[prev in list] [next in list] [prev in thread] [next in thread] 

List:       snort-users
Subject:    Re: [Snort-users] How snort handles several copies of the same packet?
From:       Russ Combs <rcombs () sourcefire ! com>
Date:       2012-10-26 19:23:02
Message-ID: CAN8FaB8uKUu1X_+gxNaWNb6UukjPbG8F1Q2a=rReCHQ_MvAhjA () mail ! gmail ! com
[Download RAW message or body]

[Attachment #2 (multipart/alternative)]


On Fri, Oct 26, 2012 at 9:48 AM, <elof@sentor.se> wrote:

> (I'm adding snort-devel to the cc)
> 
> 
> 1)
> Perfect! That was the short and simple explaination I was looking for. :-)
> Thanks.
> 
> 
> 2)
> Do you know if it is an easy task to add a counter to count the number of
> "redundant" packets that are received by snort, but skipped due to the fact
> that they are considered duplicates and therefore redundant?
> (I.e. the packets we've been discussing in this thread.)
> 
> Like adding something simillar to this:
> 
> Packet I/O Totals:
> Received:    3716022
> Analyzed:    3716022 (100.000%)
> Dropped:     0 ( 0.000%)
> Filtered:    0 ( 0.000%)
> Outstanding: 0 ( 0.000%)
> Injected:    0
> Redundant:   1855011 ( 49.919%)
> 
> It would be very interesting to have a counter that states how many
> percent of the incoming packets is actually redundant to snort and is
> therefore discarded.
> If one has a really high Redundant count, this indicates that the SPAN
> should probably be reviewed and reconfigured to get rid of those duplicates.
> (...or if this is not possible place a smart tap in front of the sensor,
> and have the tap remove the duplicates)
> The above example value, almost 50% should indicate that half the mirrored
> traffic is mirrored twice to the destination port.
> 
> In general, that is not a trivial task and would probably be performance
prohibitive.

> 
> 3)
> Under "Stream5 statistics:", would it be hard to also add a counter for
> the amount of detected TCP Retransmissions?
> 

That can be done.

> 
> If one take the total amount of Redundant packets (see section 2 above)
> and subtract the amount of detected TCP Retransmissions, one should have an
> estimate of how much unneccessary traffic snort is actually burdened with.
> 
> 
> 4)
> Under "Stream5 statistics:" I see
> TCP Discards: 12345
> TCP Gaps:     2222
> 
> I guess that "TCP Gaps" is a counter of missing packets in the SPAN, in an
> otherwise working tcp flow.
> 

Yes, where missing means data not seen was acked.  When Snort is seeing
both directions (as it should) and nothing is being dropped, gaps should
not happen.

> 
> What are "TCP Discards"?
> 
> Stream5 can discard packets for a variety of reasons, including repeated
SYNs, bad sequence numbers or timestamps, reassembly issues.  Many of these
can be discovered by enabling Stream5 preprocessor rules.

> 
> 5)
> Given the following example counters...
> 
> Breakdown by protocol (includes rebuilt packets):
> Eth:       100000 (100%)
> TCP:       80000  (80%)
> Packet I/O Totals:
> Dropped:   1000   (1%)
> Stream5 statistics:
> TCP Gaps:  2222
> 
> Could I estimate the amount of EXTERNAL drops in the mirrored traffic by
> doing something like this? :
> 
> There are 2222 detected TCP gaps.
> 1% of all traffic is randomly dropped internally on the sensor itself.
> 1% of 80 000 tcp packets = 800.
> So roughly 800 of the 2222 tcp gaps are due to the sensor itself.
> The rest, roughly 1400 gaps, should therefore be EXTERNAL drops.
> 
> That seems reasonable.  However, note that we have an open bug on gap
counting, and I suspect many of those gap counts are bogus.

Am I thinking correctly?
> 
> /Elof
> 
> 
> 
> On Wed, 24 Oct 2012, Russ Combs wrote:
> 
> On Wed, Oct 24, 2012 at 11:35 AM, <elof@sentor.se> wrote:
> > 
> > 
> > > Open Source Snort.
> > > No global threshold.
> > > 
> > > I'm logging directly to ascii from snort and to unified2 where barnyard2
> > > then take over.
> > > In both my ascii alert log and in my postgres I only get one alert.
> > > 
> > > I think this is great! ...but I'm curious and would like to know how and
> > > where in the process this filtering/aggregation is done.
> > > 
> > > 
> > There are a couple things going on here.  Stream5 basically processes data
> > the same way a receiving host would.  For example, retransmitted or
> > duplicated data that falls to the left of the window (ie it was already
> > acknowledged) will just be discarded.
> > 
> > And Snort will not queue events that have already fired on the same
> > session
> > (or fragment).  These non-events are counted and output at shutdown as
> > Limits::Alert:
> > 
> > Limits:
> > Match:            0
> > Queue:            0
> > Log:            0
> > Event:            0
> > Alert:            0
> > 
> > Hope that helps.
> > 
> > 
> > > /Elof
> > > 
> > > 
> > > On Wed, 24 Oct 2012, Joel Esler wrote:
> > > 
> > > Are you talking about Open Source Snort?  Or Sourcefire product?
> > > > 
> > > > Do you have a global threshold in place?
> > > > 
> > > > 
> > > > On Oct 24, 2012, at 10:42 AM, elof@sentor.se wrote:
> > > > 
> > > > 
> > > > > Yes, there's an performance impact. That is expected.
> > > > > 
> > > > > But what about the alerting? Somewhere snort must be
> > > > > 
> > > > filtering/aggregating the packets, understanding that the "duplicates"
> > > are
> > > actually the same packet, and only generate ONE alert for its bad payload
> > > data.
> > > 
> > > > I'm asking for a description of this part.
> > > > > 
> > > > > How does snort detect and filter out these "duplicates"?
> > > > > Which packets are disregarded and which are kept?
> > > > > 
> > > > > Like if the packet in my example contain malicious code, will the
> > > > > 
> > > > logged packet be
> > > 
> > > > 
> > > > > routing)
> > > > > The first packet with TTL 60?
> > > > > 
> > > > > retransmission)
> > > > > The first packet with ipid 3333?
> > > > > 
> > > > > duplicate SPAN)
> > > > > Simply the first packet?
> > > > > Another question: Are true duplicates seen as retransmissions and
> > > > > 
> > > > processed as such?
> > > 
> > > > 
> > > > > 
> > > > > 
> > > > > Perhaps the answer is that the logging system simply detects that the
> > > > > 
> > > > next received, analyzed and logged packet is the same as the one just
> > > logged, and silently supresses it.
> > > 
> > > > I don't think this filtering/aggregation happen this late in the
> > > > > 
> > > > process though.
> > > 
> > > > Some clarification of how this works would be appreciated.
> > > > > 
> > > > > /Elof
> > > > > 
> > > > > 
> > > > > On Wed, 24 Oct 2012, Joel Esler wrote:
> > > > > 
> > > > > On Oct 24, 2012, at 4:48 AM, elof@sentor.se wrote:
> > > > > > 
> > > > > > > I know that snort only generates ONE alert even if the mirrored
> > > > > > > 
> > > > > > traffic
> > > 
> > > > see the same packet twice or more:
> > > > > > > 
> > > > > > > ...like before and after a router:
> > > > > > > x:x:x:x:x:x y:y:y:y:y:y 1.1.1.1:1234 -> 2.2.2.2:80 ipid 3333, TTL 60
> > > > > > > y:y:y:y:y:y z:z:z:z:z:z 1.1.1.1:1234 -> 2.2.2.2:80 ipid 3333, TTL 59
> > > > > > > ^^^^^^^^^^^^^^^^^^^^^^^                                           ^^
> > > > > > > 
> > > > > > > ...or tcp retransmissions:
> > > > > > > x:x:x:x:x:x y:y:y:y:y:y 1.1.1.1:1234 -> 2.2.2.2:80 ipid 3333, TTL 60
> > > > > > > x:x:x:x:x:x y:y:y:y:y:y 1.1.1.1:1234 -> 2.2.2.2:80 ipid 3334, TTL 60
> > > > > > > x:x:x:x:x:x y:y:y:y:y:y 1.1.1.1:1234 -> 2.2.2.2:80 ipid 3335, TTL 60
> > > > > > > ^^^^
> > > > > > > 
> > > > > > > ...or two *exact* duplicates of every packet due to faulty SPAN:
> > > > > > > x:x:x:x:x:x y:y:y:y:y:y 1.1.1.1:1234 -> 2.2.2.2:80 ipid 3333, TTL 60
> > > > > > > x:x:x:x:x:x y:y:y:y:y:y 1.1.1.1:1234 -> 2.2.2.2:80 ipid 3333, TTL 60
> > > > > > > 
> > > > > > > 
> > > > > > > Only having one alert in the above cases is really nice, but I
> > > > > > > wonder:
> > > > > > > 
> > > > > > > Can someone describe how this is done and what is happening in snort,
> > > > > > > 
> > > > > > both
> > > 
> > > > on the individual packet level, and in stream5?
> > > > > > > 
> > > > > > > How does snort detect and filter out these "duplicates"?
> > > > > > > Which packets are disregarded and which are kept?
> > > > > > > 
> > > > > > 
> > > > > > Everything is analyzed independently.  I've seen the problem commonly
> > > > > > 
> > > > > at many sites.  Filtering out the duplicate traffic on a span is
> > > important
> > > for optimum performance.
> > > 
> > > > 
> > > > > > --
> > > > > > Joel Esler
> > > > > > Senior Research Engineer, VRT
> > > > > > OpenSource Community Manager
> > > > > > Sourcefire
> > > > > > 
> > > > > 
> > > > 
> > > 
> > > ------------------------------**------------------------------**
> > > ------------------
> > > Everyone hates slow websites. So do we.
> > > Make your web apps faster with AppDynamics
> > > Download AppDynamics Lite for free today:
> > > http://p.sf.net/sfu/appdyn_**sfd2d_oct<http://p.sf.net/sfu/appdyn_sfd2d_oct>
> > > ______________________________**_________________
> > > Snort-users mailing list
> > > Snort-users@lists.sourceforge.**net <Snort-users@lists.sourceforge.net>
> > > Go to this URL to change user options or unsubscribe:
> > > https://lists.sourceforge.net/**lists/listinfo/snort-users<https://lists.sourceforge.net/lists/listinfo/snort-users>
> > >  Snort-users list archive:
> > > http://sourceforge.net/**mailarchive/forum.php?forum_**name=snort-users<http://sourceforge.net/mailarchive/forum.php?forum_name=snort-users>
> > >  
> > > Please visit http://blog.snort.org to stay current on all the latest
> > > Snort news!
> > > 
> > > 
> > 


[Attachment #5 (text/html)]

<br><br><div class="gmail_quote">On Fri, Oct 26, 2012 at 9:48 AM,  <span \
dir="ltr">&lt;<a href="mailto:elof@sentor.se" \
target="_blank">elof@sentor.se</a>&gt;</span> wrote:<br><blockquote \
class="gmail_quote" style="margin:0pt 0pt 0pt 0.8ex;border-left:1px solid \
rgb(204,204,204);padding-left:1ex"> (I&#39;m adding snort-devel to the cc)<br>
<br>
<br>
1)<br>
Perfect! That was the short and simple explaination I was looking for. :-)<br>
Thanks.<br>
<br>
<br>
2)<br>
Do you know if it is an easy task to add a counter to count the number of \
&quot;redundant&quot; packets that are received by snort, but skipped due to the fact \
that they are considered duplicates and therefore redundant?<br>

(I.e. the packets we&#39;ve been discussing in this thread.)<br>
<br>
Like adding something simillar to this:<br>
<br>
Packet I/O Totals:<br>
  Received:    3716022<br>
  Analyzed:    3716022 (100.000%)<br>
  Dropped:     0 ( 0.000%)<br>
  Filtered:    0 ( 0.000%)<br>
  Outstanding: 0 ( 0.000%)<br>
  Injected:    0<br>
  Redundant:   1855011 ( 49.919%)<br>
<br>
It would be very interesting to have a counter that states how many percent of the \
incoming packets is actually redundant to snort and is therefore discarded.<br> If \
one has a really high Redundant count, this indicates that the SPAN should probably \
be reviewed and reconfigured to get rid of those duplicates.<br> (...or if this is \
not possible place a smart tap in front of the sensor, and have the tap remove the \
duplicates)<br> The above example value, almost 50% should indicate that half the \
mirrored traffic is mirrored twice to the destination port.<br> \
<br></blockquote><div>In general, that is not a trivial task and would probably be \
performance prohibitive.<br></div><blockquote class="gmail_quote" style="margin:0pt \
0pt 0pt 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">

<br>
3)<br>
Under &quot;Stream5 statistics:&quot;, would it be hard to also add a counter for the \
amount of detected TCP Retransmissions?<br></blockquote><div><br>That can be done. \
<br></div><blockquote class="gmail_quote" style="margin:0pt 0pt 0pt \
0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">

<br>
If one take the total amount of Redundant packets (see section 2 above) and subtract \
the amount of detected TCP Retransmissions, one should have an estimate of how much \
unneccessary traffic snort is actually burdened with.<br>

<br>
<br>
4)<br>
Under &quot;Stream5 statistics:&quot; I see<br>
  TCP Discards: 12345<br>
  TCP Gaps:     2222<br>
<br>
I guess that &quot;TCP Gaps&quot; is a counter of missing packets in the SPAN, in an \
otherwise working tcp flow.<br></blockquote><div><br>Yes, where missing means data \
not seen was acked.  When Snort is seeing both directions (as it should) and nothing \
is being dropped, gaps should not happen. <br> </div><blockquote class="gmail_quote" \
style="margin:0pt 0pt 0pt 0.8ex;border-left:1px solid \
rgb(204,204,204);padding-left:1ex"> <br>
What are &quot;TCP Discards&quot;?<br>
<br></blockquote><div>Stream5 can discard packets for a variety of reasons, including \
repeated SYNs, bad sequence numbers or timestamps, reassembly issues.  Many of these \
can be discovered by enabling Stream5 preprocessor rules.<br> </div><blockquote \
class="gmail_quote" style="margin:0pt 0pt 0pt 0.8ex;border-left:1px solid \
rgb(204,204,204);padding-left:1ex"> <br>
5)<br>
Given the following example counters...<br>
<br>
Breakdown by protocol (includes rebuilt packets):<br>
  Eth:       100000 (100%)<br>
  TCP:       80000  (80%)<br>
Packet I/O Totals:<br>
  Dropped:   1000   (1%)<br>
Stream5 statistics:<br>
  TCP Gaps:  2222<br>
<br>
Could I estimate the amount of EXTERNAL drops in the mirrored traffic by doing \
something like this? :<br> <br>
There are 2222 detected TCP gaps.<br>
1% of all traffic is randomly dropped internally on the sensor itself.<br>
1% of 80 000 tcp packets = 800.<br>
So roughly 800 of the 2222 tcp gaps are due to the sensor itself.<br>
The rest, roughly 1400 gaps, should therefore be EXTERNAL drops.<br>
<br></blockquote><div>That seems reasonable.  However, note that we have an open bug \
on gap counting, and I suspect many of those gap counts are \
bogus.<br><br></div><blockquote class="gmail_quote" style="margin:0pt 0pt 0pt \
0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">

Am I thinking correctly?<br>
<br>
/Elof<div class="HOEnZb"><div class="h5"><br>
<br>
<br>
On Wed, 24 Oct 2012, Russ Combs wrote:<br>
<br>
<blockquote class="gmail_quote" style="margin:0pt 0pt 0pt 0.8ex;border-left:1px solid \
rgb(204,204,204);padding-left:1ex"> On Wed, Oct 24, 2012 at 11:35 AM, &lt;<a \
href="mailto:elof@sentor.se" target="_blank">elof@sentor.se</a>&gt; wrote:<br> <br>
<blockquote class="gmail_quote" style="margin:0pt 0pt 0pt 0.8ex;border-left:1px solid \
rgb(204,204,204);padding-left:1ex"> <br>
Open Source Snort.<br>
No global threshold.<br>
<br>
I&#39;m logging directly to ascii from snort and to unified2 where barnyard2<br>
then take over.<br>
In both my ascii alert log and in my postgres I only get one alert.<br>
<br>
I think this is great! ...but I&#39;m curious and would like to know how and<br>
where in the process this filtering/aggregation is done.<br>
<br>
</blockquote>
<br>
There are a couple things going on here.  Stream5 basically processes data<br>
the same way a receiving host would.  For example, retransmitted or<br>
duplicated data that falls to the left of the window (ie it was already<br>
acknowledged) will just be discarded.<br>
<br>
And Snort will not queue events that have already fired on the same session<br>
(or fragment).  These non-events are counted and output at shutdown as<br>
Limits::Alert:<br>
<br>
Limits:<br>
     Match:            0<br>
     Queue:            0<br>
       Log:            0<br>
     Event:            0<br>
     Alert:            0<br>
<br>
Hope that helps.<br>
<br>
<blockquote class="gmail_quote" style="margin:0pt 0pt 0pt 0.8ex;border-left:1px solid \
rgb(204,204,204);padding-left:1ex"> <br>
/Elof<br>
<br>
<br>
On Wed, 24 Oct 2012, Joel Esler wrote:<br>
<br>
<blockquote class="gmail_quote" style="margin:0pt 0pt 0pt 0.8ex;border-left:1px solid \
rgb(204,204,204);padding-left:1ex"> Are you talking about Open Source Snort?  Or \
Sourcefire product?<br> <br>
Do you have a global threshold in place?<br>
<br>
<br>
On Oct 24, 2012, at 10:42 AM, <a href="mailto:elof@sentor.se" \
target="_blank">elof@sentor.se</a> wrote:<br> <br>
<blockquote class="gmail_quote" style="margin:0pt 0pt 0pt 0.8ex;border-left:1px solid \
rgb(204,204,204);padding-left:1ex"> <br>
Yes, there&#39;s an performance impact. That is expected.<br>
<br>
But what about the alerting? Somewhere snort must be<br>
</blockquote></blockquote>
filtering/aggregating the packets, understanding that the &quot;duplicates&quot; \
are<br> actually the same packet, and only generate ONE alert for its bad payload<br>
data.<br>
<blockquote class="gmail_quote" style="margin:0pt 0pt 0pt 0.8ex;border-left:1px solid \
rgb(204,204,204);padding-left:1ex"><blockquote class="gmail_quote" style="margin:0pt \
0pt 0pt 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">

I&#39;m asking for a description of this part.<br>
<br>
How does snort detect and filter out these &quot;duplicates&quot;?<br>
Which packets are disregarded and which are kept?<br>
<br>
Like if the packet in my example contain malicious code, will the<br>
</blockquote></blockquote>
logged packet be<br>
<blockquote class="gmail_quote" style="margin:0pt 0pt 0pt 0.8ex;border-left:1px solid \
rgb(204,204,204);padding-left:1ex"><blockquote class="gmail_quote" style="margin:0pt \
0pt 0pt 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">

<br>
routing)<br>
The first packet with TTL 60?<br>
<br>
retransmission)<br>
The first packet with ipid 3333?<br>
<br>
duplicate SPAN)<br>
Simply the first packet?<br>
Another question: Are true duplicates seen as retransmissions and<br>
</blockquote></blockquote>
processed as such?<br>
<blockquote class="gmail_quote" style="margin:0pt 0pt 0pt 0.8ex;border-left:1px solid \
rgb(204,204,204);padding-left:1ex"><blockquote class="gmail_quote" style="margin:0pt \
0pt 0pt 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">

<br>
<br>
<br>
Perhaps the answer is that the logging system simply detects that the<br>
</blockquote></blockquote>
next received, analyzed and logged packet is the same as the one just<br>
logged, and silently supresses it.<br>
<blockquote class="gmail_quote" style="margin:0pt 0pt 0pt 0.8ex;border-left:1px solid \
rgb(204,204,204);padding-left:1ex"><blockquote class="gmail_quote" style="margin:0pt \
0pt 0pt 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">

I don&#39;t think this filtering/aggregation happen this late in the<br>
</blockquote></blockquote>
process though.<br>
<blockquote class="gmail_quote" style="margin:0pt 0pt 0pt 0.8ex;border-left:1px solid \
rgb(204,204,204);padding-left:1ex"><blockquote class="gmail_quote" style="margin:0pt \
0pt 0pt 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">

Some clarification of how this works would be appreciated.<br>
<br>
/Elof<br>
<br>
<br>
On Wed, 24 Oct 2012, Joel Esler wrote:<br>
<br>
<blockquote class="gmail_quote" style="margin:0pt 0pt 0pt 0.8ex;border-left:1px solid \
rgb(204,204,204);padding-left:1ex"> On Oct 24, 2012, at 4:48 AM, <a \
href="mailto:elof@sentor.se" target="_blank">elof@sentor.se</a> wrote:<br> \
<blockquote class="gmail_quote" style="margin:0pt 0pt 0pt 0.8ex;border-left:1px solid \
rgb(204,204,204);padding-left:1ex"> I know that snort only generates ONE alert even \
if the mirrored<br> </blockquote></blockquote></blockquote></blockquote>
traffic<br>
<blockquote class="gmail_quote" style="margin:0pt 0pt 0pt 0.8ex;border-left:1px solid \
rgb(204,204,204);padding-left:1ex"><blockquote class="gmail_quote" style="margin:0pt \
0pt 0pt 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex"> <blockquote \
class="gmail_quote" style="margin:0pt 0pt 0pt 0.8ex;border-left:1px solid \
rgb(204,204,204);padding-left:1ex"><blockquote class="gmail_quote" style="margin:0pt \
0pt 0pt 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">

see the same packet twice or more:<br>
<br>
...like before and after a router:<br>
x:x:x:x:x:x y:y:y:y:y:y <a href="http://1.1.1.1:1234" \
target="_blank">1.1.1.1:1234</a> -&gt; <a href="http://2.2.2.2:80" \
target="_blank">2.2.2.2:80</a> ipid 3333, TTL 60<br> y:y:y:y:y:y z:z:z:z:z:z <a \
href="http://1.1.1.1:1234" target="_blank">1.1.1.1:1234</a> -&gt; <a \
href="http://2.2.2.2:80" target="_blank">2.2.2.2:80</a> ipid 3333, TTL 59<br> \
^^^^^^^^^^^^^^^^^^^^^^^                                           ^^<br> <br>
...or tcp retransmissions:<br>
x:x:x:x:x:x y:y:y:y:y:y <a href="http://1.1.1.1:1234" \
target="_blank">1.1.1.1:1234</a> -&gt; <a href="http://2.2.2.2:80" \
target="_blank">2.2.2.2:80</a> ipid 3333, TTL 60<br> x:x:x:x:x:x y:y:y:y:y:y <a \
href="http://1.1.1.1:1234" target="_blank">1.1.1.1:1234</a> -&gt; <a \
href="http://2.2.2.2:80" target="_blank">2.2.2.2:80</a> ipid 3334, TTL 60<br> \
x:x:x:x:x:x y:y:y:y:y:y <a href="http://1.1.1.1:1234" \
target="_blank">1.1.1.1:1234</a> -&gt; <a href="http://2.2.2.2:80" \
target="_blank">2.2.2.2:80</a> ipid 3335, TTL 60<br>  ^^^^<br>
<br>
...or two *exact* duplicates of every packet due to faulty SPAN:<br>
x:x:x:x:x:x y:y:y:y:y:y <a href="http://1.1.1.1:1234" \
target="_blank">1.1.1.1:1234</a> -&gt; <a href="http://2.2.2.2:80" \
target="_blank">2.2.2.2:80</a> ipid 3333, TTL 60<br> x:x:x:x:x:x y:y:y:y:y:y <a \
href="http://1.1.1.1:1234" target="_blank">1.1.1.1:1234</a> -&gt; <a \
href="http://2.2.2.2:80" target="_blank">2.2.2.2:80</a> ipid 3333, TTL 60<br> <br>
<br>
Only having one alert in the above cases is really nice, but I wonder:<br>
<br>
Can someone describe how this is done and what is happening in snort,<br>
</blockquote></blockquote></blockquote></blockquote>
both<br>
<blockquote class="gmail_quote" style="margin:0pt 0pt 0pt 0.8ex;border-left:1px solid \
rgb(204,204,204);padding-left:1ex"><blockquote class="gmail_quote" style="margin:0pt \
0pt 0pt 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex"> <blockquote \
class="gmail_quote" style="margin:0pt 0pt 0pt 0.8ex;border-left:1px solid \
rgb(204,204,204);padding-left:1ex"><blockquote class="gmail_quote" style="margin:0pt \
0pt 0pt 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">

on the individual packet level, and in stream5?<br>
<br>
How does snort detect and filter out these &quot;duplicates&quot;?<br>
Which packets are disregarded and which are kept?<br>
</blockquote>
<br>
Everything is analyzed independently.  I&#39;ve seen the problem commonly<br>
</blockquote></blockquote></blockquote>
at many sites.  Filtering out the duplicate traffic on a span is important<br>
for optimum performance.<br>
<blockquote class="gmail_quote" style="margin:0pt 0pt 0pt 0.8ex;border-left:1px solid \
rgb(204,204,204);padding-left:1ex"><blockquote class="gmail_quote" style="margin:0pt \
0pt 0pt 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex"> <blockquote \
class="gmail_quote" style="margin:0pt 0pt 0pt 0.8ex;border-left:1px solid \
rgb(204,204,204);padding-left:1ex"> <br>
--<br>
Joel Esler<br>
Senior Research Engineer, VRT<br>
OpenSource Community Manager<br>
Sourcefire<br>
</blockquote></blockquote>
<br>
</blockquote>
<br>
<br>
------------------------------<u></u>------------------------------<u></u>------------------<br>
 Everyone hates slow websites. So do we.<br>
Make your web apps faster with AppDynamics<br>
Download AppDynamics Lite for free today:<br>
<a href="http://p.sf.net/sfu/appdyn_sfd2d_oct" \
target="_blank">http://p.sf.net/sfu/appdyn_<u></u>sfd2d_oct</a><br> \
______________________________<u></u>_________________<br> Snort-users mailing \
list<br> <a href="mailto:Snort-users@lists.sourceforge.net" \
target="_blank">Snort-users@lists.sourceforge.<u></u>net</a><br> Go to this URL to \
change user options or unsubscribe:<br> <a \
href="https://lists.sourceforge.net/lists/listinfo/snort-users" \
target="_blank">https://lists.sourceforge.net/<u></u>lists/listinfo/snort-users</a><br>
 Snort-users list archive:<br>
<a href="http://sourceforge.net/mailarchive/forum.php?forum_name=snort-users" \
target="_blank">http://sourceforge.net/<u></u>mailarchive/forum.php?forum_<u></u>name=snort-users</a><br>
 <br>
Please visit <a href="http://blog.snort.org" \
target="_blank">http://blog.snort.org</a> to stay current on all the latest<br> Snort \
news!<br> <br>
</blockquote>
<br>
</blockquote>
</div></div></blockquote></div><br>



------------------------------------------------------------------------------
WINDOWS 8 is here. 
Millions of people.  Your app in 30 days.
Visit The Windows 8 Center at Sourceforge for all your go to resources.
http://windows8center.sourceforge.net/
join-generation-app-and-make-money-coding-fast/

_______________________________________________
Snort-users mailing list
Snort-users@lists.sourceforge.net
Go to this URL to change user options or unsubscribe:
https://lists.sourceforge.net/lists/listinfo/snort-users
Snort-users list archive:
http://sourceforge.net/mailarchive/forum.php?forum_name=snort-users

Please visit http://blog.snort.org to stay current on all the latest Snort news!

[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic