?? readme.frag3
字號(hào):
# $Id: README.frag3,v 1.5 2006/02/22 20:54:30 ssturges Exp $-------------------------------------------------------------------------------- Frag3--------------------------------------------------------------------------------Author: Martin Roesch <roesch@sourcefire.com>Overview--------The frag3 preprocessor is a target-based IP defragmentation module for Snort.Frag3 is intended as a replacement for the frag2 defragmentation module and was designed with the following goals:1) Faster execution that frag2 with less complex data management.2) Target-based host modeling anti-evasion techniques.The frag2 preprocessor used splay trees extensively for managing the data structures associated with defragmenting packets. Splay trees are excellent data structures to use when you have some assurance of locality of referencefor the data that you are handling but in high speed, heavily fragmented environments the nature of the splay trees worked against the system and actually hindered performance. Frag3 uses the sfxhash data structure and linked lists for data handling internally which allows it to have much morepredictable and deterministic performance in any environment which should aid us in managing heavily fragmented environments.Target-based analysis is a relatively new concept in network-based intrusiondetection. The idea of a target-based system is to model the actual targetson the network instead of merely modeling the protocols and looking for attacks within them. When IP stacks are written for different operating systems, they are usually implemented by people who read the RFCs and thentheir interpretation of what the RFC outlines into code. Unfortunately, thereare ambiguities in the way that the RFCs define some of the edge conditions that may occurr and when this happens differnt people implement certain aspectsof their IP stacks differently. For an IDS this is a big problem.In an environment where the attacker can determine what style of IP defragmentation being used on a particular target, the attacker can try tofragment packets such that the target will put them back together in a specific manner while any passive systems trying to model the host traffic have to guess which way the target OS is going to handle the overlaps and retransmits. As I like to say, if the attacker has more information about thetargets on a network than the IDS does, it is possible to evade the IDS. Thisis where the idea for "target-based IDS" came from. For more detail on thisissue and how it affects IDSes, check out the famous Ptacek & Newsham paper athttp://www.snort.org/docs/idspaper/The basic idea behind target-based IDS is that we tell the IDS information about hosts on the network so that it can avoid Ptacek & Newsham style evasionattacks based on information about how an individual target IP stack operates.Vern Paxson and Umesh Shankar did a great paper on this very topic in 2003 that detailed mapping the hosts on a network and determining how their various IP stack implementations handled the types of problems seen in IP defragmentation and TCP stream reassembly. Check it out athttp://www.icir.org/vern/papers/activemap-oak03.pdfWe can also present the IDS with topology information to avoid TTL-based evasions and a variety of other issues, but that's a topic for another day. Once we have this information we can start to really change the game for these complex modeling problems.Frag3 was implemented to showcase and prototype a target-based module withinSnort to test this idea.Configuration-------------Frag3 configuration is somewhat more complex than frag2. There are at leasttwo preprocessor directives required to activate frag3, a global configurationdirective and an engine instantiation. There can be an arbitrary number ofengines defined at startup with their own configuration, but only one globalconfiguration.Global configuration - Preprocessor name: frag3_global - Available Options max_frags <number> - Maximum simultaneous fragments to track, default is 8192 memcap <bytes> - Memory cap for self preservation, default is 4MB prealloc_memcap <bytes> - alternate memory management mode, use preallocated fragment nodes based on a memory cap (faster in some situations) prealloc_frags <number> - alternate memory management mode, use preallocated fragment nodes based on a static number (faster in some situations)Engine Configuration - Preprocessor name: frag3_engine - Available Options timeout <seconds> - Timeout for fragments, fragments in the engine for longer than this period will be automatically dropped. Default is 60 seconds. ttl_limit <hops> - Max TTL delta acceptable for packets based on the first packet in the fragment. Default is 5. min_ttl <value> - Minimum acceptable TTL value for a fragment packet. Default is 1. detect_anomalies - Detect fragment anomalies bind_to <ip_list> - IP List to bind this engine to. This engine will only run for packets with destination addresses contained within the IP List. Default value is "all". policy <type> - Select a target-based defragmentation mode. Available types are first, last, bsd, bsd-right, linux, windows and solaris. Default type is bsd. The Paxson Active Mapping paper introduced the terminology frag3 is using to describe policy types. It has been extended to address differences between a true "first" policy and how Windows and Solaris platforms handle fagmented traffic. The known mappings are as follows. Anyone who develops more mappings and would like to add to this list please feel free to send us an email! Platform | Type --------------- AIX 2 | BSD AIX 4.3 8.9.3 | BSD Cisco IOS | Last FreeBSD | BSD HP JetDirect (printer) | BSD-right HP-UX B.10.20 | BSD HP-UX 11.00 | First IRIX 4.0.5F | BSD IRIX 6.2 | BSD IRIX 6.3 | BSD IRIX64 6.4 | BSD Linux 2.2.10 | linux Linux 2.2.14-5.0 | linux Linux 2.2.16-3 | linux Linux 2.2.19-6.2.10smp | linux Linux 2.4.7-10 | linux Linux 2.4.9-31SGI 1.0.2smp | linux Linux 2.4 (RedHat 7.1-7.3) | linux MacOS (version unknown) | First NCD Thin Clients | BSD OpenBSD (version unknown) | linux OpenBSD (version unknown) | linux OpenVMS 7.1 | BSD OS/2 (version unknown) | BSD OSF1 V3.0 | BSD OSF1 V3.2 | BSD OSF1 V4.0,5.0,5.1 | BSD SunOS 4.1.4 | BSD SunOS 5.5.1,5.6,5.7,5.8 | First Solaris 9, Solaris 10 | Solaris Tru64 Unix V5.0A,V5.1 | BSD Vax/VMS | BSD Windows (95/98/NT4/W2K/XP) | WindowsExample configuration (Basic)preprocessor frag3_globalpreprocessor frag3_engineExample configuration (Advanced)preprocessor frag3_global: prealloc_nodes 8192 preprocessor frag3_engine: policy linux, bind_to 192.168.1.0/24preprocessor frag3_engine: policy first, bind_to [10.1.47.0/24,172.16.8.0/24]preprocessor frag3_engine: policy last, detect_anomaliesNote in the advanced example, there are three engines specified running with linux, first and last policies assigned. The first two engines are bound tospecific IP address ranges and the last one applies to all other traffic, packets that don't fall within the address requirements of the first two enginesautomatically fall through to the third one.Alert Output------------Frag3 is capable of detecting eight different types of anomalies. Its eventoutput is packet based so it will work with all output modes of Snort. Readthe documentation in the doc/signatures directory with filenames that beginwith "123-" for information on the different event types.
?? 快捷鍵說明
復(fù)制代碼
Ctrl + C
搜索代碼
Ctrl + F
全屏模式
F11
切換主題
Ctrl + Shift + D
顯示快捷鍵
?
增大字號(hào)
Ctrl + =
減小字號(hào)
Ctrl + -