You can inspect Signatures 4, 5, and 6, and verify that they trigger a match and place a packet in Match Memory — thus alerting the host — if three consecutive packets are seen with size between 0 and 100. The third packet references the previous two stored in Temporary Memory. Thus, once the third packet is received, the three segments are presented to the host through the DPI network interface. Notice that the bit pattern used in the two rules avoids collision with the previous rule if the flow hashing also happens to collide.
The meta.rules File
The meta.rules file — located in the
Support for Snort's flow Keyword
The two stateful rules in Table 21 initiate a new flow if a SYN or a
Table 21 Flow Established Rules
alert tcp any any
Handling Segmentation Evasion
Tools like fragroute or Nessus are used to fragment the packet payload in several TCP segments in order to evade
71 |