Le vendredi 21 mars 2008 à 01:50 +0100, Javier Fernández-Sanguino Peña a
écrit :
> On Thu, Mar 20, 2008 at 11:25:06PM +0100, Benoît Dejean wrote:
> > Package: snort
> > Version: 2.7.0-13
> > Severity: important
> > 
> > Snort is uninstallable since it is started in foreground when
> > configuring the package. Killing it makes the configure fails and
> > renders package broken.
> > 
> > Manually starting snort with /etc/init.d/snort start also starts it in
> > foreground.
> 
> Could you please send me the output of executing the following (as root):
> sh -x /etc/init.d/snort start

Hello Javier,

I've attached the output.
I have purged snort, then re-installed it and can reproduce. The funny
thing is that snort is started twice during the installation (so i have
to kill it twice).

> Also please tell me whether you have a file named 
> /etc/snort/snort.common.parameters or
> a file /etc/default/snort in your system (or both) and provide the contents
> of those files.

I have no such files.

> It certainly looks like there is some problem with your configuration and
> snort's parameters are not properly set to make it run in Daemon mode.
> 
> Thank you

Feliz Pascua!

> Javier
-- 
Benoît Dejean
GNOME http://www.gnomefr.org/
LibGTop http://directory.fsf.org/libgtop.html
+ PATH=/usr/local/sbin:/usr/local/bin:/sbin:/bin:/usr/sbin:/usr/bin
+ test
+ DAEMON=/usr/sbin/snort
+ NAME=snort
+ DESC='Network Intrusion Detection System'
+ . /lib/lsb/init-functions
++ FANCYTTY=
++ '[' -e /etc/lsb-base-logging.sh ']'
++ true
+ CONFIG=/etc/snort/snort.debian.conf
+ '[' -f /etc/snort/snort.common.parameters ']'
+ '[' -r /etc/default/snort ']'
+ test -x /usr/sbin/snort
+ test -f /etc/snort/snort.debian.conf
+ . /etc/snort/snort.debian.conf
++ DEBIAN_SNORT_STARTUP=boot
++ DEBIAN_SNORT_HOME_NET=192.168.0.0/16
++ DEBIAN_SNORT_OPTIONS=
++ DEBIAN_SNORT_INTERFACE=eth0
++ DEBIAN_SNORT_SEND_STATS=true
++ DEBIAN_SNORT_STATS_RCPT=root
++ DEBIAN_SNORT_STATS_THRESHOLD=1
+ test -z 192.168.0.0/16
+ cd /etc/snort
+ case "$1" in
+ check_root
++ id -u
+ '[' 0 '!=' 0 ']'
+ log_daemon_msg 'Starting Network Intrusion Detection System ' snort
+ '[' -z 'Starting Network Intrusion Detection System ' ']'
+ '[' -z snort ']'
+ echo -n 'Starting Network Intrusion Detection System : snort'
Starting Network Intrusion Detection System : snort+ '[' -e /etc/snort/db-pending-config ']'
+ check_log_dir
+ '[' -n '' ']'
+ return 0
+ '[' boot = dialup ']'
+ interfaces=eth0
+ test ''
+ '[' -z eth0 ']'
+ myret=0
+ got_instance=0
+ for interface in '$interfaces'
+ got_instance=1
+ log_progress_msg '(eth0'
+ '[' -z '(eth0' ']'
+ echo -n ' (eth0'
 (eth0+ '[' -x /sbin/ip ']'
+ ip link show dev eth0
+ PIDFILE=/var/run/snort_eth0.pid
+ CONFIGFILE=/etc/snort/snort.eth0.conf
+ fail='failed (check /var/log/syslog and /var/log/snort)'
+ run=yes
+ '[' -e /var/run/snort_eth0.pid ']'
+ '[' yes = yes ']'
+ '[' '!' -e /etc/snort/snort.eth0.conf ']'
+ log_progress_msg 'no /etc/snort/snort.eth0.conf found, defaulting to snort.conf'
+ '[' -z 'no /etc/snort/snort.eth0.conf found, defaulting to snort.conf' ']'
+ echo -n ' no /etc/snort/snort.eth0.conf found, defaulting to snort.conf'
 no /etc/snort/snort.eth0.conf found, defaulting to snort.conf+ CONFIGFILE=/etc/snort/snort.conf
+ set +e
+ /sbin/start-stop-daemon --start --quiet --pidfile /var/run/snort_eth0.pid --exec /usr/sbin/snort -- -c /etc/snort/snort.conf -S 'HOME_NET=[192.168.0.0/16]' -i eth0
Running in IDS mode

        --== Initializing Snort ==--
Initializing Output Plugins!
Var 'eth0_ADDRESS' defined, value len = 26 chars, value = 192.168.99.0/255.255.255.0
Var 'any_ADDRESS' defined, value len = 15 chars, value = 0.0.0.0/0.0.0.0
Var 'lo_ADDRESS' defined, value len = 19 chars, value = 127.0.0.0/255.0.0.0
Initializing Preprocessors!
Initializing Plug-ins!
Parsing Rules file /etc/snort/snort.conf

+++++++++++++++++++++++++++++++++++++++++++++++++++
Initializing rule chains...
Var 'HOME_NET' redefined
Var 'EXTERNAL_NET' defined, value len = 3 chars, value = any
Var 'DNS_SERVERS' defined, value len = 16 chars, value = [192.168.0.0/16]
Var 'SMTP_SERVERS' defined, value len = 16 chars, value = [192.168.0.0/16]
Var 'HTTP_SERVERS' defined, value len = 16 chars, value = [192.168.0.0/16]
Var 'SQL_SERVERS' defined, value len = 16 chars, value = [192.168.0.0/16]
Var 'TELNET_SERVERS' defined, value len = 16 chars, value = [192.168.0.0/16]
Var 'SNMP_SERVERS' defined, value len = 16 chars, value = [192.168.0.0/16]
Var 'HTTP_PORTS' defined, value len = 2 chars, value = 80
Var 'SHELLCODE_PORTS' defined, value len = 3 chars, value = !80
Var 'ORACLE_PORTS' defined, value len = 4 chars, value = 1521
Var 'AIM_SERVERS' defined, value len = 185 chars
   [64.12.24.0/23,64.12.28.0/23,64.12.161.0/24,64.12.163.0/24,64.12.200.0/24,205.188.3.0/24,205.188.5.0/24,205.188.7.0/24,205.188.9
   .0/24,205.188.153.0/24,205.188.179.0/24,205.188.248.0/24]
Var 'RULE_PATH' defined, value len = 16 chars, value = /etc/snort/rules
,-----------[Flow Config]----------------------
| Stats Interval:  0
| Hash Method:     2
| Memcap:          10485760
| Rows  :          4099
| Overhead Bytes:  16400(%0.16)
`----------------------------------------------
Frag3 global config:
    Max frags: 65536
    Fragment memory cap: 4194304 bytes
Frag3 engine config:
    Target-based policy: FIRST
    Fragment timeout: 60 seconds
    Fragment min_ttl:   1
    Fragment ttl_limit: 5
    Fragment Problems: 1
    Bound Addresses: 0.0.0.0/0.0.0.0
Stream5 global config:
    Track TCP sessions: ACTIVE
    Max TCP sessions: 8192
    Memcap (for reassembly packet storage): 8388608
    Track UDP sessions: INACTIVE
    Track ICMP sessions: INACTIVE
Stream5 TCP Policy config:
    Reassembly Policy: FIRST
    Timeout: 30 seconds
    Min ttl:  1
    Options:
        Static Flushpoint Sizes: YES
    Reassembly Ports:
      21 client (Footprint) 
      23 client (Footprint) 
      25 client (Footprint) 
      42 client (Footprint) 
      53 client (Footprint) 
      80 client (Footprint) 
      110 client (Footprint) 
      111 client (Footprint) 
      135 client (Footprint) 
      136 client (Footprint) 
      137 client (Footprint) 
      139 client (Footprint) 
      143 client (Footprint) 
      445 client (Footprint) 
      513 client (Footprint) 
      1433 client (Footprint) 
      1521 client (Footprint) 
      3306 client (Footprint) 
    Bound Addresses:0.0.0.0/0.0.0.0
HttpInspect Config:
    GLOBAL CONFIG
      Max Pipeline Requests:    0
      Inspection Type:          STATELESS
      Detect Proxy Usage:       NO
      IIS Unicode Map Filename: /etc/snort/unicode.map
      IIS Unicode Map Codepage: 1252
    DEFAULT SERVER CONFIG:
      Server profile: All
      Ports: 80 8080 8180 
      Flow Depth: 300
      Max Chunk Length: 500000
      Inspect Pipeline Requests: YES
      URI Discovery Strict Mode: NO
      Allow Proxy Usage: NO
      Disable Alerting: NO
      Oversize Dir Length: 500
      Only inspect URI: NO
      Ascii: YES alert: NO
      Double Decoding: YES alert: YES
      %U Encoding: YES alert: YES
      Bare Byte: YES alert: YES
      Base36: OFF
      UTF 8: OFF
      IIS Unicode: YES alert: YES
      Multiple Slash: YES alert: NO
      IIS Backslash: YES alert: NO
      Directory Traversal: YES alert: NO
      Web Root Traversal: YES alert: YES
      Apache WhiteSpace: YES alert: NO
      IIS Delimiter: YES alert: NO
      IIS Unicode Map: GLOBAL IIS UNICODE MAP CONFIG
      Non-RFC Compliant Characters: NONE
      Whitespace Characters: 0x09 0x0b 0x0c 0x0d 
rpc_decode arguments:
    Ports to decode RPC on: 111 32771 
    alert_fragments: INACTIVE
    alert_large_fragments: ACTIVE
    alert_incomplete: ACTIVE
    alert_multiple_requests: ACTIVE
Portscan Detection Config:
    Detect Protocols:  TCP UDP ICMP IP
    Detect Scan Type:  portscan portsweep decoy_portscan distributed_portscan
    Sensitivity Level: Low
    Memcap (in bytes): 10000000
    Number of Nodes:   36900

Tagged Packet Limit: 256

+-----------------------[thresholding-config]----------------------------------
| memory-cap : 1048576 bytes
+-----------------------[thresholding-global]----------------------------------
| none
+-----------------------[thresholding-local]-----------------------------------
| none
+-----------------------[suppression]------------------------------------------
| none
-------------------------------------------------------------------------------
Rule application order: activation->dynamic->pass->drop->alert->log
Log directory = /var/log/snort
Loading dynamic engine /usr/lib/snort_dynamicengine/libsf_engine.so... done
Loading all dynamic preprocessor libs from /usr/lib/snort_dynamicpreprocessor/...
  Loading dynamic preprocessor library /usr/lib/snort_dynamicpreprocessor//libsf_smtp_preproc.so... done
  Loading dynamic preprocessor library /usr/lib/snort_dynamicpreprocessor//libsf_dns_preproc.so... done
  Loading dynamic preprocessor library /usr/lib/snort_dynamicpreprocessor//libsf_dcerpc_preproc.so... done
  Loading dynamic preprocessor library /usr/lib/snort_dynamicpreprocessor//libsf_ssh_preproc.so... done
  Loading dynamic preprocessor library /usr/lib/snort_dynamicpreprocessor//libsf_ftptelnet_preproc.so... done
  Finished Loading all dynamic preprocessor libs from /usr/lib/snort_dynamicpreprocessor/
FTPTelnet Config:
    GLOBAL CONFIG
      Inspection Type: stateful
      Check for Encrypted Traffic: YES alert: YES
      Continue to check encrypted data: NO
    TELNET CONFIG:
      Ports: 23 
      Are You There Threshold: 200
      Normalize: YES
      Detect Anomalies: NO
    FTP CONFIG:
      FTP Server: default
        Ports: 21 
        Check for Telnet Cmds: YES alert: YES
        Identify open data channels: YES
      FTP Client: default
        Check for Bounce Attacks: YES alert: YES
        Check for Telnet Cmds: YES alert: YES
        Max Response Length: 256
SMTP Config:
      Ports: 25 
      Inspection Type:            STATEFUL
      Normalize Spaces:           YES
      Ignore Data:                NO
      Ignore TLS Data:            NO
      Ignore Alerts:              NO
      Max Command Length:         0
      Max Header Line Length:     0
      Max Response Line Length:   0
      X-Link2State Alert:         YES
      Drop on X-Link2State Alert: NO

DCE/RPC Decoder config:
    Autodetect ports ENABLED
    SMB fragmentation ENABLED
    DCE/RPC fragmentation ENABLED
    Max Frag Size: 3000 bytes
    Memcap: 100000 KB
    Alert if memcap exceeded DISABLED

DNS config: 
    DNS Client rdata txt Overflow Alert: ACTIVE
    Obsolete DNS RR Types Alert: INACTIVE
    Experimental DNS RR Types Alert: INACTIVE
    Ports: 53

+++++++++++++++++++++++++++++++++++++++++++++++++++
Initializing rule chains...
3382 Snort rules read
    3382 detection rules
    0 decoder rules
    0 preprocessor rules
3382 Option Chains linked into 279 Chain Headers
0 Dynamic rules
+++++++++++++++++++++++++++++++++++++++++++++++++++

Verifying Preprocessor Configurations!
Warning: flowbits key 'ms_sql_seen_dns' is checked but not ever set.
Warning: flowbits key 'smb.tree.create.llsrpc' is set but not ever checked.
Warning: flowbits key 'realplayer.playlist' is checked but not ever set.
Warning: flowbits key 'community_uri.size.1050' is set but not ever checked.
37 out of 512 flowbits in use.

Initializing Network Interface eth0
Decoding Ethernet on interface eth0
Preprocessor/Decoder Rule Count: 0
+--[Pattern Matcher:Aho-Corasick Summary]----------------------
| Alphabet Size    : 256 Chars
| Sizeof State     : 2 bytes
| Storage Format   : Full 
| Num States       : 148353
| Num Transitions  : 4107188
| State Density    : 10.8%
| Finite Automatum : DFA
| Memory           : 120.96Mbytes
+-------------------------------------------------------------
+-[AC-BNFA Search Info Summary]------------------------------
| Instances        : 2
| Patterns         : 50
| Pattern Chars    : 245
| Num States       : 203
| Num Match States : 50
| Memory           :   6.87Kbytes
|   Patterns       :   1.21K
|   Match Lists    :   1.19K
|   Transitions    :   4.30K
+-------------------------------------------------

        --== Initialization Complete ==--

   ,,_     -*> Snort! <*-
  o"  )~   Version 2.7.0 (Build 35)  
   ''''    By Martin Roesch & The Snort Team: http://www.snort.org/team.html
           (C) Copyright 1998-2007 Sourcefire Inc., et al.

           Rules Engine: SF_SNORT_DETECTION_ENGINE  Version 1.6  <Build 11>
           Preprocessor Object: SF_FTPTELNET  Version 1.0  <Build 10>
           Preprocessor Object: SF_SSH  Version 1.0  <Build 1>
           Preprocessor Object: SF_DCERPC  Version 1.0  <Build 4>
           Preprocessor Object: SF_DNS  Version 1.0  <Build 2>
           Preprocessor Object: SF_SMTP  Version 1.0  <Build 7>
Not Using PCAP_FRAMES

Attachment: signature.asc
Description: Ceci est une partie de message numériquement signée

Reply via email to