Re: [newbie] configuration of Snort IDS

2002-10-03 Thread David Johnson

Get a copy of NMAP and start scanning devices on your network to see if the 
Snort box catches it.  If not, you'll need to go over your config settings 
with a fine-tooth comb.  You'll usually find that a type in the network 
address or something is easy to do.

The DNS variable is for you to put in the address(es) of you DNS machine(s).  
Thie will cause Snort to ignore certain DNS rules that would otherwise cause 
false alarms.

Snort rule updates can be found at snort.org in the downloads section.

On Sunday 22 September 2002 10:21 pm, Vandenbore Sebastiaan wrote:
 On Friday 20 September 2002 20:25, you wrote:

 Ok, i've done that, and now the output is gone, I mean all output. Nothing
 is being logged by snort anymore, or nothing special has happend these last
 days.

   What about the DNS variabele ? What should be put there ?
   Where can I find updates of the snort rules ?

 I've combined Snort with Bastille Firewall, Hostsentry, Portsentry and
 Logcheck ( To get a mail notification every day ). Have you got any ideas
 to secure the machine even more ? Is it a good combination ?



Want to buy your Pack or Services from MandrakeSoft? 
Go to http://www.mandrakestore.com



[newbie] configuration of Snort IDS

2002-09-20 Thread Vandenbore Sebastiaan

I have snort running on my system, but it logs some stuff that I don't need.
Can I set it up in any way that it doesn't log the connections from my 
computer to the proxies I'm using ( 213.224.83.x ) ?



Want to buy your Pack or Services from MandrakeSoft? 
Go to http://www.mandrakestore.com



Re: [newbie] configuration of Snort IDS

2002-09-20 Thread Chris Slater-Walker


On Fri, 20 Sep 2002, Vandenbore Sebastiaan wrote:

 I have snort running on my system, but it logs some stuff that I don't need.
 Can I set it up in any way that it doesn't log the connections from my
 computer to the proxies I'm using ( 213.224.83.x ) ?



I'm a newcomer to Snort myself, so the following may be partially or
totally incorrect, but you might like to try it:

in the /etc/snort.conf file (check the location of that file!), there
should be an item that looks like:

$MY_NET=any

This Snort variable tells Snort which networks are internal. So, for
example, if you want to tell Snort that all of the 213.224.83.x network is
an internal network, you put this in snort.conf:

$MY_NET=213.224.83.0/24

You can also include other networks in your definition, e.g.:

$MY_NET=[213.224.83.0/24,192.168.0.0/24]


Now many of the Snort rules use the $EXTERNAL_NET and $MY_NET variables to
determine whether there is a potential attack, so if Snort knows which
networks are internal then it won't report traffic from those networks as
an attack.

You _might_ also need to change the $EXTERNAL_NET variable to _exclude_
the networks you have defined for $MY_NET, e.g.:

$EXTERNAL_NET=![213.224.83.0/24,192.168.0.0/24]

Like I said, this is all I can tell you with my limited experience. If
anyone out there knows better, please let us both know!

Regards

Chris Slater-Walker





Want to buy your Pack or Services from MandrakeSoft? 
Go to http://www.mandrakestore.com



Re: [newbie] configuration of Snort IDS

2002-09-20 Thread David Johnson

Chris,

Your advice is largely accurate, but an easier way to set the $EXTERNAL_NET 
variable would be to set it equal to !$MY_NET.  Keeps the code a little 
neater.

You definately want to set $EXTERNAL_Net to be equal to !$MY_NET to resuce 
false positives internally.

On Friday 20 September 2002 06:01 am, Chris Slater-Walker wrote:
 On Fri, 20 Sep 2002, Vandenbore Sebastiaan wrote:
  I have snort running on my system, but it logs some stuff that I don't
  need. Can I set it up in any way that it doesn't log the connections from
  my computer to the proxies I'm using ( 213.224.83.x ) ?

 I'm a newcomer to Snort myself, so the following may be partially or
 totally incorrect, but you might like to try it:

 in the /etc/snort.conf file (check the location of that file!), there
 should be an item that looks like:

 $MY_NET=any

 This Snort variable tells Snort which networks are internal. So, for
 example, if you want to tell Snort that all of the 213.224.83.x network is
 an internal network, you put this in snort.conf:

 $MY_NET=213.224.83.0/24

 You can also include other networks in your definition, e.g.:

 $MY_NET=[213.224.83.0/24,192.168.0.0/24]


 Now many of the Snort rules use the $EXTERNAL_NET and $MY_NET variables to
 determine whether there is a potential attack, so if Snort knows which
 networks are internal then it won't report traffic from those networks as
 an attack.

 You _might_ also need to change the $EXTERNAL_NET variable to _exclude_
 the networks you have defined for $MY_NET, e.g.:

 $EXTERNAL_NET=![213.224.83.0/24,192.168.0.0/24]

 Like I said, this is all I can tell you with my limited experience. If
 anyone out there knows better, please let us both know!

 Regards

 Chris Slater-Walker



Want to buy your Pack or Services from MandrakeSoft? 
Go to http://www.mandrakestore.com