(gdb) r
The program being debugged has been started already.
Start it from the beginning? (y or n) y
Starting program: /usr/bin/snort -c /etc/snort/snort.conf -r /home/zengxiaosen/Desktop/tracesGongji_10.pcap
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
Running in IDS mode
--== Initializing Snort ==--
Initializing Output Plugins!
Initializing Preprocessors!
Initializing Plug-ins!
Parsing Rules file "/etc/snort/snort.conf"
PortVar 'HTTP_PORTS' defined : [ 80:81 311 383 591 593 901 1220 1414 1741 1830 2301 2381 2809 3037 3128 3702 4343 4848 5250 6988 7000:7001 7144:7145 7510 7777 7779 8000 8008 8014 8028 8080 8085 8088 8090 8118 8123 8180:8181 8243 8280 8300 8800 8888 8899 9000 9060 9080 9090:9091 9443 9999 11371 34443:34444 41080 50002 55555 ]
PortVar 'SHELLCODE_PORTS' defined : [ 0:79 81:65535 ]
PortVar 'ORACLE_PORTS' defined : [ 1024:65535 ]
PortVar 'SSH_PORTS' defined : [ 22 ]
PortVar 'FTP_PORTS' defined : [ 21 2100 3535 ]
PortVar 'SIP_PORTS' defined : [ 5060:5061 5600 ]
PortVar 'FILE_DATA_PORTS' defined : [ 80:81 110 143 311 383 591 593 901 1220 1414 1741 1830 2301 2381 2809 3037 3128 3702 4343 4848 5250 6988 7000:7001 7144:7145 7510 7777 7779 8000 8008 8014 8028 8080 8085 8088 8090 8118 8123 8180:8181 8243 8280 8300 8800 8888 8899 9000 9060 9080 9090:9091 9443 9999 11371 34443:34444 41080 50002 55555 ]
PortVar 'GTP_PORTS' defined : [ 2123 2152 3386 ]
Detection:
Search-Method = AC-Full-Q
Split Any/Any group = enabled
Search-Method-Optimizations = enabled
Maximum pattern length = 20
Tagged Packet Limit: 256
Loading dynamic engine /usr/local/lib/snort_dynamicengine/libsf_engine.so... done
Loading all dynamic detection libs from /usr/local/lib/snort_dynamicrules...
WARNING: No dynamic libraries found in directory /usr/local/lib/snort_dynamicrules.
Finished Loading all dynamic detection libs from /usr/local/lib/snort_dynamicrules
Loading all dynamic preprocessor libs from /usr/local/lib/snort_dynamicpreprocessor/...
Loading dynamic preprocessor library /usr/local/lib/snort_dynamicpreprocessor//libsf_ssl_preproc.so... done
Loading dynamic preprocessor library /usr/local/lib/snort_dynamicpreprocessor//libsf_pop_preproc.so... done
Loading dynamic preprocessor library /usr/local/lib/snort_dynamicpreprocessor//libsf_ftptelnet_preproc.so... done
Loading dynamic preprocessor library /usr/local/lib/snort_dynamicpreprocessor//libsf_ssh_preproc.so... done
Loading dynamic preprocessor library /usr/local/lib/snort_dynamicpreprocessor//libsf_reputation_preproc.so... done
Loading dynamic preprocessor library /usr/local/lib/snort_dynamicpreprocessor//libsf_dnp3_preproc.so... done
Loading dynamic preprocessor library /usr/local/lib/snort_dynamicpreprocessor//libsf_gtp_preproc.so... done
Loading dynamic preprocessor library /usr/local/lib/snort_dynamicpreprocessor//libsf_sdf_preproc.so... done
Loading dynamic preprocessor library /usr/local/lib/snort_dynamicpreprocessor//libsf_dce2_preproc.so... done
Loading dynamic preprocessor library /usr/local/lib/snort_dynamicpreprocessor//libsf_dns_preproc.so... done
Loading dynamic preprocessor library /usr/local/lib/snort_dynamicpreprocessor//libsf_smtp_preproc.so... done
Loading dynamic preprocessor library /usr/local/lib/snort_dynamicpreprocessor//libsf_sip_preproc.so... done
Loading dynamic preprocessor library /usr/local/lib/snort_dynamicpreprocessor//libsf_imap_preproc.so... done
Loading dynamic preprocessor library /usr/local/lib/snort_dynamicpreprocessor//libsf_modbus_preproc.so... done
Finished Loading all dynamic preprocessor libs from /usr/local/lib/snort_dynamicpreprocessor/
Log directory = /var/log/snort
WARNING: ip4 normalizations disabled because not inline.
WARNING: tcp normalizations disabled because not inline.
WARNING: icmp4 normalizations disabled because not inline.
WARNING: ip6 normalizations disabled because not inline.
WARNING: icmp6 normalizations disabled because not inline.
Frag3 global config:
Max frags: 65536
Fragment memory cap: 4194304 bytes
Frag3 engine config:
Bound Address: default
Target-based policy: WINDOWS
Fragment timeout: 180 seconds
Fragment min_ttl: 1
Fragment Anomalies: Alert
Overlap Limit: 10
Min fragment Length: 100
Max Expected Streams: 768
Stream global config:
Track TCP sessions: ACTIVE
Max TCP sessions: 262144
TCP cache pruning timeout: 30 seconds
TCP cache nominal timeout: 3600 seconds
Memcap (for reassembly packet storage): 8388608
Track UDP sessions: ACTIVE
Max UDP sessions: 131072
UDP cache pruning timeout: 30 seconds
UDP cache nominal timeout: 180 seconds
Track ICMP sessions: INACTIVE
Track IP sessions: INACTIVE
Log info if session memory consumption exceeds 1048576
Send up to 2 active responses
Wait at least 5 seconds between responses
Protocol Aware Flushing: ACTIVE
Maximum Flush Point: 16000
Stream TCP Policy config:
Bound Address: default
Reassembly Policy: WINDOWS
Timeout: 180 seconds
Limit on TCP Overlaps: 10
Maximum number of bytes to queue per session: 1048576
Maximum number of segs to queue per session: 2621
Options:
Require 3-Way Handshake: YES
3-Way Handshake Timeout: 180
Detect Anomalies: YES
Reassembly Ports:
21 client (Footprint)
22 client (Footprint)
23 client (Footprint)
25 client (Footprint)
42 client (Footprint)
53 client (Footprint)
79 client (Footprint)
80 client (Footprint) server (Footprint)
81 client (Footprint) server (Footprint)
109 client (Footprint)
110 client (Footprint)
111 client (Footprint)
113 client (Footprint)
119 client (Footprint)
135 client (Footprint)
136 client (Footprint)
137 client (Footprint)
139 client (Footprint)
143 client (Footprint)
161 client (Footprint)
additional ports configured but not printed.
Stream UDP Policy config:
Timeout: 180 seconds
HttpInspect Config:
GLOBAL CONFIG
Detect Proxy Usage: NO
IIS Unicode Map Filename: /etc/snort/unicode.map
IIS Unicode Map Codepage: 1252
Memcap used for logging URI and Hostname: 150994944
Max Gzip Memory: 838860
Max Gzip Sessions: 1613
Gzip Compress Depth: 65535
Gzip Decompress Depth: 65535
DEFAULT SERVER CONFIG:
Server profile: All
Ports (PAF): 80 81 311 383 591 593 901 1220 1414 1741 1830 2301 2381 2809 3037 3128 3702 4343 4848 5250 6988 7000 7001 7144 7145 7510 7777 7779 8000 8008 8014 8028 8080 8085 8088 8090 8118 8123 8180 8181 8243 8280 8300 8800 8888 8899 9000 9060 9080 9090 9091 9443 9999 11371 34443 34444 41080 50002 55555
Server Flow Depth: 0
Client Flow Depth: 0
Max Chunk Length: 500000
Small Chunk Length Evasion: chunk size <= 10, threshold >= 5 times
Max Header Field Length: 750
Max Number Header Fields: 100
Max Number of WhiteSpaces allowed with header folding: 200
Inspect Pipeline Requests: YES
URI Discovery Strict Mode: NO
Allow Proxy Usage: NO
Disable Alerting: NO
Oversize Dir Length: 500
Only inspect URI: NO
Normalize HTTP Headers: NO
Inspect HTTP Cookies: YES
Inspect HTTP Responses: YES
Extract Gzip from responses: YES
Decompress response files:
Unlimited decompression of gzip data from responses: YES
Normalize Javascripts in HTTP Responses: YES
Max Number of WhiteSpaces allowed with Javascript Obfuscation in HTTP responses: 200
Normalize HTTP Cookies: NO
Enable XFF and True Client IP: NO
Log HTTP URI data: NO
Log HTTP Hostname data: NO
Extended ASCII code support in URI: NO
Ascii: YES alert: NO
Double Decoding: YES alert: NO
%U Encoding: YES alert: YES
Bare Byte: YES alert: NO
UTF 8: YES alert: NO
IIS Unicode: YES alert: NO
Multiple Slash: YES alert: NO
IIS Backslash: YES alert: NO
Directory Traversal: YES alert: NO
Web Root Traversal: YES alert: NO
Apache WhiteSpace: YES alert: NO
IIS Delimiter: YES alert: NO
IIS Unicode Map: GLOBAL IIS UNICODE MAP CONFIG
Non-RFC Compliant Characters: 0x00 0x01 0x02 0x03 0x04 0x05 0x06 0x07
Whitespace Characters: 0x09 0x0b 0x0c 0x0d
rpc_decode arguments:
Ports to decode RPC on: 111 32770 32771 32772 32773 32774 32775 32776 32777 32778 32779
alert_fragments: INACTIVE
alert_large_fragments: INACTIVE
alert_incomplete: INACTIVE
alert_multiple_requests: INACTIVE
FTPTelnet Config:
GLOBAL CONFIG
Inspection Type: stateful
Check for Encrypted Traffic: YES alert: NO
Continue to check encrypted data: YES
TELNET CONFIG:
Ports: 23
Are You There Threshold: 20
Normalize: YES
Detect Anomalies: YES
FTP CONFIG:
FTP Server: default
Ports (PAF): 21 2100 3535
Check for Telnet Cmds: YES alert: YES
Ignore Telnet Cmd Operations: YES alert: YES
Ignore open data channels: NO
FTP Client: default
Check for Bounce Attacks: YES alert: YES
Check for Telnet Cmds: YES alert: YES
Ignore Telnet Cmd Operations: YES alert: YES
Max Response Length: 256
SMTP Config:
Ports: 25 465 587 691
Inspection Type: Stateful
Normalize: ATRN AUTH BDAT DATA DEBUG EHLO EMAL ESAM ESND ESOM ETRN EVFY EXPN HELO HELP IDENT MAIL NOOP ONEX QUEU QUIT RCPT RSET SAML SEND STARTTLS SOML TICK TIME TURN TURNME VERB VRFY X-EXPS XADR XAUTH XCIR XEXCH50 XGEN XLICENSE X-LINK2STATE XQUE XSTA XTRN XUSR CHUNKING X-ADAT X-DRCP X-ERCP X-EXCH50
Ignore Data: No
Ignore TLS Data: No
Ignore SMTP Alerts: No
Max Command Line Length: 512
Max auth Command Line Length: 1000
Max Specific Command Line Length:
ATRN:255 AUTH:246 BDAT:255 DATA:246 DEBUG:255
EHLO:500 EMAL:255 ESAM:255 ESND:255 ESOM:255
ETRN:246 EVFY:255 EXPN:255 HELO:500 HELP:500
IDENT:255 MAIL:260 NOOP:255 ONEX:246 QUEU:246
QUIT:246 RCPT:300 RSET:246 SAML:246 SEND:246
SIZE:255 STARTTLS:246 SOML:246 TICK:246 TIME:246
TURN:246 TURNME:246 VERB:246 VRFY:255 X-EXPS:246
XADR:246 XAUTH:246 XCIR:246 XEXCH50:246 XGEN:246
XLICENSE:246 X-LINK2STATE:246 XQUE:246 XSTA:246 XTRN:246
XUSR:246
Max Header Line Length: 1000
Max Response Line Length: 512
X-Link2State Alert: Yes
Drop on X-Link2State Alert: No
Alert on commands: None
Alert on unknown commands: No
SMTP Memcap: 838860
MIME Max Mem: 838860
Base64 Decoding: Enabled
Base64 Decoding Depth: Unlimited
Quoted-Printable Decoding: Enabled
Quoted-Printable Decoding Depth: Unlimited
Unix-to-Unix Decoding: Enabled
Unix-to-Unix Decoding Depth: Unlimited
Non-Encoded MIME attachment Extraction: Enabled
Non-Encoded MIME attachment Extraction Depth: Unlimited
Log Attachment filename: Enabled
Log MAIL FROM Address: Enabled
Log RCPT TO Addresses: Enabled
Log Email Headers: Enabled
Email Hdrs Log Depth: 1464
SSH config:
Autodetection: ENABLED
Challenge-Response Overflow Alert: ENABLED
SSH1 CRC32 Alert: ENABLED
Server Version String Overflow Alert: ENABLED
Protocol Mismatch Alert: ENABLED
Bad Message Direction Alert: DISABLED
Bad Payload Size Alert: DISABLED
Unrecognized Version Alert: DISABLED
Max Encrypted Packets: 20
Max Server Version String Length: 100
MaxClientBytes: 19600 (Default)
Ports:
22
DCE/RPC 2 Preprocessor Configuration
Global Configuration
DCE/RPC Defragmentation: Enabled
Memcap: 102400 KB
Events: co
SMB Fingerprint policy: Disabled
Server Default Configuration
Policy: WinXP
Detect ports (PAF)
SMB: 139 445
TCP: 135
UDP: 135
RPC over HTTP server: 593
RPC over HTTP proxy: None
Autodetect ports (PAF)
SMB: None
TCP: 1025-65535
UDP: 1025-65535
RPC over HTTP server: 1025-65535
RPC over HTTP proxy: None
Invalid SMB shares: C$ D$ ADMIN$
Maximum SMB command chaining: 3 commands
SMB file inspection: Disabled
DNS config:
DNS Client rdata txt Overflow Alert: ACTIVE
Obsolete DNS RR Types Alert: INACTIVE
Experimental DNS RR Types Alert: INACTIVE
Ports: 53
SSLPP config:
Encrypted packets: not inspected
Ports:
443 465 563 636 989
992 993 994 995 7801
7802 7900 7901 7902 7903
7904 7905 7906 7907 7908
7909 7910 7911 7912 7913
7914 7915 7916 7917 7918
7919 7920
Server side data is trusted
Maximum SSL Heartbeat length: 0
Sensitive Data preprocessor config:
Global Alert Threshold: 25
Masked Output: DISABLED
SIP config:
Max number of sessions: 40000
Max number of dialogs in a session: 4 (Default)
Status: ENABLED
Ignore media channel: DISABLED
Max URI length: 512
Max Call ID length: 80
Max Request name length: 20 (Default)
Max From length: 256 (Default)
Max To length: 256 (Default)
Max Via length: 1024 (Default)
Max Contact length: 512
Max Content length: 2048
Ports:
5060 5061 5600
Methods:
invite cancel ack bye register options refer subscribe update join info message notify benotify do qauth sprack publish service unsubscribe prack
IMAP Config:
Ports: 143
IMAP Memcap: 838860
MIME Max Mem: 838860
Base64 Decoding: Enabled
Base64 Decoding Depth: Unlimited
Quoted-Printable Decoding: Enabled
Quoted-Printable Decoding Depth: Unlimited
Unix-to-Unix Decoding: Enabled
Unix-to-Unix Decoding Depth: Unlimited
Non-Encoded MIME attachment Extraction: Enabled
Non-Encoded MIME attachment Extraction Depth: Unlimited
POP Config:
Ports: 110
POP Memcap: 838860
MIME Max Mem: 838860
Base64 Decoding: Enabled
Base64 Decoding Depth: Unlimited
Quoted-Printable Decoding: Enabled
Quoted-Printable Decoding Depth: Unlimited
Unix-to-Unix Decoding: Enabled
Unix-to-Unix Decoding Depth: Unlimited
Non-Encoded MIME attachment Extraction: Enabled
Non-Encoded MIME attachment Extraction Depth: Unlimited
Modbus config:
Ports:
502
DNP3 config:
Memcap: 262144
Check Link-Layer CRCs: ENABLED
Ports:
20000
Reputation config:
WARNING: Can't find any whitelist/blacklist entries. Reputation Preprocessor disabled.
+++++++++++++++++++++++++++++++++++++++++++++++++++
Initializing rule chains...
3 Snort rules read
3 detection rules
0 decoder rules
0 preprocessor rules
3 Option Chains linked into 3 Chain Headers
0 Dynamic rules
+++++++++++++++++++++++++++++++++++++++++++++++++++
+-------------------[Rule Port Counts]---------------------------------------
| tcp udp icmp ip
| src 1 0 0 0
| dst 1 0 0 0
| any 0 0 1 0
| nc 0 0 1 0
| s+d 0 0 0 0
+----------------------------------------------------------------------------
+-----------------------[detection-filter-config]------------------------------
| memory-cap : 1048576 bytes
+-----------------------[detection-filter-rules]-------------------------------
| none
-------------------------------------------------------------------------------
+-----------------------[rate-filter-config]-----------------------------------
| memory-cap : 1048576 bytes
+-----------------------[rate-filter-rules]------------------------------------
| none
-------------------------------------------------------------------------------
+-----------------------[event-filter-config]----------------------------------
| memory-cap : 1048576 bytes
+-----------------------[event-filter-global]----------------------------------
+-----------------------[event-filter-local]-----------------------------------
| none
+-----------------------[suppression]------------------------------------------
| none
-------------------------------------------------------------------------------
Rule application order: activation->dynamic->pass->drop->sdrop->reject->alert->log
Verifying Preprocessor Configurations!
WARNING: flowbits key 'file.htc' is checked but not ever set.
1 out of 1024 flowbits in use.
[ Port Based Pattern Matching Memory ]
+- [ Aho-Corasick Summary ] -------------------------------------
| Storage Format : Full-Q
| Finite Automaton : DFA
| Alphabet Size : 256 Chars
| Sizeof State : Variable (1,2,4 bytes)
| Instances : 2
| 1 byte states : 2
| 2 byte states : 0
| 4 byte states : 0
| Characters : 32
| States : 34
| Transitions : 64
| State Density : 0.7%
| Patterns : 2
| Match States : 2
| Memory (KB) : 20.49
| Pattern : 0.22
| Match Lists : 0.42
| DFA
| 1 byte states : 8.83
| 2 byte states : 0.00
| 4 byte states : 0.00
+----------------------------------------------------------------
[ Number of patterns truncated to 20 bytes: 0 ]
pcap DAQ configured to read-file.
Acquiring network traffic from "/home/zengxiaosen/Desktop/tracesGongji_10.pcap".
Reload thread starting...
[New Thread 0x7fffdf2f4700 (LWP 23480)]
Reload thread started, thread 0x7fffdf2f4700 (23480)
WARNING: active responses disabled since DAQ can't inject packets.
--== Initialization Complete ==--
,,_ -*> Snort! <*-
o" )~ Version 2.9.8.3 GRE (Build 383)
'''' By Martin Roesch & The Snort Team: http://www.snort.org/contact#team
Copyright (C) 2014-2015 Cisco and/or its affiliates. All rights reserved.
Copyright (C) 1998-2013 Sourcefire, Inc., et al.
Using libpcap version 1.7.4
Using PCRE version: 8.38 2015-11-23
Using ZLIB version: 1.2.8
Rules Engine: SF_SNORT_DETECTION_ENGINE Version 2.6 <Build 1>
Preprocessor Object: SF_MODBUS Version 1.1 <Build 1>
Preprocessor Object: SF_IMAP Version 1.0 <Build 1>
Preprocessor Object: SF_SIP Version 1.1 <Build 1>
Preprocessor Object: SF_SMTP Version 1.1 <Build 9>
Preprocessor Object: SF_DNS Version 1.1 <Build 4>
Preprocessor Object: SF_DCERPC2 Version 1.0 <Build 3>
Preprocessor Object: SF_SDF Version 1.1 <Build 1>
Preprocessor Object: SF_GTP Version 1.1 <Build 1>
Preprocessor Object: SF_DNP3 Version 1.1 <Build 1>
Preprocessor Object: SF_REPUTATION Version 1.1 <Build 1>
Preprocessor Object: SF_SSH Version 1.1 <Build 3>
Preprocessor Object: SF_FTPTELNET Version 1.2 <Build 13>
Preprocessor Object: SF_POP Version 1.0 <Build 1>
Preprocessor Object: SF_SSLPP Version 1.1 <Build 4>
Commencing packet processing (pid=23479)
Thread 1 "snort" hit Breakpoint 1, SnortHttpInspect (GlobalConf=0x174f3a0, p=0xee4300 <s_packet>)
at snort_httpinspect.c:3910
3910 {
(gdb) n
3913 int iInspectMode = 0;
(gdb) n
3915 int iCallDetect = 1;
(gdb) n
3916 HttpSessionData *hsd = NULL;
(gdb) n
3917 bool fileProcessed = false;
(gdb) n
3918 bool is_first = true;
(gdb) n
3922 hi_stats.total++;
(gdb) n
3929 SetSiInput(&SiInput, p);
(gdb) n
3962 iRet = hi_si_session_inspection(GlobalConf, &Session, &SiInput, &iInspectMode, p);
(gdb) n
3963 if (iRet)
(gdb) n
3968 if (iInspectMode == HI_SI_NO_MODE)
(gdb) n
3993 hsd = GetHttpSessionData(p);
(gdb) n
4001 if(!hsd && ( SiInput.pdir == HI_SI_SERVER_MODE ) && (p->packet_flags & PKT_STREAM_ORDER_OK))
(gdb) n
4014 if ( ScPafEnabled() &&
(gdb) n
4015 (p->packet_flags & PKT_STREAM_INSERT) &&
(gdb) n
4014 if ( ScPafEnabled() &&
(gdb) n
4016 (!(p->packet_flags & PKT_PDU_TAIL)) )
(gdb) n
4015 (p->packet_flags & PKT_STREAM_INSERT) &&
(gdb) n
4048 if (hsd == NULL)
(gdb) n
4050 hsd = SetNewHttpSessionData(p, (void *)Session);
(gdb) n
4051 if (hsd == NULL)
(gdb) n
4072 if (hsd->decomp_state)
(gdb) n
4082 SetHttpDecode(0);
(gdb) n
4083 ClearHttpBuffers();
(gdb) n
4085 iRet = hi_mi_mode_inspection(Session, iInspectMode, p, hsd);
(gdb) n
4086 if (iRet)
(gdb) n
4096 iRet = hi_normalization(Session, iInspectMode, hsd);
(gdb) n
4097 if (iRet)
(gdb) n
4103 HttpLogFuncs(GlobalConf, hsd, p, iCallDetect);
(gdb) n
4109 if ( iInspectMode == HI_SI_CLIENT_MODE )
(gdb) n
4112 ClearHttpBuffers(); // FIXTHIS needed here and right above??
(gdb) n
4114 if ( Session->client.request.uri_norm )
(gdb) n
4129 else if ( Session->client.request.uri )
(gdb) n
4135 Session->client.request.uri_encode_type);
(gdb) n
4131 SetHttpBufferEncoding(
(gdb) n
4134 Session->client.request.uri_size,
(gdb) n
4131 SetHttpBufferEncoding(
(gdb) n
4133 Session->client.request.uri,
(gdb) n
4131 SetHttpBufferEncoding(
(gdb) n
4140 Session->client.request.uri_size);
(gdb) n
4137 SetHttpBuffer(
(gdb) n
4139 Session->client.request.uri,
(gdb) n
4137 SetHttpBuffer(
(gdb) n
4142 p->packet_flags |= PKT_HTTP_DECODE;
(gdb) n
4145 if ( Session->client.request.header_norm ||
(gdb) n
4148 if ( Session->client.request.header_norm )
(gdb) n
4154 Session->client.request.header_encode_type);
(gdb) n
4150 SetHttpBufferEncoding(
(gdb) n
4153 Session->client.request.header_norm_size,
(gdb) n
4150 SetHttpBufferEncoding(
(gdb) n
4152 Session->client.request.header_norm,
(gdb) n
4150 SetHttpBufferEncoding(
(gdb) n
4159 Session->client.request.header_raw_size);
(gdb) n
4156 SetHttpBuffer(
(gdb) n
4158 Session->client.request.header_raw,
(gdb) n
4156 SetHttpBuffer(
(gdb) n
4161 p->packet_flags |= PKT_HTTP_DECODE;
(gdb) n
4183 if(Session->client.request.method & (HI_POST_METHOD | HI_GET_METHOD))
(gdb) n
4185 if(Session->client.request.post_raw)
(gdb) n
4213 if ( Session->client.request.method_raw )
(gdb) n
4218 Session->client.request.method_size);
(gdb) n
4215 SetHttpBuffer(
(gdb) n
4217 Session->client.request.method_raw,
(gdb) n
4215 SetHttpBuffer(
(gdb) n
4220 p->packet_flags |= PKT_HTTP_DECODE;
(gdb) n
4223 if ( Session->client.request.cookie_norm ||
(gdb) n
4224 Session->client.request.cookie.cookie )
(gdb) n
4223 if ( Session->client.request.cookie_norm ||
(gdb) n
4260 else if ( !Session->server_conf->enable_cookie &&
(gdb) n
4274 if ( IsLimitedDetect(p) )
(gdb) n
4276 ApplyClientFlowDepth(p, Session->server_conf->client_flow_depth);
(gdb) n
4278 if( !GetHttpBufferMask() && (p->alt_dsize == 0) )
(gdb) n
4514 PREPROC_PROFILE_START(hiDetectPerfStats);
(gdb) n
4515 Detect(p);
(gdb) s
Detect (p=0xee4300 <s_packet>) at detect.c:497
497 int detected = 0;
(gdb) n
500 if ((p == NULL) || !IPH_IS_VALID(p))
(gdb) n
506 if (!snort_conf->ip_proto_array[GET_IPH_PROTO(p)])
(gdb) n
529 if (p->packet_flags & PKT_PASS_RULE)
(gdb) n
542 if( PPM_PKTS_ENABLED() )
(gdb) n
556 PREPROC_PROFILE_START(detectPerfStats);
(gdb) s
ScProfilePreprocs () at snort.h:1477
1477 return snort_conf->profile_preprocs.num;
(gdb) n
1478 }
(gdb) n
Detect (p=0xee4300 <s_packet>) at detect.c:557
557 detected = fpEvalPacket(p);
(gdb) s
fpEvalPacket (p=0xee4300 <s_packet>) at fpdetect.c:1626
1626 int ip_proto = GET_IPH_PROTO(p);
(gdb) bt
#0 fpEvalPacket (p=0xee4300 <s_packet>) at fpdetect.c:1626
#1 0x0000000000446241 in Detect (p=0xee4300 <s_packet>) at detect.c:557
#2 0x00000000004ab952 in SnortHttpInspect (GlobalConf=0x174f3a0, p=0xee4300 <s_packet>)
at snort_httpinspect.c:4515
#3 0x00000000004a12c9 in HttpInspect (p=0xee4300 <s_packet>, context=0x0) at spp_httpinspect.c:216
#4 0x0000000000445680 in DispatchPreprocessors (p=0xee4300 <s_packet>, policy_id=0, policy=0x7ffff4d56010)
at detect.c:141
#5 0x00000000004459be in Preprocess (p=0xee4300 <s_packet>) at detect.c:239
#6 0x000000000043816f in ProcessPacket (p=0xee4300 <s_packet>, pkthdr=0x7fffffffe260, pkt=0x1bb8630 "\002",
ft=0x0) at snort.c:1899
#7 0x0000000000437d84 in PacketCallback (user=0x0, pkthdr=0x7fffffffe260, pkt=0x1bb8630 "\002") at snort.c:1745
#8 0x0000000000535d34 in pcap_process_loop (user=0x1ba31b0 "", pkth=<optimized out>, data=<optimized out>)
at daq_pcap.c:362
#9 0x00007ffff6bbbac4 in ?? () from /usr/lib/x86_64-linux-gnu/libpcap.so.0.8
#10 0x0000000000535f1d in pcap_daq_acquire (handle=0x1ba31b0, cnt=0, callback=<optimized out>,
metaback=<optimized out>, user=<optimized out>) at daq_pcap.c:380
#11 0x000000000045e080 in DAQ_Acquire (max=0, callback=0x437bf8 <PacketCallback>, user=0x0) at sfdaq.c:640
#12 0x000000000043a6bb in PacketLoop () at snort.c:3296
#13 0x0000000000436c69 in SnortMain (argc=5, argv=0x7fffffffe528) at snort.c:952
#14 0x0000000000436aba in main (argc=5, argv=0x7fffffffe528) at snort.c:836
(gdb) n
1627 OTNX_MATCH_DATA *omd = snort_conf->omd;
(gdb) n
1630 if ( p->udph && (p->proto_bits & (PROTO_BIT__TEREDO | PROTO_BIT__GTP)) )
(gdb) n
1661 switch(ip_proto)
(gdb) n
1667 if(p->tcph == NULL)
(gdb) n
1673 return fpEvalHeaderTcp(p, omd);
(gdb) s
fpEvalHeaderTcp (p=0xee4300 <s_packet>, omd=0x1705140) at fpdetect.c:1482
1482 {
(gdb) n
1483 PORT_GROUP *src = NULL, *dst = NULL, *gen = NULL;
(gdb) n
1486 PORT_GROUP *nssrc = NULL, *nsdst = NULL;
(gdb) n
1488 if (IsAdaptiveConfigured())
(gdb) n
1503 if ( src == NULL && dst == NULL )
(gdb) n
1505 if(!prmFindRuleGroupTcp(snort_conf->prmTcpRTNX, p->dp, p->sp, &src, &dst, &nssrc, &nsdst, &gen))
The program being debugged has been started already.
Start it from the beginning? (y or n) y
Starting program: /usr/bin/snort -c /etc/snort/snort.conf -r /home/zengxiaosen/Desktop/tracesGongji_10.pcap
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
Running in IDS mode
--== Initializing Snort ==--
Initializing Output Plugins!
Initializing Preprocessors!
Initializing Plug-ins!
Parsing Rules file "/etc/snort/snort.conf"
PortVar 'HTTP_PORTS' defined : [ 80:81 311 383 591 593 901 1220 1414 1741 1830 2301 2381 2809 3037 3128 3702 4343 4848 5250 6988 7000:7001 7144:7145 7510 7777 7779 8000 8008 8014 8028 8080 8085 8088 8090 8118 8123 8180:8181 8243 8280 8300 8800 8888 8899 9000 9060 9080 9090:9091 9443 9999 11371 34443:34444 41080 50002 55555 ]
PortVar 'SHELLCODE_PORTS' defined : [ 0:79 81:65535 ]
PortVar 'ORACLE_PORTS' defined : [ 1024:65535 ]
PortVar 'SSH_PORTS' defined : [ 22 ]
PortVar 'FTP_PORTS' defined : [ 21 2100 3535 ]
PortVar 'SIP_PORTS' defined : [ 5060:5061 5600 ]
PortVar 'FILE_DATA_PORTS' defined : [ 80:81 110 143 311 383 591 593 901 1220 1414 1741 1830 2301 2381 2809 3037 3128 3702 4343 4848 5250 6988 7000:7001 7144:7145 7510 7777 7779 8000 8008 8014 8028 8080 8085 8088 8090 8118 8123 8180:8181 8243 8280 8300 8800 8888 8899 9000 9060 9080 9090:9091 9443 9999 11371 34443:34444 41080 50002 55555 ]
PortVar 'GTP_PORTS' defined : [ 2123 2152 3386 ]
Detection:
Search-Method = AC-Full-Q
Split Any/Any group = enabled
Search-Method-Optimizations = enabled
Maximum pattern length = 20
Tagged Packet Limit: 256
Loading dynamic engine /usr/local/lib/snort_dynamicengine/libsf_engine.so... done
Loading all dynamic detection libs from /usr/local/lib/snort_dynamicrules...
WARNING: No dynamic libraries found in directory /usr/local/lib/snort_dynamicrules.
Finished Loading all dynamic detection libs from /usr/local/lib/snort_dynamicrules
Loading all dynamic preprocessor libs from /usr/local/lib/snort_dynamicpreprocessor/...
Loading dynamic preprocessor library /usr/local/lib/snort_dynamicpreprocessor//libsf_ssl_preproc.so... done
Loading dynamic preprocessor library /usr/local/lib/snort_dynamicpreprocessor//libsf_pop_preproc.so... done
Loading dynamic preprocessor library /usr/local/lib/snort_dynamicpreprocessor//libsf_ftptelnet_preproc.so... done
Loading dynamic preprocessor library /usr/local/lib/snort_dynamicpreprocessor//libsf_ssh_preproc.so... done
Loading dynamic preprocessor library /usr/local/lib/snort_dynamicpreprocessor//libsf_reputation_preproc.so... done
Loading dynamic preprocessor library /usr/local/lib/snort_dynamicpreprocessor//libsf_dnp3_preproc.so... done
Loading dynamic preprocessor library /usr/local/lib/snort_dynamicpreprocessor//libsf_gtp_preproc.so... done
Loading dynamic preprocessor library /usr/local/lib/snort_dynamicpreprocessor//libsf_sdf_preproc.so... done
Loading dynamic preprocessor library /usr/local/lib/snort_dynamicpreprocessor//libsf_dce2_preproc.so... done
Loading dynamic preprocessor library /usr/local/lib/snort_dynamicpreprocessor//libsf_dns_preproc.so... done
Loading dynamic preprocessor library /usr/local/lib/snort_dynamicpreprocessor//libsf_smtp_preproc.so... done
Loading dynamic preprocessor library /usr/local/lib/snort_dynamicpreprocessor//libsf_sip_preproc.so... done
Loading dynamic preprocessor library /usr/local/lib/snort_dynamicpreprocessor//libsf_imap_preproc.so... done
Loading dynamic preprocessor library /usr/local/lib/snort_dynamicpreprocessor//libsf_modbus_preproc.so... done
Finished Loading all dynamic preprocessor libs from /usr/local/lib/snort_dynamicpreprocessor/
Log directory = /var/log/snort
WARNING: ip4 normalizations disabled because not inline.
WARNING: tcp normalizations disabled because not inline.
WARNING: icmp4 normalizations disabled because not inline.
WARNING: ip6 normalizations disabled because not inline.
WARNING: icmp6 normalizations disabled because not inline.
Frag3 global config:
Max frags: 65536
Fragment memory cap: 4194304 bytes
Frag3 engine config:
Bound Address: default
Target-based policy: WINDOWS
Fragment timeout: 180 seconds
Fragment min_ttl: 1
Fragment Anomalies: Alert
Overlap Limit: 10
Min fragment Length: 100
Max Expected Streams: 768
Stream global config:
Track TCP sessions: ACTIVE
Max TCP sessions: 262144
TCP cache pruning timeout: 30 seconds
TCP cache nominal timeout: 3600 seconds
Memcap (for reassembly packet storage): 8388608
Track UDP sessions: ACTIVE
Max UDP sessions: 131072
UDP cache pruning timeout: 30 seconds
UDP cache nominal timeout: 180 seconds
Track ICMP sessions: INACTIVE
Track IP sessions: INACTIVE
Log info if session memory consumption exceeds 1048576
Send up to 2 active responses
Wait at least 5 seconds between responses
Protocol Aware Flushing: ACTIVE
Maximum Flush Point: 16000
Stream TCP Policy config:
Bound Address: default
Reassembly Policy: WINDOWS
Timeout: 180 seconds
Limit on TCP Overlaps: 10
Maximum number of bytes to queue per session: 1048576
Maximum number of segs to queue per session: 2621
Options:
Require 3-Way Handshake: YES
3-Way Handshake Timeout: 180
Detect Anomalies: YES
Reassembly Ports:
21 client (Footprint)
22 client (Footprint)
23 client (Footprint)
25 client (Footprint)
42 client (Footprint)
53 client (Footprint)
79 client (Footprint)
80 client (Footprint) server (Footprint)
81 client (Footprint) server (Footprint)
109 client (Footprint)
110 client (Footprint)
111 client (Footprint)
113 client (Footprint)
119 client (Footprint)
135 client (Footprint)
136 client (Footprint)
137 client (Footprint)
139 client (Footprint)
143 client (Footprint)
161 client (Footprint)
additional ports configured but not printed.
Stream UDP Policy config:
Timeout: 180 seconds
HttpInspect Config:
GLOBAL CONFIG
Detect Proxy Usage: NO
IIS Unicode Map Filename: /etc/snort/unicode.map
IIS Unicode Map Codepage: 1252
Memcap used for logging URI and Hostname: 150994944
Max Gzip Memory: 838860
Max Gzip Sessions: 1613
Gzip Compress Depth: 65535
Gzip Decompress Depth: 65535
DEFAULT SERVER CONFIG:
Server profile: All
Ports (PAF): 80 81 311 383 591 593 901 1220 1414 1741 1830 2301 2381 2809 3037 3128 3702 4343 4848 5250 6988 7000 7001 7144 7145 7510 7777 7779 8000 8008 8014 8028 8080 8085 8088 8090 8118 8123 8180 8181 8243 8280 8300 8800 8888 8899 9000 9060 9080 9090 9091 9443 9999 11371 34443 34444 41080 50002 55555
Server Flow Depth: 0
Client Flow Depth: 0
Max Chunk Length: 500000
Small Chunk Length Evasion: chunk size <= 10, threshold >= 5 times
Max Header Field Length: 750
Max Number Header Fields: 100
Max Number of WhiteSpaces allowed with header folding: 200
Inspect Pipeline Requests: YES
URI Discovery Strict Mode: NO
Allow Proxy Usage: NO
Disable Alerting: NO
Oversize Dir Length: 500
Only inspect URI: NO
Normalize HTTP Headers: NO
Inspect HTTP Cookies: YES
Inspect HTTP Responses: YES
Extract Gzip from responses: YES
Decompress response files:
Unlimited decompression of gzip data from responses: YES
Normalize Javascripts in HTTP Responses: YES
Max Number of WhiteSpaces allowed with Javascript Obfuscation in HTTP responses: 200
Normalize HTTP Cookies: NO
Enable XFF and True Client IP: NO
Log HTTP URI data: NO
Log HTTP Hostname data: NO
Extended ASCII code support in URI: NO
Ascii: YES alert: NO
Double Decoding: YES alert: NO
%U Encoding: YES alert: YES
Bare Byte: YES alert: NO
UTF 8: YES alert: NO
IIS Unicode: YES alert: NO
Multiple Slash: YES alert: NO
IIS Backslash: YES alert: NO
Directory Traversal: YES alert: NO
Web Root Traversal: YES alert: NO
Apache WhiteSpace: YES alert: NO
IIS Delimiter: YES alert: NO
IIS Unicode Map: GLOBAL IIS UNICODE MAP CONFIG
Non-RFC Compliant Characters: 0x00 0x01 0x02 0x03 0x04 0x05 0x06 0x07
Whitespace Characters: 0x09 0x0b 0x0c 0x0d
rpc_decode arguments:
Ports to decode RPC on: 111 32770 32771 32772 32773 32774 32775 32776 32777 32778 32779
alert_fragments: INACTIVE
alert_large_fragments: INACTIVE
alert_incomplete: INACTIVE
alert_multiple_requests: INACTIVE
FTPTelnet Config:
GLOBAL CONFIG
Inspection Type: stateful
Check for Encrypted Traffic: YES alert: NO
Continue to check encrypted data: YES
TELNET CONFIG:
Ports: 23
Are You There Threshold: 20
Normalize: YES
Detect Anomalies: YES
FTP CONFIG:
FTP Server: default
Ports (PAF): 21 2100 3535
Check for Telnet Cmds: YES alert: YES
Ignore Telnet Cmd Operations: YES alert: YES
Ignore open data channels: NO
FTP Client: default
Check for Bounce Attacks: YES alert: YES
Check for Telnet Cmds: YES alert: YES
Ignore Telnet Cmd Operations: YES alert: YES
Max Response Length: 256
SMTP Config:
Ports: 25 465 587 691
Inspection Type: Stateful
Normalize: ATRN AUTH BDAT DATA DEBUG EHLO EMAL ESAM ESND ESOM ETRN EVFY EXPN HELO HELP IDENT MAIL NOOP ONEX QUEU QUIT RCPT RSET SAML SEND STARTTLS SOML TICK TIME TURN TURNME VERB VRFY X-EXPS XADR XAUTH XCIR XEXCH50 XGEN XLICENSE X-LINK2STATE XQUE XSTA XTRN XUSR CHUNKING X-ADAT X-DRCP X-ERCP X-EXCH50
Ignore Data: No
Ignore TLS Data: No
Ignore SMTP Alerts: No
Max Command Line Length: 512
Max auth Command Line Length: 1000
Max Specific Command Line Length:
ATRN:255 AUTH:246 BDAT:255 DATA:246 DEBUG:255
EHLO:500 EMAL:255 ESAM:255 ESND:255 ESOM:255
ETRN:246 EVFY:255 EXPN:255 HELO:500 HELP:500
IDENT:255 MAIL:260 NOOP:255 ONEX:246 QUEU:246
QUIT:246 RCPT:300 RSET:246 SAML:246 SEND:246
SIZE:255 STARTTLS:246 SOML:246 TICK:246 TIME:246
TURN:246 TURNME:246 VERB:246 VRFY:255 X-EXPS:246
XADR:246 XAUTH:246 XCIR:246 XEXCH50:246 XGEN:246
XLICENSE:246 X-LINK2STATE:246 XQUE:246 XSTA:246 XTRN:246
XUSR:246
Max Header Line Length: 1000
Max Response Line Length: 512
X-Link2State Alert: Yes
Drop on X-Link2State Alert: No
Alert on commands: None
Alert on unknown commands: No
SMTP Memcap: 838860
MIME Max Mem: 838860
Base64 Decoding: Enabled
Base64 Decoding Depth: Unlimited
Quoted-Printable Decoding: Enabled
Quoted-Printable Decoding Depth: Unlimited
Unix-to-Unix Decoding: Enabled
Unix-to-Unix Decoding Depth: Unlimited
Non-Encoded MIME attachment Extraction: Enabled
Non-Encoded MIME attachment Extraction Depth: Unlimited
Log Attachment filename: Enabled
Log MAIL FROM Address: Enabled
Log RCPT TO Addresses: Enabled
Log Email Headers: Enabled
Email Hdrs Log Depth: 1464
SSH config:
Autodetection: ENABLED
Challenge-Response Overflow Alert: ENABLED
SSH1 CRC32 Alert: ENABLED
Server Version String Overflow Alert: ENABLED
Protocol Mismatch Alert: ENABLED
Bad Message Direction Alert: DISABLED
Bad Payload Size Alert: DISABLED
Unrecognized Version Alert: DISABLED
Max Encrypted Packets: 20
Max Server Version String Length: 100
MaxClientBytes: 19600 (Default)
Ports:
22
DCE/RPC 2 Preprocessor Configuration
Global Configuration
DCE/RPC Defragmentation: Enabled
Memcap: 102400 KB
Events: co
SMB Fingerprint policy: Disabled
Server Default Configuration
Policy: WinXP
Detect ports (PAF)
SMB: 139 445
TCP: 135
UDP: 135
RPC over HTTP server: 593
RPC over HTTP proxy: None
Autodetect ports (PAF)
SMB: None
TCP: 1025-65535
UDP: 1025-65535
RPC over HTTP server: 1025-65535
RPC over HTTP proxy: None
Invalid SMB shares: C$ D$ ADMIN$
Maximum SMB command chaining: 3 commands
SMB file inspection: Disabled
DNS config:
DNS Client rdata txt Overflow Alert: ACTIVE
Obsolete DNS RR Types Alert: INACTIVE
Experimental DNS RR Types Alert: INACTIVE
Ports: 53
SSLPP config:
Encrypted packets: not inspected
Ports:
443 465 563 636 989
992 993 994 995 7801
7802 7900 7901 7902 7903
7904 7905 7906 7907 7908
7909 7910 7911 7912 7913
7914 7915 7916 7917 7918
7919 7920
Server side data is trusted
Maximum SSL Heartbeat length: 0
Sensitive Data preprocessor config:
Global Alert Threshold: 25
Masked Output: DISABLED
SIP config:
Max number of sessions: 40000
Max number of dialogs in a session: 4 (Default)
Status: ENABLED
Ignore media channel: DISABLED
Max URI length: 512
Max Call ID length: 80
Max Request name length: 20 (Default)
Max From length: 256 (Default)
Max To length: 256 (Default)
Max Via length: 1024 (Default)
Max Contact length: 512
Max Content length: 2048
Ports:
5060 5061 5600
Methods:
invite cancel ack bye register options refer subscribe update join info message notify benotify do qauth sprack publish service unsubscribe prack
IMAP Config:
Ports: 143
IMAP Memcap: 838860
MIME Max Mem: 838860
Base64 Decoding: Enabled
Base64 Decoding Depth: Unlimited
Quoted-Printable Decoding: Enabled
Quoted-Printable Decoding Depth: Unlimited
Unix-to-Unix Decoding: Enabled
Unix-to-Unix Decoding Depth: Unlimited
Non-Encoded MIME attachment Extraction: Enabled
Non-Encoded MIME attachment Extraction Depth: Unlimited
POP Config:
Ports: 110
POP Memcap: 838860
MIME Max Mem: 838860
Base64 Decoding: Enabled
Base64 Decoding Depth: Unlimited
Quoted-Printable Decoding: Enabled
Quoted-Printable Decoding Depth: Unlimited
Unix-to-Unix Decoding: Enabled
Unix-to-Unix Decoding Depth: Unlimited
Non-Encoded MIME attachment Extraction: Enabled
Non-Encoded MIME attachment Extraction Depth: Unlimited
Modbus config:
Ports:
502
DNP3 config:
Memcap: 262144
Check Link-Layer CRCs: ENABLED
Ports:
20000
Reputation config:
WARNING: Can't find any whitelist/blacklist entries. Reputation Preprocessor disabled.
+++++++++++++++++++++++++++++++++++++++++++++++++++
Initializing rule chains...
3 Snort rules read
3 detection rules
0 decoder rules
0 preprocessor rules
3 Option Chains linked into 3 Chain Headers
0 Dynamic rules
+++++++++++++++++++++++++++++++++++++++++++++++++++
+-------------------[Rule Port Counts]---------------------------------------
| tcp udp icmp ip
| src 1 0 0 0
| dst 1 0 0 0
| any 0 0 1 0
| nc 0 0 1 0
| s+d 0 0 0 0
+----------------------------------------------------------------------------
+-----------------------[detection-filter-config]------------------------------
| memory-cap : 1048576 bytes
+-----------------------[detection-filter-rules]-------------------------------
| none
-------------------------------------------------------------------------------
+-----------------------[rate-filter-config]-----------------------------------
| memory-cap : 1048576 bytes
+-----------------------[rate-filter-rules]------------------------------------
| none
-------------------------------------------------------------------------------
+-----------------------[event-filter-config]----------------------------------
| memory-cap : 1048576 bytes
+-----------------------[event-filter-global]----------------------------------
+-----------------------[event-filter-local]-----------------------------------
| none
+-----------------------[suppression]------------------------------------------
| none
-------------------------------------------------------------------------------
Rule application order: activation->dynamic->pass->drop->sdrop->reject->alert->log
Verifying Preprocessor Configurations!
WARNING: flowbits key 'file.htc' is checked but not ever set.
1 out of 1024 flowbits in use.
[ Port Based Pattern Matching Memory ]
+- [ Aho-Corasick Summary ] -------------------------------------
| Storage Format : Full-Q
| Finite Automaton : DFA
| Alphabet Size : 256 Chars
| Sizeof State : Variable (1,2,4 bytes)
| Instances : 2
| 1 byte states : 2
| 2 byte states : 0
| 4 byte states : 0
| Characters : 32
| States : 34
| Transitions : 64
| State Density : 0.7%
| Patterns : 2
| Match States : 2
| Memory (KB) : 20.49
| Pattern : 0.22
| Match Lists : 0.42
| DFA
| 1 byte states : 8.83
| 2 byte states : 0.00
| 4 byte states : 0.00
+----------------------------------------------------------------
[ Number of patterns truncated to 20 bytes: 0 ]
pcap DAQ configured to read-file.
Acquiring network traffic from "/home/zengxiaosen/Desktop/tracesGongji_10.pcap".
Reload thread starting...
[New Thread 0x7fffdf2f4700 (LWP 23480)]
Reload thread started, thread 0x7fffdf2f4700 (23480)
WARNING: active responses disabled since DAQ can't inject packets.
--== Initialization Complete ==--
,,_ -*> Snort! <*-
o" )~ Version 2.9.8.3 GRE (Build 383)
'''' By Martin Roesch & The Snort Team: http://www.snort.org/contact#team
Copyright (C) 2014-2015 Cisco and/or its affiliates. All rights reserved.
Copyright (C) 1998-2013 Sourcefire, Inc., et al.
Using libpcap version 1.7.4
Using PCRE version: 8.38 2015-11-23
Using ZLIB version: 1.2.8
Rules Engine: SF_SNORT_DETECTION_ENGINE Version 2.6 <Build 1>
Preprocessor Object: SF_MODBUS Version 1.1 <Build 1>
Preprocessor Object: SF_IMAP Version 1.0 <Build 1>
Preprocessor Object: SF_SIP Version 1.1 <Build 1>
Preprocessor Object: SF_SMTP Version 1.1 <Build 9>
Preprocessor Object: SF_DNS Version 1.1 <Build 4>
Preprocessor Object: SF_DCERPC2 Version 1.0 <Build 3>
Preprocessor Object: SF_SDF Version 1.1 <Build 1>
Preprocessor Object: SF_GTP Version 1.1 <Build 1>
Preprocessor Object: SF_DNP3 Version 1.1 <Build 1>
Preprocessor Object: SF_REPUTATION Version 1.1 <Build 1>
Preprocessor Object: SF_SSH Version 1.1 <Build 3>
Preprocessor Object: SF_FTPTELNET Version 1.2 <Build 13>
Preprocessor Object: SF_POP Version 1.0 <Build 1>
Preprocessor Object: SF_SSLPP Version 1.1 <Build 4>
Commencing packet processing (pid=23479)
Thread 1 "snort" hit Breakpoint 1, SnortHttpInspect (GlobalConf=0x174f3a0, p=0xee4300 <s_packet>)
at snort_httpinspect.c:3910
3910 {
(gdb) n
3913 int iInspectMode = 0;
(gdb) n
3915 int iCallDetect = 1;
(gdb) n
3916 HttpSessionData *hsd = NULL;
(gdb) n
3917 bool fileProcessed = false;
(gdb) n
3918 bool is_first = true;
(gdb) n
3922 hi_stats.total++;
(gdb) n
3929 SetSiInput(&SiInput, p);
(gdb) n
3962 iRet = hi_si_session_inspection(GlobalConf, &Session, &SiInput, &iInspectMode, p);
(gdb) n
3963 if (iRet)
(gdb) n
3968 if (iInspectMode == HI_SI_NO_MODE)
(gdb) n
3993 hsd = GetHttpSessionData(p);
(gdb) n
4001 if(!hsd && ( SiInput.pdir == HI_SI_SERVER_MODE ) && (p->packet_flags & PKT_STREAM_ORDER_OK))
(gdb) n
4014 if ( ScPafEnabled() &&
(gdb) n
4015 (p->packet_flags & PKT_STREAM_INSERT) &&
(gdb) n
4014 if ( ScPafEnabled() &&
(gdb) n
4016 (!(p->packet_flags & PKT_PDU_TAIL)) )
(gdb) n
4015 (p->packet_flags & PKT_STREAM_INSERT) &&
(gdb) n
4048 if (hsd == NULL)
(gdb) n
4050 hsd = SetNewHttpSessionData(p, (void *)Session);
(gdb) n
4051 if (hsd == NULL)
(gdb) n
4072 if (hsd->decomp_state)
(gdb) n
4082 SetHttpDecode(0);
(gdb) n
4083 ClearHttpBuffers();
(gdb) n
4085 iRet = hi_mi_mode_inspection(Session, iInspectMode, p, hsd);
(gdb) n
4086 if (iRet)
(gdb) n
4096 iRet = hi_normalization(Session, iInspectMode, hsd);
(gdb) n
4097 if (iRet)
(gdb) n
4103 HttpLogFuncs(GlobalConf, hsd, p, iCallDetect);
(gdb) n
4109 if ( iInspectMode == HI_SI_CLIENT_MODE )
(gdb) n
4112 ClearHttpBuffers(); // FIXTHIS needed here and right above??
(gdb) n
4114 if ( Session->client.request.uri_norm )
(gdb) n
4129 else if ( Session->client.request.uri )
(gdb) n
4135 Session->client.request.uri_encode_type);
(gdb) n
4131 SetHttpBufferEncoding(
(gdb) n
4134 Session->client.request.uri_size,
(gdb) n
4131 SetHttpBufferEncoding(
(gdb) n
4133 Session->client.request.uri,
(gdb) n
4131 SetHttpBufferEncoding(
(gdb) n
4140 Session->client.request.uri_size);
(gdb) n
4137 SetHttpBuffer(
(gdb) n
4139 Session->client.request.uri,
(gdb) n
4137 SetHttpBuffer(
(gdb) n
4142 p->packet_flags |= PKT_HTTP_DECODE;
(gdb) n
4145 if ( Session->client.request.header_norm ||
(gdb) n
4148 if ( Session->client.request.header_norm )
(gdb) n
4154 Session->client.request.header_encode_type);
(gdb) n
4150 SetHttpBufferEncoding(
(gdb) n
4153 Session->client.request.header_norm_size,
(gdb) n
4150 SetHttpBufferEncoding(
(gdb) n
4152 Session->client.request.header_norm,
(gdb) n
4150 SetHttpBufferEncoding(
(gdb) n
4159 Session->client.request.header_raw_size);
(gdb) n
4156 SetHttpBuffer(
(gdb) n
4158 Session->client.request.header_raw,
(gdb) n
4156 SetHttpBuffer(
(gdb) n
4161 p->packet_flags |= PKT_HTTP_DECODE;
(gdb) n
4183 if(Session->client.request.method & (HI_POST_METHOD | HI_GET_METHOD))
(gdb) n
4185 if(Session->client.request.post_raw)
(gdb) n
4213 if ( Session->client.request.method_raw )
(gdb) n
4218 Session->client.request.method_size);
(gdb) n
4215 SetHttpBuffer(
(gdb) n
4217 Session->client.request.method_raw,
(gdb) n
4215 SetHttpBuffer(
(gdb) n
4220 p->packet_flags |= PKT_HTTP_DECODE;
(gdb) n
4223 if ( Session->client.request.cookie_norm ||
(gdb) n
4224 Session->client.request.cookie.cookie )
(gdb) n
4223 if ( Session->client.request.cookie_norm ||
(gdb) n
4260 else if ( !Session->server_conf->enable_cookie &&
(gdb) n
4274 if ( IsLimitedDetect(p) )
(gdb) n
4276 ApplyClientFlowDepth(p, Session->server_conf->client_flow_depth);
(gdb) n
4278 if( !GetHttpBufferMask() && (p->alt_dsize == 0) )
(gdb) n
4514 PREPROC_PROFILE_START(hiDetectPerfStats);
(gdb) n
4515 Detect(p);
(gdb) s
Detect (p=0xee4300 <s_packet>) at detect.c:497
497 int detected = 0;
(gdb) n
500 if ((p == NULL) || !IPH_IS_VALID(p))
(gdb) n
506 if (!snort_conf->ip_proto_array[GET_IPH_PROTO(p)])
(gdb) n
529 if (p->packet_flags & PKT_PASS_RULE)
(gdb) n
542 if( PPM_PKTS_ENABLED() )
(gdb) n
556 PREPROC_PROFILE_START(detectPerfStats);
(gdb) s
ScProfilePreprocs () at snort.h:1477
1477 return snort_conf->profile_preprocs.num;
(gdb) n
1478 }
(gdb) n
Detect (p=0xee4300 <s_packet>) at detect.c:557
557 detected = fpEvalPacket(p);
(gdb) s
fpEvalPacket (p=0xee4300 <s_packet>) at fpdetect.c:1626
1626 int ip_proto = GET_IPH_PROTO(p);
(gdb) bt
#0 fpEvalPacket (p=0xee4300 <s_packet>) at fpdetect.c:1626
#1 0x0000000000446241 in Detect (p=0xee4300 <s_packet>) at detect.c:557
#2 0x00000000004ab952 in SnortHttpInspect (GlobalConf=0x174f3a0, p=0xee4300 <s_packet>)
at snort_httpinspect.c:4515
#3 0x00000000004a12c9 in HttpInspect (p=0xee4300 <s_packet>, context=0x0) at spp_httpinspect.c:216
#4 0x0000000000445680 in DispatchPreprocessors (p=0xee4300 <s_packet>, policy_id=0, policy=0x7ffff4d56010)
at detect.c:141
#5 0x00000000004459be in Preprocess (p=0xee4300 <s_packet>) at detect.c:239
#6 0x000000000043816f in ProcessPacket (p=0xee4300 <s_packet>, pkthdr=0x7fffffffe260, pkt=0x1bb8630 "\002",
ft=0x0) at snort.c:1899
#7 0x0000000000437d84 in PacketCallback (user=0x0, pkthdr=0x7fffffffe260, pkt=0x1bb8630 "\002") at snort.c:1745
#8 0x0000000000535d34 in pcap_process_loop (user=0x1ba31b0 "", pkth=<optimized out>, data=<optimized out>)
at daq_pcap.c:362
#9 0x00007ffff6bbbac4 in ?? () from /usr/lib/x86_64-linux-gnu/libpcap.so.0.8
#10 0x0000000000535f1d in pcap_daq_acquire (handle=0x1ba31b0, cnt=0, callback=<optimized out>,
metaback=<optimized out>, user=<optimized out>) at daq_pcap.c:380
#11 0x000000000045e080 in DAQ_Acquire (max=0, callback=0x437bf8 <PacketCallback>, user=0x0) at sfdaq.c:640
#12 0x000000000043a6bb in PacketLoop () at snort.c:3296
#13 0x0000000000436c69 in SnortMain (argc=5, argv=0x7fffffffe528) at snort.c:952
#14 0x0000000000436aba in main (argc=5, argv=0x7fffffffe528) at snort.c:836
(gdb) n
1627 OTNX_MATCH_DATA *omd = snort_conf->omd;
(gdb) n
1630 if ( p->udph && (p->proto_bits & (PROTO_BIT__TEREDO | PROTO_BIT__GTP)) )
(gdb) n
1661 switch(ip_proto)
(gdb) n
1667 if(p->tcph == NULL)
(gdb) n
1673 return fpEvalHeaderTcp(p, omd);
(gdb) s
fpEvalHeaderTcp (p=0xee4300 <s_packet>, omd=0x1705140) at fpdetect.c:1482
1482 {
(gdb) n
1483 PORT_GROUP *src = NULL, *dst = NULL, *gen = NULL;
(gdb) n
1486 PORT_GROUP *nssrc = NULL, *nsdst = NULL;
(gdb) n
1488 if (IsAdaptiveConfigured())
(gdb) n
1503 if ( src == NULL && dst == NULL )
(gdb) n
1505 if(!prmFindRuleGroupTcp(snort_conf->prmTcpRTNX, p->dp, p->sp, &src, &dst, &nssrc, &nsdst, &gen))