-
Version2.4.40 Installation MethodSecurity Onion ISO image Descriptionconfiguration Installation TypeDistributed Locationon-prem with Internet access Hardware SpecsExceeds minimum requirements CPU8 RAM32 Storage for /500 Storage for /nsm500 Network Traffic Collectionspan port Network Traffic SpeedsLess than 1Gbps StatusYes, all services on all nodes are running OK Salt StatusNo, there are no failures LogsNo, there are no additional clues DetailSince some suricata rules generate a lot of false positives I've written my own rules, basically replacing "alert" with "pass" for certain combinations of source- and destination IPs. For example: I get lots of false positives for sid 2100366 ("GPL ICMP_INFO PING *NIX") for an internal host pinging other hosts. So I took the builtin rule for the sid
and generated a local rule
(i.e. different sid) Problem: Despite having a "pass" in my local rule, the builtin rule still fires even for the source IP of 192.168.4.5 as it seems the builtin rules are processed first. So I tought about modifying the original rule (sid:2100366) into
so that traffic from everything but 192.168.4.5 is being alerted, but not traffic from 192.168.4.5 My questions:
Thanks in advance for any clue. Guidelines
|
Beta Was this translation helpful? Give feedback.
Replies: 3 comments 4 replies
-
If you don't want an alert for a specific IP, I think you want to add a threshold/suppression to the rule instead. See the Also note that if your local rule has the same SID as a downloaded rule, the local rule will take precedence over the downloaded rule. However, there's a configuration section under |
Beta Was this translation helpful? Give feedback.
-
Hi, "suppress" won't work for me since I only want to whitelist an alarm based on a combination of source- and destination-IP which is something suppress can't do.
That's fine for a simple override, but I'm looking for something different: Disabling an alarm for a signature when it gets triggered for a certain combination of source- and destination IP while keeping the alarm active for all other combinations of source- and destination-IP; so basically the rule should behave differently dependent of the combination of source-/destination-IP. Also thought about a BPF-filter, but that's no option either since it gets triggered based on IP-addresses so having a BPF-filter on the combination of IP-adresses to be whitelisted would result whitelisting any sort of traffic between these two hosts. |
Beta Was this translation helpful? Give feedback.
-
Suppose we have two IPs, 192.168.4.1 and 192.168.5.1 and traffic between them produces a false alarm for sid=50000. How do you mean I should approach this in terms of rules / flowbits? (Sorry, but flowbits is something completely new for me - never worked with them (until now)) |
Beta Was this translation helpful? Give feedback.
I've not created rules using flowbits myself, and don't have time to outright develop it for you, but to show an example, search through your ETGPL rules for
winhlp32
and see the three rules that come up.Notice the
flowbits:noalert;
andflowbits:set,winhlp32;
sections in the first, andflowbits:isset,winhlp32;
in the othes. If the first rule fires, it doesn't trigger an alert, just sets the flowbit. Because of the isset check, the other rules will only be run on packets with that flowbit set. So my thinking was, you:flowbits:noalert;
andflowbits:set,ignoreping;
…