How serious should I take "invalid chunk size" and "double decoding attack" alerts?
-
I'm in the monitoring phase of a new Snort deployment, evaluating the alerts before I turn on blocking. I'm seeing a lot of the following:
GID:SID
120:28
(http_inspect) Invalid Chunk size or chunk size followed by junk characters
Usually going to an Amazon AWS address, but also to a domain I’ve never heard of, possibly advertising?119:2
(http_inspect) Double decoding attack
Going to an Amazon AWS address.Also, I have been suppressing any alert dealing with AWS, Akamai, and Cloudfront. How do you all evaluate CDN or AWS traffic? Thanks for your input.
-
Not very seriously, to be honest. Those alerts are coming from the HTTP_INSPECT preprocessor rules within Snort. Those rules can be easily fooled these days by the normal things web sites do. First, the rules are HTTP but almost all traffic is now HTTPS. Second, the rules are looking for strict adherence to RFC recommendations. But in order to serve up ads and (to the extent they can) foil ad-blockers, web sites do a lot of non-standard stuff in their JavaScript code. This non-standard stuff is not always malicious, but the HTTP_INSPECT preprocessor rules may trigger on it as such.
So disable those rules by clicking the red X. They are most likely getting tripped up trying to examine HTTPS-encrypted stuff. You are seeing the result of the web moving to SSL traffic. IDS/IPS is losing its effectiveness because it can't see inside the encrypted payloads.
-
Awesome, very helpful, thanks!
-
Hello friend, I am in the same position. I have implemented pfsense in my organization. Snort is giving me the same alerts and blocks with Facebook and Whatsapp. I have disabled those blocks and alerts from the X however hours later it is blocking me again or showing alerts sometimes from the same IP or the IP block corresponding to 157.240.0.0/16.
In my passlist I have put that IP block so that it does not consider it but it keeps giving me the same error.
Did you manage to solve this kind of situations in any way?Translated with www.DeepL.com/Translator (free version)
-
@jonathan_figueroa said in How serious should I take "invalid chunk size" and "double decoding attack" alerts?:
Hello friend, I am in the same position. I have implemented pfsense in my organization. Snort is giving me the same alerts and blocks with Facebook and Whatsapp. I have disabled those blocks and alerts from the X however hours later it is blocking me again or showing alerts sometimes from the same IP or the IP block corresponding to 157.240.0.0/16.
In my passlist I have put that IP block so that it does not consider it but it keeps giving me the same error.
Did you manage to solve this kind of situations in any way?Translated with www.DeepL.com/Translator (free version)
When you add addresses to a Pass List you must then do two other things to have the change seen by the running Snort process. First, you must assign the Pass List to the interface by going to the INTERFACE SETTINGS tab, scrolling down to the Pass List drop-down, and selecting the proper list. Then save the change. Second, you must then restart Snort on the interface because the Pass List file is only read and processed once during Snort startup. It is not dynamically processed.
If you disable a rule or suppress an alert using the icons on the ALERTS tab, those changes are dynamic. When you click the icon, Snort is sent a SIGHUP signal that causes it to reload the rules and the assigned suppression list.
I strongly recommend disabling ALL the HTTP_INSPECT rules as they result in a lot of false positive triggers with modern web traffic. For alerts from other rules, you will need to examine each alerting rule and determine if it represents a false positive or not. That unique skill is what makes one a good IPS/IDS admin. Doing it well requires training and experience.