<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: 5829-0 false positives in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/5829-0-false-positives/m-p/642230#M87954</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We're looking into this issue. Would it be possible to provide a verbose alert for this signature? The signature is designed to detect ssl v3 packets in which the size does not match up with the declared ssl field sizes; I'll need more of the packet to verify the problem.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 22 Dec 2006 17:58:40 GMT</pubDate>
    <dc:creator>craiwill</dc:creator>
    <dc:date>2006-12-22T17:58:40Z</dc:date>
    <item>
      <title>5829-0 false positives</title>
      <link>https://community.cisco.com/t5/network-security/5829-0-false-positives/m-p/642229#M87952</link>
      <description>&lt;P&gt;Outbound Internet traffic through our HTTP proxy is triggering this sig. below is a trigger packet. We've seen about 50 of these in the last 2 hours.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;evIdsAlert: eventId=1152199463829252123  vendor=Cisco  severity=medium  &lt;/P&gt;&lt;P&gt;  originator:   &lt;/P&gt;&lt;P&gt;    hostId: hostname  &lt;/P&gt;&lt;P&gt;    appName: sensorApp  &lt;/P&gt;&lt;P&gt;    appInstanceId: 20616  &lt;/P&gt;&lt;P&gt;  time: December 22, 2006 3:32:53 PM UTC  offset=-360  timeZone=GMT-06:00  &lt;/P&gt;&lt;P&gt;  signature:   description=Microsoft SSL DoS  id=5829  version=S263  &lt;/P&gt;&lt;P&gt;    subsigId: 0  &lt;/P&gt;&lt;P&gt;    sigDetails: Microsoft SSL DoS  &lt;/P&gt;&lt;P&gt;  interfaceGroup:   &lt;/P&gt;&lt;P&gt;  vlan: 0  &lt;/P&gt;&lt;P&gt;  participants:   &lt;/P&gt;&lt;P&gt;    attacker:   &lt;/P&gt;&lt;P&gt;      addr: 192.168.1.1  locality=PROXY_EXT_IP  &lt;/P&gt;&lt;P&gt;      port: 50439  &lt;/P&gt;&lt;P&gt;    target:   &lt;/P&gt;&lt;P&gt;      addr: 208.215.237.156  locality=ANY  &lt;/P&gt;&lt;P&gt;      port: 443  &lt;/P&gt;&lt;P&gt;  triggerPacket: &lt;/P&gt;&lt;P&gt;000000  00 00 5E 00 01 65 00 17  0F 0B 17 00 08 00 45 00  ..^..e........E.&lt;/P&gt;&lt;P&gt;000010  00 71 83 92 40 00 3F 06  67 55 CE C3 C3 67 D0 D7  .q..@.?.gU...g..&lt;/P&gt;&lt;P&gt;000020  ED 9C C5 07 01 BB 51 7F  93 2C 30 66 D8 1D 80 18  ......Q..,0f....&lt;/P&gt;&lt;P&gt;000030  44 70 68 88 00 00 01 01  08 0A 45 10 90 67 1F 48  Dph.......E..g.H&lt;/P&gt;&lt;P&gt;000040  C5 13 16 03 00 00 38 01  9D CB 06 99 C9 F4 94 F9  ......8.........&lt;/P&gt;&lt;P&gt;000050  ED 54 42 F3 19 73 FC F8  BA F1 A5 0B B1 AD 02 C6  .TB..s..........&lt;/P&gt;&lt;P&gt;000060  F4 FD AF 26 71 66 2B 5B  A2 05 97 91 4A 22 CF E9  ...&amp;amp;qf+[....J"..&lt;/P&gt;&lt;P&gt;000070  78 74 13 AC 2B AB B8 54  C5 4E E0 6C CC 36 E8     xt..+..T.N.l.6.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;  riskRatingValue: 48  &lt;/P&gt;&lt;P&gt;  interface: ge0_0  &lt;/P&gt;&lt;P&gt;  protocol: tcp  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 10:23:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/5829-0-false-positives/m-p/642229#M87952</guid>
      <dc:creator>mhellman</dc:creator>
      <dc:date>2019-03-10T10:23:42Z</dc:date>
    </item>
    <item>
      <title>Re: 5829-0 false positives</title>
      <link>https://community.cisco.com/t5/network-security/5829-0-false-positives/m-p/642230#M87954</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We're looking into this issue. Would it be possible to provide a verbose alert for this signature? The signature is designed to detect ssl v3 packets in which the size does not match up with the declared ssl field sizes; I'll need more of the packet to verify the problem.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 22 Dec 2006 17:58:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/5829-0-false-positives/m-p/642230#M87954</guid>
      <dc:creator>craiwill</dc:creator>
      <dc:date>2006-12-22T17:58:40Z</dc:date>
    </item>
    <item>
      <title>Re: 5829-0 false positives</title>
      <link>https://community.cisco.com/t5/network-security/5829-0-false-positives/m-p/642231#M87956</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We're looking into this issue. Would it be possible to provide a verbose alert for this signature? The signature is designed to detect ssl v3 packets in which the size does not match up with the declared ssl field sizes; I'll need more of the packet to verify the problem.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 22 Dec 2006 18:13:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/5829-0-false-positives/m-p/642231#M87956</guid>
      <dc:creator>craiwill</dc:creator>
      <dc:date>2006-12-22T18:13:13Z</dc:date>
    </item>
  </channel>
</rss>

