Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Incorrect modifications for Suricata Rules. #307

Open
carlopmart opened this issue Apr 6, 2018 · 1 comment
Open

Incorrect modifications for Suricata Rules. #307

carlopmart opened this issue Apr 6, 2018 · 1 comment
Labels
bug Known bug in the code. Enhancement

Comments

@carlopmart
Copy link

Using pulledpork 0.7.3 under FreeBSD 11.1 amd64 and using a simple config:

rule_url=http://rules.emergingthreats.net/open/suricata|emerging.rules.tar.gz|open-nogpl
ignore=deleted.rules,experimental.rules,local.rules
temp_path=/tmp
rule_path=/tmp/suricata.rules
sid_msg=/tmp/sid-msg.map
sid_msg_version=1
sid_changelog=/tmp/sid_changes.log
version=0.7.3

Pulledpork makes incorrect modifications for ET rules to use them with Suricata IDS. An example with rule 2011410:

Original 2011410 rule:
alert dns $HOME_NET any -> any any (msg:"ET DNS DNS Query for Suspicious .cz.cc Domain"; dns_query; content:".cz.cc"; isdataat:!1,relative; nocase;reference:url,sign.kaffenews.com/?p=104; classtype:bad-unknown; sid:2011410; rev:4; metadata:created_at 2010_09_27, updated_at 2010_09_27;)

Pulledpork's output:
alert udp $HOME_NET any -> $EXTERNAL_NET 53 (msg:"ET DNS DNS Query for Suspicious .cz.cc Domain"; content:"|01 00 00 01 00 00 00 00 00 00|"; depth:10; offset:2;content:"|02|cz|02|cc|00|"; fast_pattern; nocase; distance:0; reference:url,sign.kaffenews.com/?p=104; classtype:bad-unknown; sid:2011410; rev:3; metadata:created_at 2010_09_27,updated_at 2010_09_27;).

This behavior is identical when using the snort_version option and when not.

@shirkdog shirkdog added bug Known bug in the code. Enhancement labels Aug 27, 2020
@shirkdog
Copy link
Owner

This is more of an enhancement, but is also a bug. This is due to the use in Suricata of layer7 protocol specific signatures. The script should not care, but detection for "suricata" would need to be added to keep the layer7 data only if it is Suricata.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
bug Known bug in the code. Enhancement
Projects
None yet
Development

No branches or pull requests

2 participants