• Snort behind an external firewall - Is there a need for Snort?

    6
    0 Votes
    6 Posts
    2k Views
    G
    @fsansfil: With everything going HTTPS these days a Bluecoat or squid with i-cap and sslbump is better for web filtering than an IPS. You might be better suited with a proxy. "So i am NOT complaining!" No harm, no offense; Its just me after working 12hrs in a row, doing suricata rules ;) F. I have the i-cap/clam anti-virus enabled in my squid3 config
  • Snort only runs ET rules, not Snort VRT

    5
    0 Votes
    5 Posts
    1k Views
    D
    2.1.5 is dead. Move on. No fixes will ever appear there.
  • Snort not starting after upgrade to 3.2.6

    12
    0 Votes
    12 Posts
    3k Views
    D
    As noted above - try without sync. (Hopefully gone everywhere again with 2.2.4.)
  • Why would a crawler coming from Google netblock show up as malevolent?

    2
    0 Votes
    2 Posts
    911 Views
    D
    Disable the broken rule. And while at it, disable 1:2015526, same idiocy.
  • Snort with OpenVPN Client uses 100% CPU

    3
    0 Votes
    3 Posts
    2k Views
    bmeeksB
    Using the ADVANCED PASS-THROUGH option would be the mechanism for using that config directive.  You will find that on the INTERFACE SETTINGS tab for the specific interface. Bill
  • Suricata randomly stops scanning interface

    4
    0 Votes
    4 Posts
    1k Views
    bmeeksB
    Swapping cables would be one thing to try.  It is possible that the libpcap library and the USB NIC don't play well together. Bill
  • BLACKLIST DNS rules question

    4
    0 Votes
    4 Posts
    1k Views
    D
    Well, the way to mass-disable rules is called SIG Mgmt.
  • Suricata Alerts

    2
    0 Votes
    2 Posts
    6k Views
    D
    Someone's pinging you… Some rules categories are just horrible idea to enable; icmp_info definitely among them.
  • Snort Package Update - 2.9.7.3 pkg v3.2.6

    5
    0 Votes
    5 Posts
    2k Views
    F
    Okey dokey, thanks for the clarification :)
  • SNORT blocks whitelisted IP's

    1
    0 Votes
    1 Posts
    707 Views
    No one has replied
  • A bug fix update for the Snort package GUI is coming soon…

    1
    0 Votes
    1 Posts
    552 Views
    No one has replied
  • Re: SNORT Exiting on sig 11

    3
    0 Votes
    3 Posts
    785 Views
    paulcdbP
    If your still having this problem edit your snort interface and check under your "WAN preprocs" that you don't have Application ID Detection enabled. Mine seems to have been enabled with the last update and just realised now.
  • Snort will not block sometimes.

    2
    0 Votes
    2 Posts
    558 Views
    F
    pfSense 2.1.* is no longer supported so you are running a really old version of Snort. Upgrade your pfSense and try again with the latest version of the package.
  • How do I show user/private IP not single, public IP

    5
    0 Votes
    5 Posts
    1k Views
    D
    If you want to see internal LAN IPs before NAT, you need to run on LAN as well.
  • Suricata package install hangs after PfSense reinstall

    11
    0 Votes
    11 Posts
    2k Views
    D
    Hmmm, WTF… There's something badly rotten with UFS.
  • [Request] Snort VRT categories list cleanup

    5
    0 Votes
    5 Posts
    1k Views
    bmeeksB
    @doktornotor: Excellents, thanks! Going to do the same for suricata as well? Yeah, I will port the same fixes/features in Snort over to Suricata.  The Suricata GUI code was cloned from Snort's anyway, so they share a ton of functions with identical code. Bill
  • Snort Widget Error Blowing up PHP_Errors.log

    3
    0 Votes
    3 Posts
    674 Views
    bmeeksB
    Scratch my earlier reply.  I forgot how my own code works …  :-[ The Widget code first verifies an alert log file exists for the interface, then it tails the configured number of entries from it and writes those "tailed" entries to a temp file in the [b]/tmp directory.  The code then verifies the temp file exists in /tmp and then opens it for reading.  The opening for reading is failing in your case, but the error says it's failing because the file does not exist.  However, before the open is attempted, a call is made to verify the file exists, so I really don't know what is going on in your case. I can add another layer of error-checking to the Widget code and will do so in the next update. Bill
  • Snort interrupts

    2
    0 Votes
    2 Posts
    751 Views
    bmeeksB
    Snort puts monitored interfaces into promiscuous mode.  This could, I suppose, generate a few more NIC interrupts as the card will be processing all packets instead of just packets sent to its MAC address. Bill
  • Snort raw rule downloads

    2
    0 Votes
    2 Posts
    865 Views
    bmeeksB
    The entire tarball is not saved (it is downloaded to and extracted in a folder under /tmp and then deleted).  However, the individual rules files (category files) extracted from the raw tarball are save here on the firewall:  /usr/pbi/snort-amd64/etc/snort/rules.  Change the amd64 to i386 if you have a 32-bit install. Bill
  • Snort stops by itself

    22
    0 Votes
    22 Posts
    9k Views
    I
    Thanks for the AC-BNFA-NQ this seems to help us here as well. I want to contribute something I observed and can reproduce: Situation HW (old PC) based pfSense in a branch office Win 2012 R2 U1 based pfSense in our DC Snort HW based is running stable with AC-NQ even though it has only 2 Cores and 8GB memory at all Hyper-V based is running on 12 Cores and 16GB memory, but Snort failed with AC-NQ, the AC-BNFA-NQ does the trick, now it can be not only activated (about 2minutes) faster on all interfaces, instead of one only, it now can be activated on all interfaces and it is running stable now for 3d, usually it turned itself off every 2h to 6h. A strange side effect on IPSec stability?  :o We reported https://redmine.pfsense.org/issues/4790 (Titel: Established IPSec Tunnel refused transporting further traffic out of sudden.. it than refuses any rule based traffic to anywhere!). Even though it should be impossible from my point of view, we observed that since the only configuration change on both tunnel ends is the Snort thing it seems to be an obvious side effect. This seems to be fixed now as well - and I find this is 'a bit' disturbing..
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.