Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Some questions about Snort

    Scheduled Pinned Locked Moved pfSense Packages
    5 Posts 3 Posters 4.8k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • V
      vmnit
      last edited by

      I wrote this rule to test Ping of Death Denial of Service:

      alert icmp any any -> any any (msg:"Ping of Death Detected"; dsize:>1000; itype:8; icode:0; detection_filter:track by_src, count 30, seconds 1; sid:2000004; classtype:denial-of-service; rev:3;)
      

      And this command to test:

      hping3 -i u10000 -1 -d 1200 
      

      Everything works fine. Snort generated alert and block ip source. But traffic doesn't seem slowing down:

      Is it normal? I try to use "drop" action but it doesn't work.

      1 Reply Last reply Reply Quote 0
      • M
        michelm
        last edited by

        Did you activate the Kill states option?

        Snort doesn't work in inline_mode, so you can't set the drop or reject option in the rule.

        1 Reply Last reply Reply Quote 0
        • V
          vmnit
          last edited by

          yes, i already checked kill state option. Is there any other way to drop or reject packets? Or install snort-inline?

          1 Reply Last reply Reply Quote 0
          • E
            eri--
            last edited by

            Maybe you did the test from an ip in the trusted subnet?

            1 Reply Last reply Reply Quote 0
            • V
              vmnit
              last edited by

              I tested on two VMware VM like this with spoof ip address:
              LAN Net (10.0.0.0/24) –--- (LAN: 10.0.0.1) pfSense (WAN: 192.168.1.100/24 | GW: 192.168.1.1) ---- Backtrack (192.168.1.3/24)

              $HOME_NET:

              Before I start Snort, traffic like this:

              Packet Capture:

              After I started Snort, it block the spoof IP:

              And traffic like this:

              From what I captured, it doesn't generate any packet echo (ping) reply because the spoof ip are blocked. But the incoming traffic still high. Is there any way I can slow it down?

              1 Reply Last reply Reply Quote 0
              • First post
                Last post
              Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.