Project

General

Profile

Actions

Bug #153

closed

flag checking in Suricata is not strict enough.

Added by Will Metcalf almost 14 years ago. Updated almost 14 years ago.

Status:
Closed
Priority:
Normal
Target version:
Affected Versions:
Effort:
Difficulty:
Label:

Description

We are not strict enough when dealing with flags. This sig fires in
suricata, but fails to fire in snort because it appears as if snort
uses stricter checking for flags. So to get this to fire in snort I
need something like RA,12 or +R,12. As the ACK flag is set along with
the Reset flag.

alert tcp $EXTERNAL_NET 6112 -> $HOME_NET 1024: (msg:"ET GAMES Battle.net connection reset (possible IP-Ban)"; flags:R,12; classtype: policy-violation; reference:url,doc.emergingthreats.net/bin/view/Main/2002117; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/GAMES/GAMES_Battlenet; sid:2002117; rev:5;)

19:36:55.033713 IP 192.168.100.13.43844 > 192.168.2.35.6112: Flags
[S], seq 261064610, win 5840, options [mss 1460,sackOK,TS val 4825806
ecr 0,nop,wscale 7], length 0
19:36:55.142385 IP 192.168.2.35.6112 > 192.168.100.13.43844: Flags
[R.], seq 0, ack 261064611, win 0, length 0


Files

PSBattleNet.pcap (184 Bytes) PSBattleNet.pcap port 6112 traffic with Reset/Ack flag set Will Metcalf, 05/10/2010 11:33 AM
0001-fixed-the-flags-checking-and-make-it-more-strict-in.patch (4.56 KB) 0001-fixed-the-flags-checking-and-make-it-more-strict-in.patch Gurvinder Singh, 05/14/2010 01:59 AM
Actions #1

Updated by Gurvinder Singh almost 14 years ago

The attached makes the flags checking more stricter and also corrects the ignored flags handling.

Actions #2

Updated by Victor Julien almost 14 years ago

  • Status changed from Resolved to Closed
  • % Done changed from 90 to 100

Applied, thanks Gurvinder.

Actions

Also available in: Atom PDF