<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic HTTP engine and strange behavior in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/http-engine-and-strange-behavior/m-p/527558#M94891</link>
    <description>&lt;P&gt;Over the last few months I've noticed some strange behavior in a few of the HTTP engine sigs.  false positives and no indication in the alarm or even in a trace as to why it triggered.  Which sucks of course because all I do anymore is chase down false positives...I don't need false positives that don't even match the signature.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For the HTTP engine, if there are multiple regex strings do all of them have to be matched [in a single HTTP request] for the alarm to fire? I was told at one time they did.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I created a custom sig with this engine with the following regex:&lt;/P&gt;&lt;P&gt;Specify URI Regex: [/\\][Ss][Ee][Aa][Rr][Cc][Hh]&lt;/P&gt;&lt;P&gt;Request Regex: helloregexthello&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I watched the sensor for a few minutes and this alarm was not firing.  Then I removed the signature and applied the config.  DOH!  Now I see 100+ alarms for this signature. Can someone from Cisco explain this? Here is an example of the alarm:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;evIdsAlert: eventId=1135938634516778912  vendor=Cisco  severity=medium  &lt;/P&gt;&lt;P&gt;  originator:   &lt;/P&gt;&lt;P&gt;    hostId: 27-fw-dmz-c1  &lt;/P&gt;&lt;P&gt;    appName: sensorApp  &lt;/P&gt;&lt;P&gt;    appInstanceId: 346  &lt;/P&gt;&lt;P&gt;  time: February 24, 2006 4:22:15 PM UTC  offset=-360  timeZone=GMT-06:00  &lt;/P&gt;&lt;P&gt;  signature:   description=My Sig  id=60001  version=custom  &lt;/P&gt;&lt;P&gt;    subsigId: 0  &lt;/P&gt;&lt;P&gt;    sigDetails: My Sig Info  &lt;/P&gt;&lt;P&gt;  interfaceGroup:   &lt;/P&gt;&lt;P&gt;  vlan: 0  &lt;/P&gt;&lt;P&gt;  participants:   &lt;/P&gt;&lt;P&gt;    attacker:   &lt;/P&gt;&lt;P&gt;      addr: 206.195.195.101  locality=NETCACHE_EXT_IP  &lt;/P&gt;&lt;P&gt;      port: 35786  &lt;/P&gt;&lt;P&gt;    target:   &lt;/P&gt;&lt;P&gt;      addr: 72.14.203.104  locality=ANY  &lt;/P&gt;&lt;P&gt;      port: 80  &lt;/P&gt;&lt;P&gt;  context:   &lt;/P&gt;&lt;P&gt;    fromAttacker: &lt;/P&gt;&lt;P&gt;000000  47 45 54 20 2F 73 65 61  72 63 68 3F 68 6C 3D 65  GET /search?hl=e&lt;/P&gt;&lt;P&gt;000010  6E 26 71 3D 44 4F 4E 45  4C 53 4F 4E 2B 53 57 41  n&amp;amp;q=DONELSON+SWA&lt;/P&gt;&lt;P&gt;000020  50 2B 4D 45 45 54 26 73  70 65 6C 6C 3D 31 20 48  P+MEET&amp;amp;spell=1 H&lt;/P&gt;&lt;P&gt;000030  54 54 50 2F 31 2E 31 0D                           TTP/1.1.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;  riskRatingValue: 56  &lt;/P&gt;&lt;P&gt;  interface: ge0_0  &lt;/P&gt;&lt;P&gt;  protocol: tcp &lt;/P&gt;</description>
    <pubDate>Sun, 10 Mar 2019 09:54:25 GMT</pubDate>
    <dc:creator>mhellman</dc:creator>
    <dc:date>2019-03-10T09:54:25Z</dc:date>
    <item>
      <title>HTTP engine and strange behavior</title>
      <link>https://community.cisco.com/t5/network-security/http-engine-and-strange-behavior/m-p/527558#M94891</link>
      <description>&lt;P&gt;Over the last few months I've noticed some strange behavior in a few of the HTTP engine sigs.  false positives and no indication in the alarm or even in a trace as to why it triggered.  Which sucks of course because all I do anymore is chase down false positives...I don't need false positives that don't even match the signature.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For the HTTP engine, if there are multiple regex strings do all of them have to be matched [in a single HTTP request] for the alarm to fire? I was told at one time they did.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I created a custom sig with this engine with the following regex:&lt;/P&gt;&lt;P&gt;Specify URI Regex: [/\\][Ss][Ee][Aa][Rr][Cc][Hh]&lt;/P&gt;&lt;P&gt;Request Regex: helloregexthello&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I watched the sensor for a few minutes and this alarm was not firing.  Then I removed the signature and applied the config.  DOH!  Now I see 100+ alarms for this signature. Can someone from Cisco explain this? Here is an example of the alarm:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;evIdsAlert: eventId=1135938634516778912  vendor=Cisco  severity=medium  &lt;/P&gt;&lt;P&gt;  originator:   &lt;/P&gt;&lt;P&gt;    hostId: 27-fw-dmz-c1  &lt;/P&gt;&lt;P&gt;    appName: sensorApp  &lt;/P&gt;&lt;P&gt;    appInstanceId: 346  &lt;/P&gt;&lt;P&gt;  time: February 24, 2006 4:22:15 PM UTC  offset=-360  timeZone=GMT-06:00  &lt;/P&gt;&lt;P&gt;  signature:   description=My Sig  id=60001  version=custom  &lt;/P&gt;&lt;P&gt;    subsigId: 0  &lt;/P&gt;&lt;P&gt;    sigDetails: My Sig Info  &lt;/P&gt;&lt;P&gt;  interfaceGroup:   &lt;/P&gt;&lt;P&gt;  vlan: 0  &lt;/P&gt;&lt;P&gt;  participants:   &lt;/P&gt;&lt;P&gt;    attacker:   &lt;/P&gt;&lt;P&gt;      addr: 206.195.195.101  locality=NETCACHE_EXT_IP  &lt;/P&gt;&lt;P&gt;      port: 35786  &lt;/P&gt;&lt;P&gt;    target:   &lt;/P&gt;&lt;P&gt;      addr: 72.14.203.104  locality=ANY  &lt;/P&gt;&lt;P&gt;      port: 80  &lt;/P&gt;&lt;P&gt;  context:   &lt;/P&gt;&lt;P&gt;    fromAttacker: &lt;/P&gt;&lt;P&gt;000000  47 45 54 20 2F 73 65 61  72 63 68 3F 68 6C 3D 65  GET /search?hl=e&lt;/P&gt;&lt;P&gt;000010  6E 26 71 3D 44 4F 4E 45  4C 53 4F 4E 2B 53 57 41  n&amp;amp;q=DONELSON+SWA&lt;/P&gt;&lt;P&gt;000020  50 2B 4D 45 45 54 26 73  70 65 6C 6C 3D 31 20 48  P+MEET&amp;amp;spell=1 H&lt;/P&gt;&lt;P&gt;000030  54 54 50 2F 31 2E 31 0D                           TTP/1.1.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;  riskRatingValue: 56  &lt;/P&gt;&lt;P&gt;  interface: ge0_0  &lt;/P&gt;&lt;P&gt;  protocol: tcp &lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 09:54:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/http-engine-and-strange-behavior/m-p/527558#M94891</guid>
      <dc:creator>mhellman</dc:creator>
      <dc:date>2019-03-10T09:54:25Z</dc:date>
    </item>
    <item>
      <title>Re: HTTP engine and strange behavior</title>
      <link>https://community.cisco.com/t5/network-security/http-engine-and-strange-behavior/m-p/527559#M94894</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If there are multiple regexes in a signature, they all have to be matched for the signature to fire. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Even if a signature is deleted, its config is not deleted immediately in the sensor. Any traffic that started before the signature was deleted may still reference the old config. If you start a new traffic session, you should not see the signature fire. Are you seeing the signature trigger in this case?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I may not be able to give any explanation as to why the signature did not fire before, other than that the regexes in the signature might not have matched. If you could give us the pcap that you used, the dev team will test it and let you know.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 24 Feb 2006 22:37:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/http-engine-and-strange-behavior/m-p/527559#M94894</guid>
      <dc:creator>rupadras</dc:creator>
      <dc:date>2006-02-24T22:37:36Z</dc:date>
    </item>
    <item>
      <title>Re: HTTP engine and strange behavior</title>
      <link>https://community.cisco.com/t5/network-security/http-engine-and-strange-behavior/m-p/527560#M94899</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This signature should have never fired at all.  I purposely chose a URI regex that was very common (/search) and a request regex that would never exist on the network (helloregexthello).  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It didn't fire until I applied a signature change...and then it fired many, MANY times.  In those alerts, the only thing that matched in the saved packet data was the URL regex (and they were search requests to google,yahoo,etc...almost all GET requests). To the untrained eye, this certainly suggests a problem with the way regex matching works when the process(es) stop and/or start.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 27 Feb 2006 19:17:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/http-engine-and-strange-behavior/m-p/527560#M94899</guid>
      <dc:creator>mhellman</dc:creator>
      <dc:date>2006-02-27T19:17:31Z</dc:date>
    </item>
    <item>
      <title>Re: HTTP engine and strange behavior</title>
      <link>https://community.cisco.com/t5/network-security/http-engine-and-strange-behavior/m-p/527561#M94903</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for bringing this to our attention. I will try to reprooduce the issue in the lab.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 27 Feb 2006 21:44:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/http-engine-and-strange-behavior/m-p/527561#M94903</guid>
      <dc:creator>bkubesh</dc:creator>
      <dc:date>2006-02-27T21:44:06Z</dc:date>
    </item>
  </channel>
</rss>

