Hello List,

according to some snort/postgresql Howto, I managed to get snort remote
logging into a postgresql database. 
now I have the problem of verification, if the traffic really is SSL-traffic.


Doing the following gives some SSL Handshake data:

$ lynx https://blade
$ $ [EMAIL PROTECTED] ssldump -i lnc0
New TCP connection #1: snort.project.local(2034) <-> blade.project.local(443)
1 1  0.0130 (0.0130)  C>S SSLv2 compatible client hello 
  Version 3.1
  cipher suites
  Unknown value 0x39
  [..]

Now that looks like SSL.


After verifying that a connection is established between the two hosts
I listen for packets on the loghost.
Doing some standard (nmap)scan, snort logs data remotely:

$ tcpdump  -w trace -c3 -s0 -vvvtttX host 172.16.0.2 and port 5432
tcpdump: listening on lnc0
000000 snort.project.local.4666 > blade.project.local.postgresql: P [tcp sum 
ok] 1871798127:1871798201(74) ack 2122693707 win 58400 (DF) (ttl 61, id 58079, 
len 114)
0x0000   4500 0072 e2df 4000 3d06 3180 0a0a 0a89        [EMAIL PROTECTED]
0x0010   0a0a 0a8a 123a 1538 6f91 5f6f 7e85 bc4b        .....:.8o._o~..K
0x0020   5018 e420 bd14 0000 1703 0100 20b3 65a3        P.............e.
0x0030   203a 9ed2 6273 2140 d581 ae89 8b1e 2467        .:[EMAIL PROTECTED]
0x0040   f76f 7a3a e2a1 a1b0 5259 03a0 8817 0301        .oz:....RY......
0x0050   0020 a92c 8807 e5f3 bfa8 ea44 9c76 c98e        ...,.......D.v..
0x0060   4499 a5c5 b16b 643d 4229 cf81 34ac b2d8        D....kd=B)..4...
0x0070   a7b5                                           ..
001438 blade.project.local.postgresql > snort.project.local.4666: P [tcp sum 
ok] 1:91(90) ack 74 win 58400 (DF) (ttl 61, id 53933, len 130)
0x0000   4500 0082 d2ad 4000 3d06 41a2 0a0a 0a8a        [EMAIL PROTECTED]
0x0010   0a0a 0a89 1538 123a 7e85 bc4b 6f91 5fb9        .....8.:~..Ko._.
0x0020   5018 e420 baea 0000 1703 0100 2047 1290        P............G..
0x0030   0c29 96f8 ece4 4260 55a0 e371 96f2 82cf        .)....B`U..q....
0x0040   0fd9 39b0 e980 23c8 69a4 0979 5c17 0301        ..9...#.i..y\...
0x0050   0030 4fd4 7375 6eaa 476b fe41 e67a 24d2        .0O.sun.Gk.A.z$.
0x0060   c096 b3b9 cabb f0f5 5e1d 663d c1a6 ddbd        ........^.f=....
0x0070   7190 3255 a3b9 397d dc41 7d27 6305 1fb0        q.2U..9}.A}'c...
0x0080   a879                                           .y

[..]

But  
$ ssldump -i lnc0 -r trace port 5432 gives nothing.

I suspect this to not show a SSL Handshake, because it will only made
once (when initializing the connection between snort and the loghost-db),
but I am not sure. Is there any other way to guess if the trace is SSL
or not? Looking at it, I can't see plain text of course :)



-- 
Gruss

Stefan Kuttler (B.O.F.H.)    .ooO=Ooo.    https://www.netbeisser.de
 
GPG Fingerprint:  E7AC 1E9B 87D8 5BD2 E2F2 6F4A 3177 ED68 8185 480C
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to