亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? readme.ftptelnet

?? This is the snapshot of Snot Latest Rules
?? FTPTELNET
字號:
FTPTelnet=========Steven Sturges <ssturges@sourcefire.com>Thanks to Dan Roelker <droelker@sourcefire.com>,Marc Norton <mnorton@sourcefire.com>, and Andy Mullican<amullican@sourcefire.com> for their help with the design.== Overview ==FTPTelnet serves two purposes, decoding and normalizing Telnet traffic,and decoding and interpreting FTP traffic.FTPTelnet handles stateful and stateless processing.  It saves statebetween individual packets.  However maintaining correct state isdependent on the reassembly of the client side of the stream (ie, aloss of coherent stream data results in a loss of state).-- Telnet -- Given a telnet data buffer, FTPTelnet will normalize the buffer withrespect to telnet commands and option negotiation, eliminating telnetcommand sequences per RFC 854.  It will also determine when atelnet connection is encrypted, per the use of the telnet encryptionoption per RFC 2946.-- FTP --Given an FTP command channel buffer, FTPTelnet will interpret the data,identifying FTP commands and parameters, as well as FTP response codesand messages.  It will enforce correctness of the parameters, determinewhen an FTP command connection is encrypted, and determine when an FTPdata channel is opened.== Configuration ==FTPTelnet has a very "rich" user configuration.  Users can configure checks for a few specific telnet exploits, and specify individual FTPservers and clients with a variety of options, which should allow the user to emulate any type of web server or client.It is VERY IMPORTANT to understand the configuration semantics, so anadministrator can know what to expect from the normalization routines andprotocol correctness checks.Within the discussions of each option, occurance of a / in the optionparameters implies that one or the other parameter must be specifiedwhen that option is used.  For example, with a yes/no option, the presenceof the option causes detection to occur when tracking state.  A yesresults in an alert being generated.-- Global Configuration --The global configuration deals with configuration options that determine the global functioning of FTPTelnet.  The following example gives the genericglobal configuration format:preprocessor ftp_telnet: global [followed by the configuration options]There can only be a single global configuration.  An error will be reportedotherwise.The global configuration options are described below:*inspection_type stateful/stateless *Indicate whether to operate in stateful stateless mode.* encrypted_traffic yes/no *Detect and alert on encrypted telnet and FTP sessions.* check_encrypted *Instructs the preprocessor to continue checking a data stream after itis encrypted, looking for an eventual decrypted data.  This is reallyonly applicable if the encrypted_traffic is used, however that is notenforced.-- Telnet configuration --The telnet configuration deals with configuration options relating tothe telnet protocol.  The following example gives the generic telnetconfiguration format:preprocessor ftp_telnet_protocol: telnet [followed by the options]There should only be a single telnet configuration, however, subsequentones simply override configuration options established prior.The telnet configuration options are described below:* ports { port [port] ... } *This specifies on what ports to check for telnet data.  Typically, this willonly include 23, however, additional ports may be specified since certainnetwork routers and other devices employ telnet as a means of administration.Because encrypted traffic (SSL) cannot be decoded, adding ports 22 (SSH) couldyield unexpected results.* normalize *This turns on normalization for the telnet connections.  Typically, it shouldbe turned on.* ayt_attack_thresh number *Detect and alert on consecutive are you there [AYT] commands beyond thethreshold number specified.  This addresses a few specific vulnerabilitiesrelating to bsd-based implementations of telnet.* detect_anomalies *In order to support certain options, Telnet supports subnegotiation. Per the Telnet RFC, subnegotiation begins with SB (subnegotiation begin) and mustend with an SE (subnegotiation end). However, certain implementations ofTelnet servers will ignore the SB without a cooresponding SE. This isanomalous behavior which could be an evasion case. Being that FTP uses theTelnet protocol on the control connection, it is also susceptible to thisbehavior. The detect_anomalies option enables alerting on Telnet SB withoutthe corresponding SE.-- FTP configuration --The FTP configuration deals with configuration options relating toFTP servers and FTP clients.  Each of these will be discussed inviduallybelow, as the configurations are different.** Server Configuration **There are two types of server configurations: default and [IP].  Thedefault configuration:  - preprocessor ftp_telnet_protocol: ftp server default [server options]This configuration supplies the default FTP server configuration for anyserver that is not individually configured.  It is suggested that youstart with the default configuration and craft individual serverconfigurations as required by the environment.For specific IP's (ie, FTP servers with known behaviour), the configurationis very similar:  - preprocessor ftp_telnet_protocol: ftp server [IP] [server options]The server options described below may be used in both the default andspecific IP configuration.* ports { port [port] ... } *This specifies on what ports to check for FTP data.  Typically, this willonly include 21, however, additional ports may be specified.* print_cmdsUseful for debugging.  This turns on printing of the configurationinformation for each ftp command listed for this server.  By defaultit is not in use, as it generates a substantial amount of output whensnort is run from the commandline.* ftp_cmds { cmd [cmd] ... } *This specifies additional FTP commands outside of those checked bydefault within the preprocessor.  The preprocessor may be configuredto generate an alert when it sees a command it does not recognize.Aside from the default commands recognized, it may be necessary toallow the use of the "X" commands, specified in RFC 775.  To do so, usethe following ftp_cmds option.  Since these are rarely used by FTPclient implementations, they are not included in the defaults.ftp_cmds { XPWD XCWD XCUP XMKD XRMD }* def_max_param_len number *This specifies the default maximum parameter length for all commandsin bytes.  If the parameter for an FTP command exceeds that length,and the preprocessor is configured to do so, an alert will be generated.This is used to check for buffer overflow exploits within FTP servers.* alt_max_param_len number { cmd [cmd] ... } *This specifies the maximum parameter length for the specified commandsin bytes, overriding the default.  If the parameter for that FTP commandexceeds that length, and the preprocessor is configured to do so, analert will be generated.  It can be used to restrict specific commands tosmall parameter values.  For example the USER command -- usernames maybe no longer than 16 bytes, so the appropriate configuration would be:alt_max_param_len 16 { USER }* chk_str_fmt { cmd [cmd] ... } *This causes the preprocessor to check for string format attacks onthe specified commands.* cmd_validity cmd < fmt > *This specifies the valid format for parameters of a given command.fmt is as follows:    int            Param must be an integer    number         Param must be an integer between 1 and 255    char _chars    Param must be a single char, and one of _chars    date _datefmt  Param follows format specified where                   # = Number, C=Char, []=optional, |=OR, {}=choice,                   anything else=literal (ie, .+- )    string         Param is string (effectively unrestricted)    host_port      Param must a host port specifier, per RFC 959.    {}, |          One of, alternate values enclosed within    []             Optional value enclosed withinExamples of the cmd_validity option are shown below.  These examplesare the default checks (per RFC 959 and others) performed by thepreprocessor.cmd_validity MODE < char SBC >cmd_validity STRU < char FRP >cmd_validity ALLO < int [ char R int ] >cmd_validity TYPE < { char AE [ char NTC ] | char I | char L [ number ] } >cmd_validity PORT < host_port >A cmd_validity line in the configuration can be used to override thesedefaults and/or add a check for other commands.  A few examples follow# This allows additional modes, including mode Z which allows for# zip-style compression.cmd_validity MODE < char ASBCZ ># Allow for a date in the MDTM command.cmd_validity MDTM < [ date nnnnnnnnnnnnnn[.n[n[n]]] ] string >MDTM is an odd case that is worth discussing...While not part of an established standard, certain FTP servers acceptMDTM commands that set the modification time on a file.  The most commonamong servers that do, accept a format using YYYYMMDDHHmmss[.uuu].  Someothers accept a format using YYYYMMDDHHmmss[+|-]TZ format.  The exampleabove is for the first case (time format as specified inhttp://www.ietf.org/internet-drafts/draft-ietf-ftpext-mlst-16.txt)To check validity for a server that uses the TZ format, use the following:cmd_validity MDTM < [ date nnnnnnnnnnnnnn[{+|-}n[n]] ] string >* telnet_cmds yes/no *Detect and alert when telnet cmds are seen on the FTP command channel.* data_chan *Causes the FTP preprocessor to force the rest of snort to ignore the FTP data channel connections.  This means that NO INSPECTIONother than state (preprocessor AND rules) will be performed on thatdata channel.  It can turned on to improve performance -- especiallywith respect to large file transfers -- by ignoring traffic.** Client Configuration **There are two types of client configurations: default and [IP].  Thedefault configuration:  - preprocessor ftp_telnet_protocol: ftp client default [client options]This configuration supplies the default FTP client configuration for anyclient that is not individually configured.  It is suggested that youstart with the default configuration and craft individual clientconfigurations as required by the environment.For specific IP's (ie, FTP clients with known behaviour), the configurationis very similar:  - preprocessor ftp_telnet_protocol: ftp client [IP] [client options]The client options described below may be used in both the default andspecific IP configuration.* max_resp_len number *This specifies the maximum length for all response messages in bytes.If the message for an FTP response (everything after the 3 digit code)exceeds that length, and the preprocessor is configured to do so, analert will be generated.  This is used to check for buffer overflowexploits within FTP clients.* bounce yes/no *Detect and alert on FTP bounce attacks.  An FTP bounce attack occurswhen the FTP PORT command is issued and the specified host does notmatch the host of the client.* bounce_to { CIDR,[port|portlow,porthi] } *When bounce is turned on, this allows the PORT command to use theIP address [CIDR format] and port (or inclusive port range ) withoutgenerating an alert.  It can be used to deal with proxied FTPconnections where the FTP data channel is different from the client.Two examples of the bounce_to command:1) This allows bounces to 192.168.1.1 port 20020 -- ie, the useof PORT 192,168,1,1,78,52.  bounce_to { 192.168.1.1,20020 }2) This allows bounces to 192.168.1.1 ports 20020 to 20040 -- ie,the use of PORT 192,168,1,1,78,xx, where xx is 52 through 72, inclusive.  bounce_to { 192.168.1.1,20020,20040 } 3) This allows bounces to 192.168.1.1 port 20020 and 192.168.1.2 port 20030  bounce_to { 192.168.1.1,20020 192.168.1.2,20030 }* telnet_cmds yes/no *Detect and alert when telnet cmds are seen on the FTP command channel.-- Default Configuration --The following gives the default configurations:# Globalpreprocessor ftp_telnet: global \  inspection_type stateless# Telnet protocolpreprocessor ftp_telnet_protocol: telnet \  ports { 23 } # Default FTP Server# The default FTP server configuration for FTP command validation.# Most of this comes from RFC 959, with additional commands being# drawn from other RFCs/Internet Drafts that are commonly in use.# # The default_max_param_len is somewhat arbitrary, but is taken# from the majority of the snort FTP rules that alert on parameter# size > 100 characters.  This was the case as of 18 Sep 2004.preprocessor ftp_telnet_protocol: ftp server default \  ports { 21 } \  def_max_param_len 100 \  ftp_cmds { USER PASS ACCT CWD CDUP SMNT \    QUIT REIN PORT PASV TYPE STRU MODE RETR STOR STOU APPE ALLO REST \    RNFR RNTO ABOR DELE RMD MKD PWD LIST NLST SITE SYST STAT HELP NOOP } \  ftp_cmds { AUTH ADAT PROT PBSZ CONF ENC } \  ftp_cmds { FEAT OPTS } \  ftp_cmds { MDTM REST SIZE MLST MLSD } \  alt_max_param_len 0 { CDUP QUIT REIN PASV STOU ABOR PWD SYST NOOP } \  cmd_validity MODE < char SBC > \  cmd_validity STRU < char FRP > \  cmd_validity ALLO < int [ char R int ] > \  cmd_validity TYPE < { char AE [ char NTC ] | char I | char L [ number ] } > \  cmd_validity PORT < host_port > # Default FTP Clientpreprocessor ftp_telnet_protocol: ftp client default \   max_resp_len 100== Writing rules =={TBD?} Writing rules for normalized telnet changes from the telnet_decodepreprocessor.The content parameter in the snort rule language searches the NORMALIZEDtelnet and FTP buffers.  This means that rules that include things thatare normalized, such as telnet option negotiation for encryption,ie |FF FA 26|, these rules will not alert.  They should be changed toadd the rawbytes parameter to specify look at the raw data, not thenormalized data.== Conclusion ==While some of this configuration information can be overwhelming, thedefaults are sufficient to get started.  Some of the examples provided,especially with respect to the FTP command validation, are derived fromtests conducted with traffic generated from various publicly availablefreeware and/or trialware telnet & FTP client and server implementations.

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
91精品免费观看| 制服.丝袜.亚洲.中文.综合| 美女一区二区三区在线观看| 亚洲成人综合视频| 午夜免费欧美电影| 亚洲一区在线看| 一级女性全黄久久生活片免费| 成人欧美一区二区三区视频网页 | 亚洲欧美激情视频在线观看一区二区三区 | 91国在线观看| 欧美中文字幕不卡| 666欧美在线视频| 精品少妇一区二区三区日产乱码| 精品对白一区国产伦| ww久久中文字幕| 国产精品国产三级国产普通话三级| 日本一区二区不卡视频| 亚洲同性同志一二三专区| 一区二区在线免费观看| 午夜精品视频一区| 韩国视频一区二区| 国产一区中文字幕| 日本黄色一区二区| 日韩一级片网站| 久久久天堂av| 亚洲综合免费观看高清完整版在线 | 有坂深雪av一区二区精品| 亚洲精品欧美激情| 日本91福利区| 97精品视频在线观看自产线路二| 色视频一区二区| 日韩写真欧美这视频| 中文字幕欧美激情| 亚洲国产美女搞黄色| 国产精品99久久久久久久vr| 色成年激情久久综合| 日韩久久久精品| 一区二区三区加勒比av| 狠狠狠色丁香婷婷综合久久五月| 91免费在线播放| 日韩欧美三级在线| 亚洲精品欧美在线| 懂色av一区二区三区蜜臀| 欧美在线视频不卡| 国产精品久久影院| 精品午夜久久福利影院| 91欧美一区二区| 国产亚洲精品aa午夜观看| 午夜久久久久久久久| 波多野洁衣一区| 精品免费99久久| 亚洲mv在线观看| 色偷偷成人一区二区三区91| 精品999久久久| 婷婷综合另类小说色区| 91日韩精品一区| 中文字幕精品一区二区三区精品| 免费看欧美女人艹b| 色婷婷综合久色| 中文字幕亚洲精品在线观看| 精品一区二区三区在线观看国产 | 成人影视亚洲图片在线| 欧美日韩国产中文| 中文字幕色av一区二区三区| 国产精品白丝av| 久久综合狠狠综合| 久久国产婷婷国产香蕉| 欧美一区二区日韩| 日韩电影免费在线观看网站| 色天天综合色天天久久| 亚洲精品成人在线| 91蝌蚪porny九色| 中文字幕一区二区在线观看| 成人精品国产免费网站| 国产亚洲美州欧州综合国 | 国产欧美一区二区精品秋霞影院 | 日韩欧美一级特黄在线播放| 亚洲成在线观看| 91麻豆精品久久久久蜜臀| 午夜欧美电影在线观看| 51久久夜色精品国产麻豆| 日韩av午夜在线观看| 日韩欧美国产电影| 国产乱子轮精品视频| 久久久久久久久久久久电影| 国产精品一区专区| 中文字幕日韩一区| 色999日韩国产欧美一区二区| 亚洲品质自拍视频| 欧美这里有精品| 日韩影院在线观看| www一区二区| 成人h动漫精品| 亚洲综合在线视频| 欧美一级视频精品观看| 久久成人羞羞网站| 成人欧美一区二区三区视频网页| 色综合久久中文综合久久97| 亚洲在线一区二区三区| 日韩视频中午一区| 波多野结衣一区二区三区| 亚洲一区二区三区美女| 欧美高清视频一二三区| 精品亚洲成a人| 中文字幕亚洲不卡| 日韩精品一区二区三区四区视频| 成人免费看片app下载| 亚洲国产成人av| 久久久久国色av免费看影院| 日本丰满少妇一区二区三区| 免费国产亚洲视频| 一区在线观看免费| 欧美一级国产精品| 97se狠狠狠综合亚洲狠狠| 日韩精品亚洲专区| 中文字幕在线观看不卡视频| 欧美另类久久久品| av亚洲精华国产精华精华 | 国产在线精品免费av| 亚洲精品第一国产综合野| 精品国免费一区二区三区| 色狠狠一区二区三区香蕉| 国产一区二区三区久久久| 亚洲精品成人在线| 国产欧美日韩一区二区三区在线观看| 欧美性极品少妇| 国产高清一区日本| 看片网站欧美日韩| 亚洲一区二区高清| 国产精品久久久久久久久免费丝袜| 91精品麻豆日日躁夜夜躁| 99国产欧美另类久久久精品| 国产一区二区视频在线| 亚洲大尺度视频在线观看| 亚洲男人天堂一区| 成人欧美一区二区三区小说| 久久蜜桃一区二区| 精品国产1区二区| 3d成人h动漫网站入口| 91久久精品一区二区二区| 丰满放荡岳乱妇91ww| 韩国女主播一区二区三区| 日韩精品一级中文字幕精品视频免费观看 | 欧美精品在线视频| 在线观看精品一区| 色域天天综合网| 成人午夜电影网站| 国产成人激情av| 国产成人鲁色资源国产91色综| 久久精品免费看| 精品亚洲porn| 国产盗摄女厕一区二区三区| 国产一区二区按摩在线观看| 久久成人精品无人区| 精品一区二区三区香蕉蜜桃 | 日韩av电影免费观看高清完整版 | 国产精品久久久久久久久免费丝袜| 久久久亚洲高清| 久久久久九九视频| 国产精品福利一区二区三区| 中文字幕一区二区三区色视频 | 91精品国产综合久久福利| 欧美色图12p| 91精品欧美综合在线观看最新| 欧美一区二区三区的| 精品少妇一区二区三区日产乱码 | 欧美日韩国产综合一区二区三区 | 粉嫩av一区二区三区在线播放 | 国产精品美女久久久久久2018| 中文字幕高清一区| 曰韩精品一区二区| 日本中文字幕不卡| 国产精品一区二区在线播放 | 日韩三级视频在线看| 久久久蜜臀国产一区二区| 欧美国产日产图区| 一区二区三区在线免费观看| 亚洲va国产va欧美va观看| 久久99久久久久| av中文一区二区三区| 精品视频免费在线| 久久这里都是精品| 亚洲免费av在线| 免费观看在线综合| 国产99精品在线观看| 欧美系列在线观看| 精品国产乱码久久久久久图片| 亚洲欧洲日韩综合一区二区| 亚洲国产成人va在线观看天堂 | 国产精品福利电影一区二区三区四区| 一区二区在线免费| 国产一区激情在线| 欧美亚洲国产bt| 国产三区在线成人av| 亚洲成人av中文| 91影院在线免费观看| 久久你懂得1024| 天堂一区二区在线免费观看| 粉嫩高潮美女一区二区三区| 欧美一区二区在线不卡|