The primary output facility in Bro is called a Notice. The Bro distribution includes a number of standard of Notices, listed below. The table contains the name of the Notice, what Bro policy file generates it, and a short description of what the Notice is about.
Notice Policy Description AckAboveHoleweird Could mean packet drop; could also be a faulty TCP implementation AddressDropIgnoredscan A request to drop connectivity has been ignored ; (scan detected, but one of these flags is true: !can_drop_connectivity, or never_shut_down, or never_drop_nets ) AddressDroppedscan Connectivity w/ given address has been dropped AddressScanscan The source has scanned a number of addrs BackscatterSeenscan Apparent flooding backscatter seen from source ClearToEncrypted_SSstepping A stepping stone was seen in which the first part of the chain is a clear-text connection but the second part is encrypted. This often means that a password or passphrase has been exposed in the clear, and may also mean that the user has an incomplete notion that their connection is protected from eavesdropping. ContentGapweird Data has sequence hole; perhaps due to filtering CountSignaturesignatures Signature has triggered multiple times for a destination DNS_MappingChangedDNS Some sort of change WRT previous Bro lookup DNS_PTR_Scandns Summary of a set of PTR lookups (automatically generated once/day when dns policy is loaded) DroppedPacketsnetstats Number of packets dropped as reported by the packet filter FTP_BadPortftp Bad format in PORT/PASV; FTP_ExcessiveFilenameftp Very long filename seen FTP_PrivPortftp Privileged port used in PORT/PASV FTP_Sensitiveftp Sensitive connection (as defined in hot) FTP_UnexpectedConnftp FTP data transfer from unexpected src HTTP_SensitiveURIhttp Sensitive URI in GET/POST/HEAD (default sensitive URIs defined http-request.bro; e.g.: /etc.*\/.*(passwd|shadow|netconfig) HotEmailRecipientsmtp Need Example.? default = NULL ICMPAsymPayloadicmp Payload in echo req-resp not the same ICMPConnectionPairicmp Too many ICMPs between hosts (default = 200) IdentSensitiveIDident Sensitive username in Ident lookup LocalWormworm Worm seen in local host (searches for code red 1, code red 2, nimda, slammer) LoginForbiddenButConfusedlogin Interactive login seen using forbidden username, but the analyzer was confused in following the login dialog, so may be in error. MultipleSigResponderssignatures host has triggered the same signature on multiple responders MultipleSignaturessignatures host has triggered many signatures Multiple SigResponderssignatures host has triggered the same signature on multiple responders OutboundTFTPtftp outbound TFTP seen PasswordGuessingscan source tried too many user/password combinations (default = 25) PortScanscan the source has scanned a number of ports RemoteWormworm worm seen in remote host ResolverInconsistencydns the answer returned by a DNS server differs from one previously returned ResourceSummaryprint-resources prints Bro resource usage RetransmissionInconsistencyweird possible evasion; usually just bad TCP implementation SSL_SessConInconssl session data not consistent with connection SSL_X509Violationssl blanket X509 error ScanSummaryscan a summary of scanning activity, output once / day SensitiveConnectionconn connection marked "hot", See: Reference Manual section on hot ids for more information. SensitiveDNS_Lookupdns DNS lookup of sensitive hostname/addr; default list of sensitive hosts = NULL (what is an example of a sensitive host?) SensitiveLoginlogin interactive login using sensitive username (defined in 'hot') SensitivePortmapperAccessportmapper the given combination of the service looked up via the pormapper, the host requesting the lookup, and the host from which it's requiesting it is deemed sensitive SensitiveSignaturesignatures generic for alarm-worthy SensitiveUsernameInPasswordlogin During a login dialog, a sensitive username (e.g., "rewt") was seen in the user's password. This is reported as a notice because it could be that the login analyzer didn't track the authentication dialog correctly, and in fact what it thinks is the user's password is instead the user's username. SignatureSummarysignatures summarize number of times a host triggered a signature (default = 1/day) SynFloodEndsynflood end of syn-flood against a certain victim. A syn-flood is defined to be more than SYNFLOOD_THRESHOLD (default = 15000) new connections have been reported within the last SYNFLOOD_INTERVAL (default = 60 seconds) for a certain IP. SynFloodStartsynflood start of syn-flood against a certain victim SynFloodStatussynflood report of ongoing syn-flood TRWAddressScantrw source flagged as scanner by TRW algorithm TRWScanSummarytrw summary of scanning activities reported by TRW TerminatingConnectionconn "rst" command sent to connection origin, connection terminated, triggered in the following policies: ftp and login: forbidden user id, hot (connection from host with spoofed IP address?) W32B_SourceLocalblaster report a local W32.Blaster-infected host W32B_SourceRemoteblaster report a remote W32.Blaster-infected host WeirdActivityWeird generic unusual, alarm-worthy activity