire' keyword expires the set xbit after
> the time specified (6 minutes) yet after that time I am still getting
> alerts based on that xbit. How exactly does the 'expire' keyword work?
> How can I get an alert to stop alerting after a certain time using xbits?

The timer is reset each time 5000000001 matches. So that should probably
be a more unique rule.

Cheers,
Victor



> 
> Thanks
> 
> 
> 
> ------------------------------------------------------------------------
> *From:* Oisf-users <oisf-users-bounces at lists.openinfosecfoundation.org>
> on behalf of Victor Julien <lists at inliniac.net>
> *Sent:* Thursday, October 13, 2016 10:37 AM
> *To:* oisf-users at lists.openinfosecfoundation.org
> *Subject:* Re: [Oisf-users] whitelist with timeout?
>  
> On 12-10-16 20:41, John Devine wrote:
>> thanks for your input. That's the path I'm going down at the moment,
>> creating my own custom rules file. The key piece I need to know is if
>> there is timeout functionality on the rules and where, if at all, does
>> suricata keep track of what it has blocked. I want to be able to see an
>> IP that was blocked by suricata, unblock it "for now" (not whitelist it
>> entirely) but have it alert again if it generates bad traffic in the future.
> 
> Suricata has no automatic built-in blacklist/whitelist and doesn't keep
> track of drops. You can add something like it yourself through the
> rules. Below is an example of rules incoming to my SSH server.
> 
> The first 2 rules match on a SSH software version often used in bots.
> They drop the traffic and create an 'xbit' 'badssh' for the source ip.
> It expired in an hour.
> 
> drop ssh any any -> $MYSERVER 22 (msg:"DROP libssh incoming"; \
>   flow:to_server,established; ssh.softwareversion:"libssh"; \
>   xbits:set, badssh, track ip_src, expire 3600; sid:4000000005;)
> drop ssh any any -> $MYSERVER 22 (msg:"DROP libssh incoming"; \
>   flow:to_server,established; ssh.softwareversion:"PUTTY"; \
>   xbits:set, badssh, track ip_src, expire 3600; sid:4000000007;)
> 
> Then I have a rule that simply drops any incoming traffic to that server
> that is on that 'badssh' list. *
> 
> drop ssh any any -> $MYSERVER 22 (msg:"DROP BLACKLISTED"; \
>   xbits:isset, badssh, track ip_src; sid:4000000006;)
> 
> *) Technically it works the other way around, it is stored in a host
> table where per host information about which bits are set is stored.
> 
> You can create your own whitelist/blacklist logic with timeouts using
> the xbits keyword.
> 
> Cheers,
> Victor
> 
>> 
>> 
>> 
>> ------------------------------------------------------------------------
>> *From:* Cooper F. Nelson <cnelson at ucsd.edu>
>> *Sent:* Wednesday, October 12, 2016 1:21 PM
>> *To:* John Devine; oisf-users at lists.openinfosecfoundation.org
>> *Subject:* Re: [Oisf-users] whitelist with timeout?
>>  
>> Sort of.
>> 
>> What you could do is create pass rules to whitelist the IPs and then
>> store them in a separate rules file, like 'pass.rules'.
>> 
>> You could then have a separate process to add/remove pass rules in this
>> file via cron or some other mechanism, then trigger a rule reload on the
>> suricata process.
>> 
>> -Coop
>> 
>> On 10/12/2016 5:49 AM, John Devine wrote:
>>> Hi all,
>>> 
>>> Quick question regarding suricata: is it possible to whitelist IPs with a specific timeout in suricata?
>>> 
>>> Thanks
>>> 
>>> 
>>> 
>>> _______________________________________________
>>> Suricata IDS Users mailing list: oisf-users at openinfosecfoundation.org
>>> Site: http://suricata-ids.org | Support: http://suricata-ids.org/support/
> <http://suricata-ids.org/support/>
> 	
> Support <http://suricata-ids.org/support/>
> suricata-ids.org
> FAQ A list of frequently asked questions (and their answers) is
> available here: Frequently Asked Questions Training Training options are
> now available: training Mailinglists Several users and devel…
> 
> 
> <http://suricata-ids.org/>
> 	
> Suricata <http://suricata-ids.org/>
> suricata-ids.org
> Open Source IDS / IPS / NSM engine
> 
> 
> 
>> <http://suricata-ids.org/support/>
> <http://suricata-ids.org/support/>
> 	
> Support <http://suricata-ids.org/support/>
> suricata-ids.org
> FAQ A list of frequently asked questions (and their answers) is
> available here: Frequently Asked Questions Training Training options are
> now available: training Mailinglists Several users and devel…
> 
> 
> 
>>        
>> Support <http://suricata-ids.org/support/>
> <http://suricata-ids.org/support/>
> 	
> Support <http://suricata-ids.org/support/>
> suricata-ids.org
> FAQ A list of frequently asked questions (and their answers) is
> available here: Frequently Asked Questions Training Training options are
> now available: training Mailinglists Several users and devel…
> 
> 
> 
>> suricata-ids.org
>> FAQ A list of frequently asked questions (and their answers) is
>> available here: Frequently Asked Questions Training Training options are
>> now available: training Mailinglists Several users and devel…
>> 
>> 
>> <http://suricata-ids.org/>
> <http://suricata-ids.org/>
> 	
> Suricata <http://suricata-ids.org/>
> suricata-ids.org
> Open Source IDS / IPS / NSM engine
> 
> 
> 
>>        
>> Suricata <http://suricata-ids.org/>
>> suricata-ids.org
>> Open Source IDS / IPS / NSM engine
>> 
>> 
>> 
>>> List: https://lists.openinfosecfoundation.org/mailman/listinfo/oisf-users
>>> Suricata User Conference November 9-11 in Washington, DC: http://suricon.net
> 2016 Conference in Washington, DC - suricon.net <http://suricon.net/>
> suricon.net
> Doug started Security Onion in 2008 to provide a comprehensive platform
> for intrusion detection, network security monitoring, and log management.
> 
> 
> 
>> 2016 Conference in Washington, DC - suricon.net <http://suricon.net/>
> 2016 Conference in Washington, DC - suricon.net <http://suricon.net/>
> suricon.net
> Doug started Security Onion in 2008 to provide a comprehensive platform
> for intrusion detection, network security monitoring, and log management.
> 
> 
> 
>> suricon.net
>> Doug started Security Onion in 2008 to provide a comprehensive platform
>> for intrusion detection, network security monitoring, and log management.
>> 
>> 
>> 
>>> 
>> 
>> 
>> -- 
>> Cooper Nelson
>> Network Security Analyst
>> UCSD ITS Security Team
>> cnelson at ucsd.edu x41042
>> 
>> 
>> 
>> _______________________________________________
>> Suricata IDS Users mailing list: oisf-users at openinfosecfoundation.org
>> Site: http://suricata-ids.org | Support: http://suricata-ids.org/support/
> <http://suricata-ids.org/support/>
> 	
> Support <http://suricata-ids.org/support/>
> suricata-ids.org
> FAQ A list of frequently asked questions (and their answers) is
> available here: Frequently Asked Questions Training Training options are
> now available: training Mailinglists Several users and devel…
> 
> 
> <http://suricata-ids.org/>
> 	
> Suricata <http://suricata-ids.org/>
> suricata-ids.org
> Open Source IDS / IPS / NSM engine
> 
> 
> 
>> List: https://lists.openinfosecfoundation.org/mailman/listinfo/oisf-users
>> Suricata User Conference November 9-11 in Washington, DC: http://suricon.net
> 2016 Conference in Washington, DC - suricon.net <http://suricon.net/>
> suricon.net
> Doug started Security Onion in 2008 to provide a comprehensive platform
> for intrusion detection, network security monitoring, and log management.
> 
> 
> 
>> 
> 
> 
> -- 
> ---------------------------------------------
> Victor Julien
> http://www.inliniac.net/
> PGP: http://www.inliniac.net/victorjulien.asc
> ---------------------------------------------
> 
> _______________________________________________
> Suricata IDS Users mailing list: oisf-users at openinfosecfoundation.org
> Site: http://suricata-ids.org | Support: http://suricata-ids.org/support/
> List: https://lists.openinfosecfoundation.org/mailman/listinfo/oisf-users
> Suricata User Conference November 9-11 in Washington, DC: http://suricon.net


-- 
---------------------------------------------
Victor Julien
http://www.inliniac.net/
PGP: http://www.inliniac.net/victorjulien.asc
---------------------------------------------




More information about the Oisf-users mailing list