Forums

Resolved
0 votes
Hi there

I'm new to ClearOS and Linux in general. I've got a server that randomly hits > 400 load and is unable to process mail flow on the random occasion (at least twice a month). This goes on until I restart the server. I've noticed from the system logs that the only thing that goes on during these peak load times is Intrusion Detection Logs processing. When I view the logs I get this:

http://i.imgur.com/GhEwF.png

http://i.imgur.com/ARlgE.png

The server IP is 10.0.0.5 and the router is 10.0.0.2.

The attack is:

http://i.imgur.com/2JetQ.png

Does anyone know why this would be happening? And possibly how to remedy it?

Am I forever doomed to restart the box?
Monday, September 17 2012, 08:19 AM
Share this post:
Responses (8)
  • Accepted Answer

    Thursday, September 27 2012, 05:36 PM - #Permalink
    Resolved
    0 votes
    You can see which rules are triggering in /var/log/secure with something like:
    grep snort /var/log/secure
    You are looking for the sid (rule) number which is the middle number in an identifier like [1:2014492:5]. In this case 2014492. This should correspond to an sid number in one of the rules.
    The reply is currently minimized Show
  • Accepted Answer

    Paul
    Paul
    Offline
    Thursday, September 27 2012, 05:24 PM - #Permalink
    Resolved
    0 votes
    There aren't that may rule sets in the free snort rules. I'd attempt to systematically eliminate them one-by-one, unless it is causing a denial of service. Once you narrow it down it will be easier to fix the problem whether is false positives, or an actual attack.
    The reply is currently minimized Show
  • Accepted Answer

    Wednesday, September 26 2012, 02:49 PM - #Permalink
    Resolved
    0 votes
    The server hit 400% load again today. Again the logs were riddled with intrusion detection report updates. I've completely disabled the intrusion detection now as a last resort.

    http://i.imgur.com/8rbtm.png

    http://i.imgur.com/tMCFa.png
    The reply is currently minimized Show
  • Accepted Answer

    Wednesday, September 19 2012, 02:52 PM - #Permalink
    Resolved
    0 votes
    Well the next few weeks will tell if it misbehaves again. Thanks for the replies, much appreciated.

    http://i.imgur.com/aw7hM.png
    The reply is currently minimized Show
  • Accepted Answer

    Paul
    Paul
    Offline
    Wednesday, September 19 2012, 02:06 PM - #Permalink
    Resolved
    0 votes
    Assuming this is actually the source of the problem, you would need to look at the DNS rule in question and see if there are any throttling or threshold variables to tweak. Before doing that I would evaluate my DNS exploit exposure potential and see if just leaving it turned off is the best approach. It is probably a waste of CPU cycles if you are not running an externally accessible DNS server. Even so, I believe this type exploit is fairly rare and higjhly target-specific in the wild anyway so, low risk.
    The reply is currently minimized Show
  • Accepted Answer

    Wednesday, September 19 2012, 06:23 AM - #Permalink
    Resolved
    0 votes
    Hi

    Thanks for your reply.

    The "top" usage is coming from the intrusion detection. I've unchecked the "DNS exploit" rule from the intrusion detection tab. I'm hoping this resolves the issue as I'm not proficient in Linux to dig any deeper, ie: through the terminal. The server shouldn't be underpowered as it usually runs as 10-30 load, at its highest when archiving mail.

    EDIT: Is there fix for Snort that can be easily applied?
    The reply is currently minimized Show
  • Accepted Answer

    Paul
    Paul
    Offline
    Tuesday, September 18 2012, 07:23 PM - #Permalink
    Resolved
    0 votes
    This appears to be Snort misinterpreting common DNS chatter. Some patterns of browser behavior spawn numerous DNS queries very quickly triggering the alarms.
    The reply is currently minimized Show
  • Accepted Answer

    Monday, September 17 2012, 11:55 AM - #Permalink
    Resolved
    0 votes
    Don't worry about the server attacking itself. Really it is the report which is not clever enough. The IDS sometimed monitors replies and picks up on those to work out if it is being attacked. As an example of this it will look for failed login attempts on various services. The failure is detected by the reply from the server to the attacker. Unfortunately the report interprets the "from" as the attacker rather than then look up the triggered rule to see if it should be using the "from" or the "to" field as the attacker.

    It could be that your server is under-powerwed for what you are doing. The other thing is have you enabled all the rule files? If you have there is is little point in enabling rule files for services you are not running or exposing to the internet. This could reduce the maount of processing which needs to be done by the server.

    When wou are getting these high loads are you able to look at the "top" command to see what is using all the resources?
    The reply is currently minimized Show
Your Reply