• Snort/Barnyard2 doesn't update events in Snorby after upgrade

    8
    0 Votes
    8 Posts
    3k Views
    S
    Yes works like a charm
  • 0 Votes
    2 Posts
    762 Views
    bmeeksB
    They are simply Base64 encoded.  You can use one of several online tools to convert the string from encoded Base64 to plaintext. Here is one site I found using a quick Google search:  http://www.motobit.com/util/base64-decoder-encoder.asp. The string is Base64 encoded to avoid issues with any XML reserved characters.  You can copy it literally as-is from one config.xml to the other, or if you want to decode it and paste the plaintext into a new Snort GUI window, then use an online Base64 tool like the one I referenced. Bill
  • Suricata IPS policies vs default rules

    5
    0 Votes
    5 Posts
    3k Views
    T
    Hello, I had a closer look on these settings. Great !  :) Very good and impressive job. Thank you for your answers, Bill. Bye !
  • SNORT OpenAppID detectors package

    9
    0 Votes
    9 Posts
    10k Views
    F
    Been busy with Suricata lately, havent played with Snort in some time, but you are right. My fault. As of now you cant negate the appID part. But you can negate src, dst, ports as usual. For an example these rules would trigger; alert tcp $HOME_NET any -> $EXTERNAL_NET ![80,8080] (msg:"HTTP Port Unauthorized"; appid: http; classtype:policy-violation; sid:12171008; rev:1;) alert tcp $HOME_NET any -> $EXTERNAL_NET !443 (msg:"HTTPS Port Unauthorized"; appid: https; classtype:policy-violation; sid:12171009; rev:1;) appID is really a work in progress and its not voodoo magic, most of the detection script are just looking for cert, protocol, etc…but I guess thats why they made it Open, it will grow and refine itself pretty fast with the community. Cheers. F.
  • Snort VRT Rules not firing

    2
    0 Votes
    2 Posts
    953 Views
    bmeeksB
    You can always create some traffic of your own to trigger some of the Snort VRT rules as a test. You can see what rules are actually being enforced if you look in this file /usr/pbi/snort-amd64/etc/snort/snort__{uuid}__{if}/rules/snort.rules where {uuid} is a random number and {if} is the physical interface Snort is running on. The choices are grayed out when you choose a policy because the chosen policy dictates the rules selected.  If you want to overrule that, you can do so on the SID MGMT tab using the features there. Bill
  • Crash while trying to download Suricata logs

    4
    0 Votes
    4 Posts
    1k Views
    bmeeksB
    @jeffh: @bmeeks: The memory of the PHP process for Suricata is being exhausted.  That is currently hard-coded for 256 MB in the file /usr/local/pkg/suricata/suricata.inc.  You can edit that file and try bumping up the value. Thanks Bill. Do you happen to know if the Snort package has the same limitation? If so is manually bumping the memory of the PHP process for Snort an option too? Yes, both packages share a lot of the same code.  The parameter is set in the /usr/local/pkg/snort/snort.inc file for Snort. Bill
  • Snort/Barnyard2 will not connect to MySQL (Snorby) over IPsec Tunnel.

    4
    0 Votes
    4 Posts
    1k Views
    P
    OK I connected a tunnel from another pfSense box using 2.2.1-RELEASE and another using version 2.0.1-RELEASE ….I get the same result. I can ping from other computers on the remote LAN subnet to computers on the local LAN subnet but not from the pfSense boxes themselves. This should be an IPsec topic not a IDS/IPS topic.  I will start a new thread in the IPsec fourm.
  • Snort at home - WAN or LAN?

    5
    0 Votes
    5 Posts
    14k Views
    W
    @jeffh: In addition to what Bill said, what I do is run Snort on both WAN and LAN interfaces. On the LAN interface I have blocking disabled and quite a few rules enabled so I can get some visibility into what is happening on my network. On the WAN interface I have blocking enabled and only specific security related rules enabled. All rules that are running on the WAN (in blocking mode) are also running on the LAN (in alert mode). This allows me to block security threats, while still seeing what NAT'd local devices are having their traffic blocked, as well as alert on other rules that may not be security threats or that may have higher rates of false positives. This is the exact same thing that I do and it works great.  It does take a bit more memory and processing power, and a lot more if you're doing barnyard.  I ended up turning the barnyard push notifications off because of this…but with this combination, you get the blocking on the WAN and can then trace it to your internal LAN ip address.
  • Issue with - Install Snort VRT rules option

    6
    0 Votes
    6 Posts
    2k Views
    E
    I thought the same as I did find a reference to that while searching the forum. I changed the Web protocol to HTTP but that didn't help… I am not sure what it is.. I have 3 W8.1 machines that do the same thing. If I get some time I'll dig a little deeper. Yes I am very glad and thanks again for your help ...
  • Suricata Protocol Anomalies Detection

    1
    0 Votes
    1 Posts
    2k Views
    No one has replied
  • Snort - Could not find the libsf_imap_prepoc file

    3
    0 Votes
    3 Posts
    972 Views
    bmeeksB
    Thank you for this feedback.  There are some other posts in the Package forum where the advice for Nano users is to bump up the size of /tmp (and possibly /var) because the default partition sizes are too small to download and unzip the ever larger rules tarballs.  Unfortunately, today there is no mechanism within the pfSense Package Manager system for a package to specify prerequisites that must be satisfied in order for the package to be eligible for installation.  Some example parameters that would be useful are installed RAM and free disk space on critical partitions. As a general statement, Snort or Suricata on a NanoBSD install will require a lot of careful attention and quite possibly some customizations such as you describe of increasing the default partition size for /tmp and also /var. Bill
  • Snort: Emerging Threats MD5 fails

    4
    0 Votes
    4 Posts
    2k Views
    S
    I think it was blocking itself, actually.  Fixed.
  • Alerts Showing Up, BUT Got Nothing In The Blocked List…

    13
    0 Votes
    13 Posts
    2k Views
    ghostshellG
    set for SRC only @duck - where is the setting you are referring to, I see many preproc's since the upgrade when there was only 1
  • Routing multiple sites through a single pfSense running Snort/Suricata

    2
    0 Votes
    2 Posts
    731 Views
    bmeeksB
    Yes, if you put Snort or Suricata on the WAN interface of your main office, then the package would see all traffic.  However, if you use NAT, the usefulness of the IDS is diminished a bit in that the only IP addresses you would ever see in the alerts will be those for the far-end Internet host and the WAN IP of your main office firewall.  It would be difficult in that scenario to track which host on your private LANs might be infected with or the target of malware. If you instead run the IDS on the LAN interfaces, you would see the IP addresses before they were NAT-mangled.  With the site-to-site VPN scenario you linked, I don't if the LAN approach would work. Bill
  • Unable to install Snort

    5
    0 Votes
    5 Posts
    2k Views
    bmeeksB
    @Evad: Bill, After a total reinstall of pfSense from scratch … Snort installed like above .. Failed first time and installed on second try but no GUI... Ran the 'Reinstall Snort's GUI components' to get the GUI. Created a LAN interface and then made a WAN  'Add new interface mapping based on this one' Now it works .... no errors so far..... Thanks.... Glad it's working for you now, but it should not have been that much trouble the install.  Something is up somewhere and I just need to find what it is. As for your failure to start error with this message: snort[9610]: FATAL ERROR: /usr/pbi/snort-i386/etc/snort/snort_61288_em1/rules/snort.rules(904) Unknown rule option: 'stream_size That indicates a needed preprocessor was not enabled.  Most likely it was the Stream5 preprocessor.  Don't know why that would be.  It is enabled by default.  The particular rule containing that rule option is on line 904 (that's what the 904 represents) in the file /usr/pbi/snort-i386/etc/snort/snort_61288_em1/rules/snort.rules.  Open that file in a text editor and go to line 904 to find the rule that generated the error. Bill
  • Snort - Blocking googlebot's

    4
    0 Votes
    4 Posts
    2k Views
    F
    Verifying Googlebot https://support.google.com/webmasters/answer/80553?hl=en Google crawlers https://support.google.com/webmasters/answer/1061943?hl=en F.
  • Snort False positive shutterstock.com 192.33.31.57

    2
    0 Votes
    2 Posts
    2k Views
    bmeeksB
    There will be a description on the ALERTS tab for the alert generated by the IP address.  Post that alert description here.  If you are sure the alert is a false positive, you can either suppress that entire SID, or just suppress the SID when the IP matches the one in question. Post the actual alert description that is printed along with the blocked IP either on the ALERTS tab or the BLOCKS tab. Bill
  • Preferred method for modifying existing SID?

    3
    0 Votes
    3 Posts
    1k Views
    F
    You could probably double mod it: 10010 "content:" "content:!" 10010 "xxx" "yyy" But, depending on how many rules you have to mod, I would personnally make a custom rule for your needs and keep the original intact. Who knows, what if the original triggers one day?
  • Snort and quickassist

    2
    0 Votes
    2 Posts
    1k Views
    P
    I think the answer is not quite yet… I found this information in https://forum.pfsense.org/index.php?topic=86732.0 @gonzopancho: QuickAssist isn't supported in pfSense today, but we are actively working on a driver (with deep assist from Intel) to go back into the FreeBSD tree. I believe this is the last hoop to jump through before it is supported however, since according to this article it has been integrated in Snort since 2010 (Snort 2.9 Beta). http://www.securityweek.com/sourcefire-accelerates-snort-performance-intel-pattern-matching-technology-faster-detection [image: patience-yoda.jpg]
  • Network trogan detected in snort logs

    24
    0 Votes
    24 Posts
    9k Views
    bmeeksB
    Glad you found it!  Just leave Snort running on the LAN interface.  When using NAT, it will be easier to identify problem LAN hosts when Snort is on the LAN and can see the real IP addresses before they are altered by the NAT engine. Bill
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.