• Limiting suricata logs

    5
    0 Votes
    5 Posts
    2k Views
    M
    I did reinstall the package, which upgraded it to version 2.1.6 and things are working fine now. Martin
  • Snort doing too much work? [RESOLVED]

    5
    0 Votes
    5 Posts
    1k Views
    C
    Thanks for all of the replies.  I was able to actually resolve this issue by moving Snort to a different interface.  I was already bridging my wan interface with an internal interface to be able to use my public IPs directly on my servers.  I moved Snort to the internal bridged interface instead of the external one (the wan) and left the firewall rules set up on the external interface.  The firewall on the external interface prevents any unwanted data from entering and ever making it to the internal interface.  Snort therefore no longer sees all of this garbage traffic.  I tested the whole setup by opening up the firewall on the external interface and watching all of the Snort alerts fly in.  As soon as I re-enabled the firewall, the alerts stopped.  My CPU load has been reduced by almost 75% as a result of this.  If you are using a similar setup, you may want to consider doing this as it seems to help quite a bit.
  • Barnyard2 exits if it can't connect to remote syslog

    3
    0 Votes
    3 Posts
    963 Views
    M
    Thanks Bill, much appreciated. I've switched it to UDP and added in further monitoring to ensure I get alerted when the logging stops for a period of time.
  • Suricata Deleting Blocklists on Reboot??

    5
    0 Votes
    5 Posts
    1k Views
    A
    Awesome!  Thank guys, that helps me understand a lot! @doktornotor yeah, I think it'd be nice upon reboot to maybe save the blocklist in /usr/pbi/suricata-amd64/local/etc/suricata/blocklists or something with a timestamp.  Then if you wanted to keep them it'd be as easy as creating a Alias URL table to point to that file.
  • Problem installing snort on pfSense 2.2.4

    6
    0 Votes
    6 Posts
    2k Views
    ivorI
    @ciph: @ivor: Is there a reason you're using i386 arch pfSense? No, not really, I dont remember why I choose it when I first installed pfSense (I have been running it for about 2 years now). Maybe it wasnt stable enough back then. But I have made a new installation with 64-bit version now. I know its recommended, thanks :) Nice !
  • Suricata/Snort Ruleset Management

    2
    0 Votes
    2 Posts
    2k Views
    bmeeksB
    Thanks for the suggestion and the links.  I will check this out.  It would not be too hard to add the ability to provide custom download URLs for additional rules.  The only gotcha is every rules file needs to be unique so the GUI can distinguish them. Bill
  • Snort | Unknown rule option: 'stream_size'.

    3
    0 Votes
    3 Posts
    3k Views
    bmeeksB
    You most likely have a required preprocessor disabled.  Make sure the STREAM5 preprocessor is enabled on the PREPROCESSORS tab.  In fact, users should really never disable any of the default-enabled preprocessors unless they are very highly skilled with the operation of Snort. Bill
  • Suricata Package Update – 2.0.8 pkg v2.1.6 Release Notes

    2
    0 Votes
    2 Posts
    771 Views
    D
    Got the package updated during 2.2.4 upgrade. Works great.  8)
  • Suricata X-Forward-For

    4
    0 Votes
    4 Posts
    1k Views
    bmeeksB
    @digdug3: Yes, you are right, according to the thread they added it to Suricata 2.0 and in the unified2 chain. Can you explain where the current Suricata package is getting its blocking ip's from? Then I'll try to figure it out. From the alert-fast log chain.  The blocking plugin is in the Suricata output chain.  It may be that some additional information is buried in the Packet structure passed to the blocking plugin, but I have not investigated it that deeply yet. Bill
  • Snort or Suricata

    6
    0 Votes
    6 Posts
    4k Views
    D
    Also, lot of those unsupported rules should work with suricata 2.1.
  • Snort Aleart Port Scan Mulltiple & TOR

    7
    0 Votes
    7 Posts
    4k Views
    bmeeksB
    @Abhishek: google /youtube is getting blocked i whitelisted 1 ip in passthrough  i guess i need to find source rule which is blocking it and remove it since google uses lot of ip range and whitelisting entire range is imposible Correct.  Identify the blocking rule on the ALERTS tab and then click the red X beside the SID to automatically disable that rule for the interface. Bill
  • Snort 2.9.7.0 pkg v3.2.2 2.1.5-RELEASE (amd64) Snort VRT Rules Error 505

    9
    0 Votes
    9 Posts
    3k Views
    bmeeksB
    @foresthus: Hi there, … Please give this hint. It should be the variable "VRT_DNLD_URL" (snort_defs.inc or snort.inc or snort_check_for_rule_updates.php) which must to be changed. But what ist the new url? thnx a lot. ;) The Snort VRT has removed the rules tarball for Snort versions older than 2.9.7.2, so there is no URL to give you for the 2.9.7.0 version.  With Snort, the version of the binary and the version of the rules tarball must match.  A check is done by the binary to be sure they match up.  This is not a pfSense problem, but is a decision of the Snort team. You need to upgrade your pfSense to a 2.2.x version and then update Snort to version 2.9.7.3.  By the way, version 2.9.7.5 of Snort was just released.  I will be submitting an update for the pfSense package in the near future. Bill
  • Correcting "FREAK Weak Export Suite From Client" Alerts

    6
    0 Votes
    6 Posts
    1k Views
    A
    @bmeeks this is working great and I can see now where the vulnerable client is.  Thank you.
  • Snort - rules update fails daily

    5
    0 Votes
    5 Posts
    2k Views
    bmeeksB
    I honestly don't think the Snort package is at issue here.  If it was, then I would expect many complaints here of similar nature.  My personal experience is that you do generally want to avoid the period around midnight U.S. Eastern Time.  I would frequently encounter errors then on the nightly downloads.  I moved the update time to 0130 Eastern and no more issues.  I suspected the VRT folks had some kind of server maintenance task running at midnight, but that was just a guess. Since you have problems even with manual downloads, I would look at other basic connectivity problems somewhere.  Is there anything else in the chain like a proxy (Squid perhaps?), another upstream firewall, etc.? Bill
  • SNORT blocking friendly IP alias

    7
    0 Votes
    7 Posts
    1k Views
    S
    Thanks man! Greatly appreciated!
  • Upgrade Snort to 3.2.6

    4
    0 Votes
    4 Posts
    983 Views
    bmeeksB
    @MilesDeep: Thanks.  That's easy enough.  Will all the conf files remain intact? Yes, Snort and Suricata upgrades use the existing configuration stored in the config.xml file on the firewall.  The actual snort.conf (or suricata.yaml) conf file for the binary is regenerated each time the binary is started. Bill
  • Snort behind an external firewall - Is there a need for Snort?

    6
    0 Votes
    6 Posts
    2k Views
    G
    @fsansfil: With everything going HTTPS these days a Bluecoat or squid with i-cap and sslbump is better for web filtering than an IPS. You might be better suited with a proxy. "So i am NOT complaining!" No harm, no offense; Its just me after working 12hrs in a row, doing suricata rules ;) F. I have the i-cap/clam anti-virus enabled in my squid3 config
  • Snort only runs ET rules, not Snort VRT

    5
    0 Votes
    5 Posts
    1k Views
    D
    2.1.5 is dead. Move on. No fixes will ever appear there.
  • Snort not starting after upgrade to 3.2.6

    12
    0 Votes
    12 Posts
    3k Views
    D
    As noted above - try without sync. (Hopefully gone everywhere again with 2.2.4.)
  • Why would a crawler coming from Google netblock show up as malevolent?

    2
    0 Votes
    2 Posts
    911 Views
    D
    Disable the broken rule. And while at it, disable 1:2015526, same idiocy.
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.