doc: initial xbits documentation

pull/2467/head
Victor Julien 8 years ago
parent cb08f02140
commit bc38cd5932

@ -11,6 +11,7 @@ Suricata Rules
http-keywords
flow-keywords
flowint
xbits
file-keywords
thresholding
dns-keywords

@ -0,0 +1,48 @@
Xbits
=====
Set, unset, toggle and check for bits stored per host or ip_pair.
Syntax::
xbits:noalert;
xbits:<set|unset|isset|toggle>,<name>,track <ip_src|ip_dst|ip_pair>;
xbits:<set|unset|isset|toggle>,<name>,track <ip_src|ip_dst|ip_pair> \
[,expire <seconds>];
xbits:<set|unset|isset|toggle>,<name>,track <ip_src|ip_dst|ip_pair> \
[,expire <seconds>];
YAML settings
-------------
Bits that are stored per host are stored in the Host table.
Bits that are stored per IP pair are stored in the IPPair table.
Threading
---------
Due to subtle timing issues between threads the order of sets and checks
can be slightly unpredictible.
Example: create a SSH blacklist
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Below is an example of rules incoming to a SSH server.
The first 2 rules match on a SSH software version often used in bots.
They drop the traffic and create an 'xbit' 'badssh' for the source ip.
It expires in an hour::
drop ssh any any -> $MYSERVER 22 (msg:"DROP libssh incoming"; \
flow:to_server,established; ssh.softwareversion:"libssh"; \
xbits:set, badssh, track ip_src, expire 3600; sid:4000000005;)
drop ssh any any -> $MYSERVER 22 (msg:"DROP PUTTY incoming"; \
flow:to_server,established; ssh.softwareversion:"PUTTY"; \
xbits:set, badssh, track ip_src, expire 3600; sid:4000000007;)
Then the following rule simply drops any incoming traffic to that server
that is on that 'badssh' list::
drop ssh any any -> $MYSERVER 22 (msg:"DROP BLACKLISTED"; \
xbits:isset, badssh, track ip_src; sid:4000000006;)
Loading…
Cancel
Save