• Snort OpenAppID RULES Detectors fail to download

    14
    0 Votes
    14 Posts
    2k Views
    B
    @bmeeks: @bimmerdriver: The system that is having the MD5 errors is running version 2.4.2. The system that is working properly is running the latest 2.4.3 snapshot. Is it possible a difference between the respective snort packages is the reason for the difference? There was an update to the Snort GUI a month or two back that updated the URL used for downloading the OpenAppID rules package.  Perhaps your older version is trying the older URL? The current Snort GUI package version is 3.2.9.6. Bill I updated the package and the problem is fixed. Thank you very much.
  • Suricata stopped logging on external IFs

    1
    0 Votes
    1 Posts
    298 Views
    No one has replied
  • Snort LAN Alert

    Moved
    18
    0 Votes
    18 Posts
    2k Views
    S
    There are no LAN alerts in snort alert tab. I've just left it as it is, everything is working just fine.
  • Suricata and odd behavior when changing certain rules

    5
    0 Votes
    5 Posts
    585 Views
    D
    @bmeeks: @drewsaur: THANK YOU! I completely missed that. That key point is hidden via the "i" icon. I think they should leave that information visible by default! Yeah, the default state of those "Information" icons is collapsed.  I think that was state was chosen in order to reduce clutter. Bill May I suggest that the text "Check the box beside an interface to immediately apply new auto-SID management changes and signal Suricata to live-load the new rules for the interface when clicking Save; otherwise only the new file assignments will be saved" be outside of the "info" icon? It seems essential to the UI and is non-obvious. The remainder of the text is certainly a candidate for the "i" icon :) Cheers!
  • Snort turning itself OFF

    Moved
    4
    0 Votes
    4 Posts
    702 Views
    G
    @bmeeks: @gryest: Hi I noticed Snort turned itself off past few days after rules update. Rules update success but found Snort is stopped??? Not good at all. I was OK before even if rules update failed, it's never stopped by itself. I ran Snort package update 2 day ago but it still doing that. Is anybody have same issue? What might be wrong or changed? Thanks. PS. i have Snort logs setup on local system (SSD) and checked log size option are limited. Log exceed memory should not be an issue. Have you looked back through your firewall's system log to see what, if any, messages might have been logged by Snort as it restarted from the rules update?  The most likely possibility is a rule syntax error of some sort with one of your enabled rules (or even a newly added rule).  Those happen from time to time as the rules are modified by the authors/vendors. Bill Yes, I did. Rules update happened 00:07. Before that Snort shows some ping IP ("Misc Attacks") Log Alerts. After 00:07 nothing until I restarted snort in the morning. No any records in the system log. I will check logs if it's happen again. Thanks.
  • Snort with RAM disk?

    Moved
    7
    0 Votes
    7 Posts
    2k Views
    D
    TL;DR:  "Why Not?"  :) A couple reasons, neither important: I am running snort for recreational reasons on a small appliance.  Getting it to work on a RAM disk kept me occupied for a few minutes. My "day job" is HPC systems at extreme scale.  In that environment most solutions are stateless root for reliability and performance reasons.  Those concerns probably bias how I approach recreational programming. I think you're correct about average SSD reliability being more than adequate for pfSense deployments. At large scale it's still something we worry about, and my pfSense box had enough RAM, so "why not".  As long as pfSense has the option, my OCD side says it should work regardless of which packages I select.  It did not, so I fixed it. Proper fix would probably be for the pfsense base to copy out all of /var/db rather than just /var/db/rrd.  The additional directories don't add much space.  Or stop providing the RAM disk option.  :)
  • See list of force-disabled rules?

    3
    0 Votes
    3 Posts
    400 Views
    N
    @bmeeks: @Nixus: Hi everyone, Is it possible to get a list of the force-disabled rules from [Force-disable this rule and remove it from current rules set.] in the Alerts tab? No, that is currently not an available feature.  It would make a good future enhancement, though.  I will put it on my TODO list for a future update. Bill Thanks! That would be a really nice feature! :)
  • Snort Package v3.2.9.6 - Release Notes

    5
    0 Votes
    5 Posts
    816 Views
    A
    Thanks, I did try that, and just tried it again as well.  I removed snort, manually removed the cached package, reinstalled.  I then updated the rules, created a LAN interface, and started it.  No other settings were changed and it crashed
  • 0 Votes
    2 Posts
    636 Views
    M
    Removed and reinstalled snort, issue is resolved. Perhaps a simple restart would have done the trick as well.
  • Suricata disablesid file

    1
    0 Votes
    1 Posts
    484 Views
    No one has replied
  • Upgrade Suricata 4.0.3

    25
    0 Votes
    25 Posts
    2k Views
    bmeeksB
    @The: Hi @bmeeks Thank you so much again for the explanation, I actually added Suricata to watchdog service after noticing this issue, but as you mentioned it doesn't really know how Suricata service work so I was noticing the CPU usage is much higher everytime I manually restart Suricata from the interface tab, I removed it from watchdog now. Thanks. I will fix the GUI issue with showing the status correctly on the INTERFACES tab.  Probably will be sometime next week, though, before I can get it put together and posted. Bill
  • Snort updates coming soon

    4
    0 Votes
    4 Posts
    764 Views
    bmeeksB
    @Beerman: Will it also fix the Problem with the "Host Attribute Table"? See: https://forum.pfsense.org/index.php?topic=135137.0 Thx! :) I will have to re-test and see. Bill
  • Unable to Update SNORT Rules

    3
    0 Votes
    3 Posts
    709 Views
    bmeeksB
    @Wroxc: OK seems like /tmp was full. Resolved my issue by increasing the /tmp size to 300MB since i have plenty of ram Yep, Snort and RAM disks are not friends!  I don't recommend that configuration, but if you do, make sure you have at least 300 MB configured for /tmp and the same or more for /var if that is also a RAM disk.  Snort downloads and extracts rule updates into /tmp, and all the logs are on /var. Bill
  • Snort 3.2.9.5_4 - Release Notes

    8
    0 Votes
    8 Posts
    1k Views
    S
    i too am having same issue. i will also wait to see if it resoles for itself
  • Snort VRT Not Dowloading -Snort VRT rules md5 download failed Error

    16
    0 Votes
    16 Posts
    7k Views
    bmeeksB
    @Bill: OK. Required a bit of extra shell action. After removing package, hunted down leftover bits in the filesystem. rm -rf /usr/local/etc/snort rm -rf /usr/local/lib/snort_dynamicrules rm /var/cache/pkg/*snort* Also grep'ed globally to find references to snort. In config.xml I found that it still had stuff about snort and there were two sqlite databases that contained references. I didn't bother with those, but I did open up config.xml and found all the basic setting properties in there. So removing doesn't really remove. That's not cool. But I left it there not wanting to break anything. I did notice that there was a space in front of my oinkcode though! :) When reinstalling the package, I made sure to remove that and when I did the update it went fine. You can remove Snort and have it clean up after itself.  The default is to "save settings" because most folks want to remove and reinstall or update the binary while keeping their existing configuration settings.  On the GLOBAL SETTINGS tab is a checkbox option to save settings when uninstalling the package.  The box is checked by default, but you can uncheck the box and when you remove Snort it will remove all traces of itself from the config.xml file.  That of course means any and all of your previous Snort configuration settings are gone. The directories you found are being left because of a bug in the uninstall code.  That should be fixed in the latetst package version.  The only exception would be if you manually modified any files in those directory trees. Bill
  • Wildcard Suppress list

    2
    0 Votes
    2 Posts
    592 Views
    bmeeksB
    No, I don't believe the binary supports text wildcards.  You can use very large network blocks by specifying a large subnet mask when you suppress by IP, but that trick does not work for text.  The only supported options for suppression are "by IP" and "by GID:SID". Bill
  • OpenAPPID can't found any app.

    5
    0 Votes
    5 Posts
    1k Views
    S
    akong, try adding the following custom rule. Change the sid value if it conflicts with any of your existing sid values. alert tcp $HOME_NET any -> $EXTERNAL_NET any (msg:"AnyDesk";flow:from_client;appid:anydesk; sid:1000055 ; classtype:misc-activity; rev:1;)
  • ET URL changed? => snort download error 404

    9
    0 Votes
    9 Posts
    1k Views
    bmeeksB
    @NogBadTheBad: Got a reply back from the ET guys :- it has slightly changed per https://marc.info/?l=emerging-sigs&m=151182236202050&w=2 … But what you are seeing looks to be a mistake. I've forwarded to the responsible party. The slight change in the URL linked by @NogTheBad will be included in the next Snort GUI update which should be out in a few days.  I had already made that change and tested over this past weekend, so I was a bit perplexed when the URL suddenly changed again and stopped working today …  ???.  Glad the ET guys got it fixed up. Bill
  • Use pfSense as an IPS

    3
    0 Votes
    3 Posts
    517 Views
    ivorI
    @senseii: Is there a way to use pfSense as an IPS. I set up as ISP Modem>pfSense as Firewall>Switch/LAN. I  use snort as an IDS on Security Onion port mirroring a couple computers. I'm wondering if it would be a good idea or makes sense to use a package to make pfSense an IPS. https://doc.pfsense.org/index.php/Main_Page Start there.
  • Suricata package version 4.0.3 – Release Notes

    1
    0 Votes
    1 Posts
    380 Views
    No one has replied
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.