<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: custom signature to detect telnet authentication failure in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/custom-signature-to-detect-telnet-authentication-failure/m-p/13991#M6917</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Your sensor version is the first 3.0 release.  You will need to update to&lt;/P&gt;&lt;P&gt;get the latest signatures and get the enhancements to ATOMIC.TCP&lt;/P&gt;&lt;P&gt;which include the SinglePacketRegex parameter.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Typically, you will want to watch for the notification about the Signature Update and Service Pack releases because the new signature sets will give you better intrusion coverage and the service packs fix bugs and give you new features.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The "string match" signature for this is good, but it does not count the failed&lt;/P&gt;&lt;P&gt;logins across different connections.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Good luck,&lt;/P&gt;&lt;P&gt;-JK&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 12 Apr 2002 13:46:24 GMT</pubDate>
    <dc:creator>jakasper</dc:creator>
    <dc:date>2002-04-12T13:46:24Z</dc:date>
    <item>
      <title>custom signature to detect telnet authentication failure</title>
      <link>https://community.cisco.com/t5/network-access-control/custom-signature-to-detect-telnet-authentication-failure/m-p/13988#M6914</link>
      <description>&lt;P&gt;I created a custom signature to detect telnet authentication failure. It belongs to STRING.TCP engine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here are the signature's parameters:&lt;/P&gt;&lt;P&gt;SID 20005, Engine: STRING.TCP&lt;/P&gt;&lt;P&gt;1 - AlarmThrottle        = FireAll &lt;/P&gt;&lt;P&gt;  2 - ChokeThreshold       = &lt;/P&gt;&lt;P&gt;  3 - Direction            = ToService &lt;/P&gt;&lt;P&gt;  4 - FlipAddr             = True &lt;/P&gt;&lt;P&gt;  5 - MaxInspectLength     = &lt;/P&gt;&lt;P&gt;  6 - MinHits              = 1 &lt;/P&gt;&lt;P&gt;  7 - MinMatchLength       = &lt;/P&gt;&lt;P&gt;  8 - MultipleHits         = &lt;/P&gt;&lt;P&gt;  9 * RegexString          = * &lt;/P&gt;&lt;P&gt; 10 - ResetAfterIdle       = 15 &lt;/P&gt;&lt;P&gt; 11 - ServicePorts         = 23 &lt;/P&gt;&lt;P&gt; 12 - SigComment           = &lt;/P&gt;&lt;P&gt; 13 - SigName              = telnet failure on port 23 &lt;/P&gt;&lt;P&gt; 14 - SigStringInfo        =   &lt;/P&gt;&lt;P&gt; 15 - StripTelnetOptions   = &lt;/P&gt;&lt;P&gt; 16 - ThrottleInterval     = 15 &lt;/P&gt;&lt;P&gt; 17 - WantFrag             = &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Address mapping&lt;/P&gt;&lt;P&gt;20005  *  *  10.70.75.140&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then I tried to telnet to 10.70.75.140 with two login failures. But there was no alarms in the logfile of sensor.&lt;/P&gt;&lt;P&gt;Is there something wrong?&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 17:59:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/custom-signature-to-detect-telnet-authentication-failure/m-p/13988#M6914</guid>
      <dc:creator>thanhlv</dc:creator>
      <dc:date>2020-02-21T17:59:31Z</dc:date>
    </item>
    <item>
      <title>Re: custom signature to detect telnet authentication failure</title>
      <link>https://community.cisco.com/t5/network-access-control/custom-signature-to-detect-telnet-authentication-failure/m-p/13989#M6915</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can use the ATOMIC.TCP engine to write three different kinds of telnet&lt;/P&gt;&lt;P&gt;login failures.  The STRING.TCP sigs will count MinHits only on one TCP stream (connection) and will not catch repeated login failures across different&lt;/P&gt;&lt;P&gt;connections.  With ATOMIC.TCP, you can set the StorageKey parameter to one of DUAL, DST, or SRC.  These will give you alarms when there are multiple failures: between two hosts (DUAL), to a server (SRC), or from a client (DST).&lt;/P&gt;&lt;P&gt;I have tested the following DUAL signature tonight:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;AlarmInterval 60&lt;/P&gt;&lt;P&gt;AlarmThrottle FireAll&lt;/P&gt;&lt;P&gt;ChokeThreshold ANY &lt;/P&gt;&lt;P&gt;Mask ACK&lt;/P&gt;&lt;P&gt;MinHits 3&lt;/P&gt;&lt;P&gt;SigName 3 telnet login failures between 2 hosts in less than 60 seconds.&lt;/P&gt;&lt;P&gt;SinglePacketRegex [Ll]ogin incorrect&lt;/P&gt;&lt;P&gt;SrcPort 23&lt;/P&gt;&lt;P&gt;StorageKey DUAL&lt;/P&gt;&lt;P&gt;TcpFlags ACK&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Note that when using SigWizMenu, you can either put the value ANY for ChokeThreshold, or choose to 'delete' its value.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The AlarmInterval value is the number of seconds it will count for login failures.&lt;/P&gt;&lt;P&gt;If the count reaches MinHits, the alarm will be fired.  Change this value if you want to count for a longer or shorter time for failures.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You may want to make 3 separate signatures, one DUAL as above, and&lt;/P&gt;&lt;P&gt;the others StorageKey SRC and StorageKey DST if you want to experiment with the different counting techniques.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your STRING.TCP signature was close, but needed a RegexString of&lt;/P&gt;&lt;P&gt;[Ll]ogin incorrect and Direction FromService (because the match happens on the server's failure response.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You also may want to check the "Login incorrect" response on the servers you&lt;/P&gt;&lt;P&gt;are protecting and make sure it doesn't use a different response string.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let us know how it goes,&lt;/P&gt;&lt;P&gt;-JK&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 12 Apr 2002 05:19:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/custom-signature-to-detect-telnet-authentication-failure/m-p/13989#M6915</guid>
      <dc:creator>jakasper</dc:creator>
      <dc:date>2002-04-12T05:19:11Z</dc:date>
    </item>
    <item>
      <title>Re: custom signature to detect telnet authentication failure</title>
      <link>https://community.cisco.com/t5/network-access-control/custom-signature-to-detect-telnet-authentication-failure/m-p/13990#M6916</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you very much for your clear explanations  the difference between STRING.TCP engine and  ATOMIC.TCP engine. It helps me a lot.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But I don'nt know if there is any difference between the version of the Sensor that I and you are using.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I created a new custom signature belonging to ATOMIC.TCP engine, there were  no parameters: StorageKey, RegexString and SourcePort. I am using Sensor 4210 ver 3.0(1)S4 and Unix Director 2.2.3.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Using  the nrConfigure, there is a place for me to add a new RegexString. I added a new RegexString with some parameters as Mr Jakasper directed:&lt;/P&gt;&lt;P&gt;-String: [Ll]ogin incorrect&lt;/P&gt;&lt;P&gt;-Occurrences:3&lt;/P&gt;&lt;P&gt;-Port: 23&lt;/P&gt;&lt;P&gt;-Direction: To &amp;amp;From&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then when I tried to telnet to a machine with 3 times failure,  I found an alarm in the log file in Sensor indicating this event.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I wonder why  a signature in the ATOMIC.TCP does not has the parameter specifying ServicePorts?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Besides that  there is no place for me to tell a particular RegexString just fires on a specific machine, not all in the protected network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 12 Apr 2002 09:14:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/custom-signature-to-detect-telnet-authentication-failure/m-p/13990#M6916</guid>
      <dc:creator>thanhlv</dc:creator>
      <dc:date>2002-04-12T09:14:07Z</dc:date>
    </item>
    <item>
      <title>Re: custom signature to detect telnet authentication failure</title>
      <link>https://community.cisco.com/t5/network-access-control/custom-signature-to-detect-telnet-authentication-failure/m-p/13991#M6917</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Your sensor version is the first 3.0 release.  You will need to update to&lt;/P&gt;&lt;P&gt;get the latest signatures and get the enhancements to ATOMIC.TCP&lt;/P&gt;&lt;P&gt;which include the SinglePacketRegex parameter.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Typically, you will want to watch for the notification about the Signature Update and Service Pack releases because the new signature sets will give you better intrusion coverage and the service packs fix bugs and give you new features.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The "string match" signature for this is good, but it does not count the failed&lt;/P&gt;&lt;P&gt;logins across different connections.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Good luck,&lt;/P&gt;&lt;P&gt;-JK&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 12 Apr 2002 13:46:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/custom-signature-to-detect-telnet-authentication-failure/m-p/13991#M6917</guid>
      <dc:creator>jakasper</dc:creator>
      <dc:date>2002-04-12T13:46:24Z</dc:date>
    </item>
  </channel>
</rss>

