• Youtube Performance Issues

    3
    0 Votes
    3 Posts
    2k Views
    O
    Thanks for the reply, with blocking turned off everything started working great a couple of hours after. I will continue to tweak to get it right eventually.
  • No Alert Explanation in Snort

    7
    0 Votes
    7 Posts
    2k Views
    bmeeksB
    No, those are not the files.  The one with "u2" in the name is a Barnyard2 Unified Log file.  Those are binary.  The filename should be "alert".  Try stopping and restarting Snort. Bill
  • Can't uninstall/reinstall/upgrade snort 2.9.7.2 pkg v3.2.4

    6
    0 Votes
    6 Posts
    2k Views
    bmeeksB
    It is strange the file disappeared.  Glad you got the problem sorted out. Bill
  • Blacklisting hosts which attempt to communicate with a closed port

    7
    0 Votes
    7 Posts
    2k Views
    bmeeksB
    No, there is no way to put Aliases in the template.  At the time the template is being read/used by the code, all Aliases have already been de-referenced into their actual string values.  In other words, they are no longer "aliases" at that point. You will have to put them as straight strings just as if you were using Snort on a plain FreeBSD box with no GUI. Bill
  • Suricata Alerts

    2
    0 Votes
    2 Posts
    1k Views
    BBcan177B
    These are typically noisy rules that can be disabled.
  • Snort updated?

    4
    0 Votes
    4 Posts
    1k Views
    bmeeksB
    Thanks BBcan177.  I came back to post that link, but you beat me to it… :D.  Apparently the pfSense Team is doing some house cleaning related to how packages are versioned.  They decided to drop the binary version tag and just show the GUI package tag.  The actual Snort package is not updated.  Only the tags in the Package Repository have been edited, and that makes the package manager in the firewall "think" a new version is posted. Bill
  • Barnyard2 mysql connections failed into pfSense 2.2

    6
    0 Votes
    6 Posts
    2k Views
    bmeeksB
    Glad you got it sorted out, and thanks for the feedback!  It may help others who encounter the same problem. Bill
  • Any plans for Snort to support FQDN aliases?

    18
    0 Votes
    18 Posts
    6k Views
    bmeeksB
    @Ruddimaster: Hi Bill, thanks for your reply. so in that case, I'm not able to protect my web server, if my costumer (web designer) use a dynamic Internet access, because they work intensive on that machine and therefore rapidly blocked. Or is there a work around? Dirk Is there a specific rule that is firing?  If so, just suppress the alert or even disable the rule.  You can even do that for multiple rules if you determine they are false positives.  If the rules are firing on actual threats, then it's a good thing the customers are blocked… ;). I am going to guess that you are probably seeing alerts from the HTTP_INSPECT preprocessor since you mentioned a web server.  Many of those rules will false positive with today's web content.  They enforce a very rigid adherence to all the RFCs, and unfortunately lots of web content today does not always strictly adhere to the RFCs. Bill
  • Suricata Pfsense 2.2.2

    2
    0 Votes
    2 Posts
    1k Views
    bmeeksB
    @ghkrauss: Gentlemen: A heads up with respect to Suricata. I have Suricata the most current verison (Pfsense Package List) installed. It does not seem to run correctly with Pfsense 2.2.2. It installs, updates, a shows to be running but registers no alerts in a period of hours. We have a 100 M/s fiber connect so there is more than ample traffic. I reverted to Pfsense 2.2 and apparent normal operation returns. I have and additional question. When using Pfsense 2.2 and Suricata the following alerts are produced SURICATA STREAM ESTABLISHED retransmission packet before last ack Show I add these to a suppress list? What caused this repeating messages? Can I fix this issue? Thanks for any help G. Howard Krauss That alert is from the Suricata stream processor.  You will the triggering rule and many others in the stream-events.rules file (look on the CATEGORIES tab and then select stream-events in the drop-down).  You can disable that rule and any others that you consider false positives or noise.  Suricata is extraordinarily chatty with these stream alerts. Bill
  • 2.2.1 -> 2.2.2 upgrade Broke my Suricata

    4
    0 Votes
    4 Posts
    1k Views
    J
    Full install, virtual on hyperv 2012 r2, HD with 20+ GB free space. Not a huge deal, I am getting pretty good at rebuilding after things get wonky after upgrades - has happened 3 times in past 12 months (different things each time). Am back in business now. Gave me an excuse to clean a few leftovers out of the config file too. Since no one else is reporting 2.2.2 breaking suricata, it must have been something specific to my install…
  • Using Barnyard2 Functionnality to suricata

    2
    0 Votes
    2 Posts
    2k Views
    bmeeksB
    @Azgarech: Hello, I am looking to send the suricata log to snorby. To do so I need to activate barnyard functionnality. I went to Suricata: Interface LAN - Barnyard2 Settings I did let the default option checks and add my mysql informations. and enabled Barnyard2. Then I did restart suricata service. (after restarting only the interface didn't work) . The logo with the red cross is always here close to barnyard in the interfaces information. I click on it still don't want to start. Here are the logs from the system logs: Apr 17 13:19:37 barnyard2[82555]: Suppressed: 0 (0.000%) Apr 17 13:19:37 barnyard2[82555]: =============================================================================== Apr 17 13:19:37 barnyard2[82555]: Packet breakdown by protocol (includes rebuilt packets): Apr 17 13:19:37 barnyard2[82555]: ETH: 0 (0.000%) Apr 17 13:19:37 barnyard2[82555]: ETHdisc: 0 (0.000%) Apr 17 13:19:37 barnyard2[82555]: VLAN: 0 (0.000%) Apr 17 13:19:37 barnyard2[82555]: IPV6: 0 (0.000%) Apr 17 13:19:37 barnyard2[82555]: IP6 EXT: 0 (0.000%) Apr 17 13:19:37 barnyard2[82555]: IP6opts: 0 (0.000%) Apr 17 13:19:37 barnyard2[82555]: IP6disc: 0 (0.000%) Apr 17 13:19:37 barnyard2[82555]: IP4: 0 (0.000%) Apr 17 13:19:37 barnyard2[82555]: IP4disc: 0 (0.000%) Apr 17 13:19:37 barnyard2[82555]: TCP 6: 0 (0.000%) Apr 17 13:19:37 barnyard2[82555]: UDP 6: 0 (0.000%) Apr 17 13:19:37 barnyard2[82555]: ICMP6: 0 (0.000%) Apr 17 13:19:37 barnyard2[82555]: ICMP-IP: 0 (0.000%) Apr 17 13:19:37 barnyard2[82555]: TCP: 0 (0.000%) Apr 17 13:19:37 barnyard2[82555]: UDP: 0 (0.000%) Apr 17 13:19:37 barnyard2[82555]: ICMP: 0 (0.000%) Apr 17 13:19:37 barnyard2[82555]: TCPdisc: 0 (0.000%) Apr 17 13:19:37 barnyard2[82555]: UDPdisc: 0 (0.000%) Apr 17 13:19:37 barnyard2[82555]: ICMPdis: 0 (0.000%) Apr 17 13:19:37 barnyard2[82555]: FRAG: 0 (0.000%) Apr 17 13:19:37 barnyard2[82555]: FRAG 6: 0 (0.000%) Apr 17 13:19:37 barnyard2[82555]: ARP: 0 (0.000%) Apr 17 13:19:37 barnyard2[82555]: EAPOL: 0 (0.000%) Apr 17 13:19:37 barnyard2[82555]: ETHLOOP: 0 (0.000%) Apr 17 13:19:37 barnyard2[82555]: IPX: 0 (0.000%) Apr 17 13:19:37 barnyard2[82555]: IPv4/IPv4: 0 (0.000%) Apr 17 13:19:37 barnyard2[82555]: IPv4/IPv6: 0 (0.000%) Apr 17 13:19:37 barnyard2[82555]: IPv6/IPv4: 0 (0.000%) Apr 17 13:19:37 barnyard2[82555]: IPv6/IPv6: 0 (0.000%) Apr 17 13:19:37 barnyard2[82555]: GRE: 0 (0.000%) Apr 17 13:19:37 barnyard2[82555]: GRE ETH: 0 (0.000%) Apr 17 13:19:37 barnyard2[82555]: GRE VLAN: 0 (0.000%) Apr 17 13:19:37 barnyard2[82555]: GRE IPv4: 0 (0.000%) Apr 17 13:19:37 barnyard2[82555]: GRE IPv6: 0 (0.000%) Apr 17 13:19:37 barnyard2[82555]: GRE IP6 E: 0 (0.000%) Apr 17 13:19:37 barnyard2[82555]: GRE PPTP: 0 (0.000%) Apr 17 13:19:37 barnyard2[82555]: GRE ARP: 0 (0.000%) Apr 17 13:19:37 barnyard2[82555]: GRE IPX: 0 (0.000%) Apr 17 13:19:37 barnyard2[82555]: GRE LOOP: 0 (0.000%) Apr 17 13:19:37 barnyard2[82555]: MPLS: 0 (0.000%) Apr 17 13:19:37 barnyard2[82555]: OTHER: 0 (0.000%) Apr 17 13:19:37 barnyard2[82555]: DISCARD: 0 (0.000%) Apr 17 13:19:37 barnyard2[82555]: InvChkSum: 0 (0.000%) Apr 17 13:19:37 barnyard2[82555]: S5 G 1: 0 (0.000%) Apr 17 13:19:37 barnyard2[82555]: S5 G 2: 0 (0.000%) Apr 17 13:19:37 barnyard2[82555]: Total: 0 Apr 17 13:19:37 barnyard2[82555]: =============================================================================== can you help me with it ? EDIT: Apparently Barnyard2 don't even go to the database login You may need to enable the viewing of more log entries.  The snippet you posted is Barnyard2 shutting down.  If you display more log entries, you may seen the error thrown by Barnyard2.  My guess is that database login is failing or it is not finding the specified host.  Many users, including me, are using the Barnyard2 feature to feed Snorby and it works. Bill
  • Snort or config causing upload timeouts

    4
    0 Votes
    4 Posts
    1k Views
    bmeeksB
    Snort is a real stickler for requiring adherence to all the RFCs for web servers.  If a site's server deviates one little bit, the HTTP_INSPECT processor in Snort will pounce… ;D. Glad you found it.  You can either suppress that alert or disable that rule entirely.  There are a number of those HTTP_INSPECT rules that will false positive. Bill
  • Suricata tls.store Logs Mgmt

    5
    0 Votes
    5 Posts
    2k Views
    bmeeksB
    Sorry it took a little longer than I anticipated, but I did finally get around to replicating the problem and will have the fix in the next Suricata update.  I'm hoping that won't be too far in the future.  I'm waiting for FreeBSD ports to update to the 2.0.7 release.  If that continues to drag out, then I will just post a separate GUI package update to fix this log management problem. Bill
  • Snort item gone from Services

    3
    0 Votes
    3 Posts
    897 Views
    bmeeksB
    Do as @Supermule says, and also be sure you wait on the package installation screen until you see it print a text message that says something like "…package installation completed...".  I don't remember the exact wording, but if you leave the package installation screen to quickly, the last part of the install will not complete and Snort will be missing from the SERVICES menu. Second possibility is a NanoBSD install with not enough free space on the /tmp partition.  If you are running a Nano install, first manually increase the /tmp partition to 100 MB (the default is 40 MB) before trying to reinstall Snort. Bill
  • All who have Snort at PFsense 2.03 working - please share working config

    1
    0 Votes
    1 Posts
    697 Views
    No one has replied
  • IDS monitoring of PKI certificate usage

    7
    0 Votes
    7 Posts
    2k Views
    F
    Hey guys, Found this while working on some rules; https://github.com/inliniac/suricata/tree/master/contrib/file_processor This directory contains what's needed for reading the JSON file /var/log/suricata/files-json.log and processing those entries against plugins.  Included are plugins for checking the MD5 of the observed file on the network against already created reports on anubis.iseclab.org, malwr.com, and threatexpert.com.  If you have a virustotal.com API key (free, though see the terms of use on virustotal.com/documentation/public-api/), you can enable the virustotal.com plugin and configure your API key so you can check the MD5 against over forty AV vendors' results. F.
  • L2TP/IPsec and Snort CPU utilization

    3
    0 Votes
    3 Posts
    999 Views
    M
    @bmeeks: The CPU utilization problem is more likely caused by the IPsec decryption of that video stream.  Snort can't decrypt that traffic to actually look at it. Isn't that what I said? LOL @bmeeks: Snort puts your WAN interface into promiscuous mode, so it will then see any traffic crossing the interface.  With NAT, I prefer to run Snort on the LAN.  That might help in your case, but it depends on your network and what you are protecting behind the various interfaces. Ahh, that makes sense. I might try that. @bmeeks: When you have this spiking problem, have you tried stopping Snort and seeing what happens to CPU utilization then? Sure, the "snort" process in `top' that shows 90% CPU utilization goes away. As one might expect.  :P
  • Snort modify rules

    4
    0 Votes
    4 Posts
    3k Views
    M
    thanks a lot guys! The custom rule solution works perfect for me.
  • Snort paid rules configuration

    5
    0 Votes
    5 Posts
    3k Views
    bmeeksB
    @dgall: Thanks for the answers!!! One last question is there a way to see when you updated if the rules are free or paid subscription ? When I log at the view the MANAGE RULE SET LOG I cant see anything that shows that the rules are paid or not. Its probably there but I do not see it. No, you can't tell because the file names from the VRT web site are identical.  Your Oinkcode is read by the VRT rules download server and it decides which package of rules to send down to you.  It gets them from one of two directories depending on "paid" or "free" subscription.  There is nothing you need to do on your end other than disabling the Snort GPLv2 Community Rules if you were using those.  They are already bundled into the paid VRT rules. Bill
  • Snort manual install

    4
    0 Votes
    4 Posts
    2k Views
    bmeeksB
    Manual installation along with having the GUI interface hooks into pfSense is extremely hard to do.  It requires hand-editing a number of critical files.  However, even if you did that, the new Snort PHP files won't run on 2.0.3 pfSense because they call and use system features that are only available in pfSense 2.1.x and higher. So the short answer is you can't have the GUI with the current Snort PHP package on pfSense versions prior to 2.1.x.  You can manually download and install the old *.tbz package, but you will need to use Snort exclusively from the CLI (command line) like you would if you installed it on a plain-vanilla FreeBSD 8.1 machine.  You will have to create the snort.conf file by hand, download rules by hand, and start-stop Snort from the command-line. Bill
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.