<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Recent changes to bugs</title><link>https://sourceforge.net/p/snort-inline/bugs/</link><description>Recent changes to bugs</description><atom:link href="https://sourceforge.net/p/snort-inline/bugs/feed.rss" rel="self"/><language>en</language><lastBuildDate>Sat, 22 Oct 2005 21:25:19 -0000</lastBuildDate><atom:link href="https://sourceforge.net/p/snort-inline/bugs/feed.rss" rel="self" type="application/rss+xml"/><item><title>Back Orifice</title><link>https://sourceforge.net/p/snort-inline/bugs/7/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;Hi,&lt;/p&gt;
&lt;p&gt;What exactly is this Back Orifice Traffic and how to&lt;br /&gt;
detect Back Orifice traffic thru rules. If so can you&lt;br /&gt;
specify the rules to detect the same.&lt;/p&gt;
&lt;p&gt;Is it advisable to upgarade to 2.4.3 just because of&lt;br /&gt;
this Back Orifice Vulnerability alone which has fixed&lt;br /&gt;
in 2.4.3.&lt;/p&gt;
&lt;p&gt;From where I can get the differences between version&lt;br /&gt;
2.3 and 2.4.3.&lt;/p&gt;
&lt;p&gt;Rgds,&lt;br /&gt;
Surya&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Anonymous</dc:creator><pubDate>Sat, 22 Oct 2005 21:25:19 -0000</pubDate><guid>https://sourceforge.net267c045f99caff2b33e5a7726df19002062fcc2d</guid></item><item><title>no PID File</title><link>https://sourceforge.net/p/snort-inline/bugs/6/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;calling snort-inline&lt;/p&gt;
&lt;p&gt;/usr/sbin/snort -c /etc/snort/snort.conf -D -u snort -g &lt;br /&gt;
snort -d -e -o -p -A fast -m 022 -i eth0&lt;/p&gt;
&lt;p&gt;snort is running but there is no PID file in /var/run&lt;/p&gt;
&lt;p&gt;tested with 2.1.1 and 2.1.0a&lt;/p&gt;
&lt;p&gt;chris_______@hotmail.com&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Anonymous</dc:creator><pubDate>Mon, 22 Mar 2004 12:59:10 -0000</pubDate><guid>https://sourceforge.net266622ab84fa6ff5d2b521919f6d60bde7fd49e3</guid></item><item><title>After a lot of tries, a packet can pass through snort-inline</title><link>https://sourceforge.net/p/snort-inline/bugs/5/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;I have snort-inline 2.0.1 installed. I change the rule&lt;br /&gt;
2077 acction to drop.&lt;/p&gt;
&lt;p&gt;Then I try to access, using Mozilla 1.5 and IE6.0, the URL:&lt;br /&gt;
&lt;a href="http://server_name/admin/fileman/upload.php?dir=" rel="nofollow"&gt;http://server_name/admin/fileman/upload.php?dir=&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;the snort-inline log start showing lines like this:&lt;/p&gt;
&lt;p&gt;[**] [1:2077:2] WEB-PHP Mambo upload.php access [**]&lt;br /&gt;
[Classification: access to a potentially vulnerable web&lt;br /&gt;
application] [Priority: 2]&lt;br /&gt;
01/13-18:31:06.944124 200.43.81.205:1586 -&amp;gt; 10.2.0.10:80&lt;br /&gt;
TCP TTL:117 TOS:0x0 ID:3095 IpLen:20 DgmLen:578 DF&lt;br /&gt;
***AP*** Seq: 0x45A19C2C  Ack: 0x425899A4  Win: 0xFFFF&lt;br /&gt;
TcpLen: 20&lt;br /&gt;
[Xref =&amp;gt; &lt;a href="http://www.securityfocus.com/bid/6572\" rel="nofollow"&gt;http://www.securityfocus.com/bid/6572\&lt;/a&gt;]&lt;/p&gt;
&lt;p&gt;but after 5 minutes of that, the webserver get the&lt;br /&gt;
query and answed. That means that snort-inline let pass&lt;br /&gt;
through the packet that should drop.&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Federico Petronio</dc:creator><pubDate>Tue, 13 Jan 2004 21:45:44 -0000</pubDate><guid>https://sourceforge.net821a6a6eb1833c3b8b400a2588baf825aea474c9</guid></item><item><title>After a lot of tries, a packet can pass through snort-inline</title><link>https://sourceforge.net/p/snort-inline/bugs/4/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;I have snort-inline 2.0.1 installed. I change the rule&lt;br /&gt;
2077 acction to drop.&lt;/p&gt;
&lt;p&gt;Then I try to access, using Mozilla 1.5 and IE6.0, the URL:&lt;br /&gt;
&lt;a href="http://&amp;lt;server&amp;gt;/admin/fileman/upload.php?dir=" rel="nofollow"&gt;http://&amp;lt;server&amp;gt;/admin/fileman/upload.php?dir=&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;the snort-inline log start showing lines like this:&lt;/p&gt;
&lt;p&gt;[**] [1:2077:2] WEB-PHP Mambo upload.php access [**]&lt;br /&gt;
[Classification: access to a potentially vulnerable web&lt;br /&gt;
application] [Priority: 2]&lt;br /&gt;
01/13-18:31:06.944124 200.43.81.205:1586 -&amp;gt; 10.2.0.10:80&lt;br /&gt;
TCP TTL:117 TOS:0x0 ID:3095 IpLen:20 DgmLen:578 DF&lt;br /&gt;
***AP*** Seq: 0x45A19C2C  Ack: 0x425899A4  Win: 0xFFFF&lt;br /&gt;
TcpLen: 20&lt;br /&gt;
[Xref =&amp;gt; &lt;a href="http://www.securityfocus.com/bid/6572\" rel="nofollow"&gt;http://www.securityfocus.com/bid/6572\&lt;/a&gt;]&lt;/p&gt;
&lt;p&gt;but after 5 minutes of that, the webserver get the&lt;br /&gt;
query and answed. That means that snort-inline let pass&lt;br /&gt;
through the packet that should drop.&lt;/p&gt;
&lt;p&gt;mail: fpetronio@petrus.agro.uba.ar&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Anonymous</dc:creator><pubDate>Tue, 13 Jan 2004 21:39:39 -0000</pubDate><guid>https://sourceforge.neta1cd7582eb00de97981e8d1c215670fffc96bc91</guid></item><item><title>new libnet 1.1.0 suse 9.0 doesn't support snort inline calls</title><link>https://sourceforge.net/p/snort-inline/bugs/3/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;When compiling snort inline code on a SuSE 9.0 distro&lt;br /&gt;
with libnet 1.1.0 (I think) installed over RPM, I&lt;br /&gt;
received the following make messages: (after running&lt;br /&gt;
./configure ; make)&lt;/p&gt;
&lt;p&gt;inline.c: In function `InitInline':&lt;br /&gt;
inline.c:95: warning: implicit declaration of function&lt;br /&gt;
`libnet_open_raw_sock'&lt;br /&gt;
inline.c:103: error: `IP_H' undeclared (first use in&lt;br /&gt;
this function)&lt;br /&gt;
inline.c:103: error: (Each undeclared identifier is&lt;br /&gt;
reported only once&lt;br /&gt;
inline.c:103: error: for each function it appears in.)&lt;br /&gt;
inline.c:103: error: `TCP_H' undeclared (first use in&lt;br /&gt;
this function)&lt;br /&gt;
inline.c:118: warning: implicit declaration of function&lt;br /&gt;
`libnet_build_ip'&lt;br /&gt;
inline.c:118: error: `PRu16' undeclared (first use in&lt;br /&gt;
this function)&lt;br /&gt;
inline.c:122: warning: passing arg 8 of&lt;br /&gt;
`libnet_build_tcp' makes integer from pointer without a&lt;br /&gt;
cast&lt;br /&gt;
inline.c:122: error: too few arguments to function&lt;br /&gt;
`libnet_build_tcp'&lt;br /&gt;
inline.c:125: error: `ICMP_UNREACH_H' undeclared (first&lt;br /&gt;
use in this function)&lt;br /&gt;
inline.c:127: warning: implicit declaration of function&lt;br /&gt;
`libnet_build_icmp_unreach'&lt;br /&gt;
inline.c: In function `HandlePacket':&lt;br /&gt;
inline.c:214: error: `IP_H' undeclared (first use in&lt;br /&gt;
this function)&lt;br /&gt;
inline.c:214: error: `TCP_H' undeclared (first use in&lt;br /&gt;
this function)&lt;br /&gt;
inline.c:225: warning: passing arg 1 of&lt;br /&gt;
`libnet_do_checksum' from incompatible pointer type&lt;br /&gt;
inline.c:225: warning: passing arg 2 of&lt;br /&gt;
`libnet_do_checksum' makes pointer from integer without&lt;br /&gt;
a cast&lt;br /&gt;
inline.c:225: error: too few arguments to function&lt;br /&gt;
`libnet_do_checksum'&lt;br /&gt;
inline.c:226: warning: implicit declaration of function&lt;br /&gt;
`libnet_write_ip'&lt;br /&gt;
inline.c:228: warning: implicit declaration of function&lt;br /&gt;
`libnet_error'&lt;br /&gt;
inline.c:228: error: `LIBNET_ERR_CRITICAL' undeclared&lt;br /&gt;
(first use in this function)&lt;br /&gt;
inline.c:249: error: `ICMP_UNREACH_H' undeclared (first&lt;br /&gt;
use in this function)&lt;br /&gt;
inline.c:256: warning: passing arg 1 of&lt;br /&gt;
`libnet_do_checksum' from incompatible pointer type&lt;br /&gt;
inline.c:256: warning: passing arg 2 of&lt;br /&gt;
`libnet_do_checksum' makes pointer from integer without&lt;br /&gt;
a cast&lt;br /&gt;
inline.c:256: error: too few arguments to function&lt;br /&gt;
`libnet_do_checksum'&lt;/p&gt;
&lt;p&gt;Hope this helps.  By the way, installing libnet from&lt;br /&gt;
suse 8.2 (through rpm again), the source compiled fine.&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Anonymous</dc:creator><pubDate>Tue, 02 Dec 2003 17:53:48 -0000</pubDate><guid>https://sourceforge.net017519f70d13de01d7a27cbf8fe1e4cc51f8f02c</guid></item><item><title>--with-libipq-includes has no effect</title><link>https://sourceforge.net/p/snort-inline/bugs/2/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;The configure script does not allow overriding default&lt;br /&gt;
placement of libipq includes despite the presence of&lt;br /&gt;
'--with-libipq-includes'.&lt;/p&gt;
&lt;p&gt;The user specified path is correctly set prior to&lt;br /&gt;
testing for the presence of the library, but the&lt;br /&gt;
manually coded test for include files does not honor&lt;br /&gt;
this, thus alway failing the test.&lt;/p&gt;
&lt;p&gt;Please consider using the following code instead:&lt;/p&gt;
&lt;p&gt;AC_ARG_WITH(libipq_includes,&lt;br /&gt;
[  --with-libipq-includes=DIR &lt;br /&gt;
libipq include directory],&lt;/p&gt;
&lt;p&gt;[with_libipq_includes=&amp;amp;quot;$withval&amp;amp;quot;],[with_libipq_includes=no])&lt;/p&gt;
&lt;p&gt;AC_ARG_WITH(libipq_libraries,&lt;br /&gt;
[  --with-libipq-libraries=DIR &lt;br /&gt;
libipq library directory],&lt;/p&gt;
&lt;p&gt;[with_libipq_libraries=&amp;amp;quot;$withval&amp;amp;quot;],[with_libipq_libraries=no]&lt;/p&gt;
&lt;p&gt;if test &amp;amp;quot;$with_libipq_includes&amp;amp;quot; != &amp;amp;quot;no&amp;amp;quot;; then&lt;br /&gt;
CPPFLAGS=&amp;amp;quot;${CPPFLAGS}&lt;br /&gt;
-I${with_libipq_includes}&amp;amp;quot;&lt;br /&gt;
fi&lt;/p&gt;
&lt;p&gt;AC_CHECK_HEADER(libipq.h, , [AC_ERROR(libipq.h&lt;br /&gt;
not found ...)])&lt;/p&gt;
&lt;p&gt;if test &amp;amp;quot;$with_libipq_libraries&amp;amp;quot; != &amp;amp;quot;no&amp;amp;quot;; then&lt;br /&gt;
LDFLAGS=&amp;amp;quot;${LDFLAGS} &lt;br /&gt;
-L${with_libipq_libraries}&amp;amp;quot;&lt;br /&gt;
fi&lt;/p&gt;
&lt;p&gt;AC_CHECK_LIB(ipq, ipq_set_mode,, AC_ERROR(&lt;br /&gt;
Libipq library/headers not found, go get&lt;br /&gt;
it from www.netfilter.org&lt;br /&gt;
or use the --with-libipq-* options, if you&lt;br /&gt;
have it installed\
in unusual place))&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dennis Henriksen</dc:creator><pubDate>Tue, 07 Oct 2003 13:30:34 -0000</pubDate><guid>https://sourceforge.netfc09849b984f946ac2debcb0647cd0463190f47a</guid></item><item><title>configure --enable-inline disables inline support</title><link>https://sourceforge.net/p/snort-inline/bugs/1/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;The configure script in its present form, will ALWAYS&lt;br /&gt;
disable inline support in response to either&lt;br /&gt;
'--enable-inline' or '--disable-inline'.&lt;/p&gt;
&lt;p&gt;The following replacement fixes this problem:&lt;br /&gt;
------[ Begin snippet ] ------------------&lt;br /&gt;
AC_ARG_ENABLE(inline,&lt;br /&gt;
[  --disable-inline         Do not use the libipq&lt;br /&gt;
interface for inline snort],&lt;br /&gt;
[enable_inline=&amp;amp;quot;enableval&amp;amp;quot;],&lt;br /&gt;
enable_inline=&amp;amp;quot;yes&amp;amp;quot;)&lt;/p&gt;
&lt;p&gt;if test &amp;amp;quot;$enable_inline&amp;amp;quot; != &amp;amp;quot;no&amp;amp;quot;; then&lt;br /&gt;
if test &amp;amp;quot;$enable_inline&amp;amp;quot; = &amp;amp;quot;yes&amp;amp;quot;; then&lt;br /&gt;
CFLAGS=&amp;amp;quot;$CFLAGS -DGIDS&amp;amp;quot;&lt;br /&gt;
---------[ end snippet]---------------------&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dennis Henriksen</dc:creator><pubDate>Tue, 07 Oct 2003 13:23:30 -0000</pubDate><guid>https://sourceforge.net1cbfc2f6d295a01c440882f08ecee5957ef5a813</guid></item></channel></rss>