• Snort Dropping https traffic

    1
    0 Votes
    1 Posts
    275 Views
    No one has replied
  • This topic is deleted!

    1
    0 Votes
    1 Posts
    30 Views
    No one has replied
  • CIDR in suppress list not showing in Alerts pane

    7
    0 Votes
    7 Posts
    1k Views
    C
    @nogbadthebad I wanna assume good faith here and that you're trying to help - but please try and not fall into the trap of first failing to read the OP, then insisting on a non-solution, followed by complete ignoring the OP altogether. I understand how to submit FRs - not my purpose here. Simply ignore the thread if you have nothing assistive to add. Thanks.
  • OPENAPPID Custom rules to block globoplay not working

    2
    0 Votes
    2 Posts
    468 Views
    NogBadTheBadN
    https://snort.org/ < ask here
  • After suricata install, gateway disconnected

    Moved
    2
    0 Votes
    2 Posts
    420 Views
    B
    i had the exact same issue on my box. so i removed it and switched to Snort which has always worked for me in the past. hopefully someone can shed some light on this
  • Openappid does not block the Globoplay

    1
    0 Votes
    1 Posts
    298 Views
    No one has replied
  • Snort 3.2.9.6_1

    Moved
    1
    0 Votes
    1 Posts
    383 Views
    No one has replied
  • OpenAppID app block?

    3
    0 Votes
    3 Posts
    3k Views
    S
    Yes, if the built-in rules you select don't match your requirements, you can write a custom rule to block a specific application. I just created this custom test rule to block WhatsApp: alert tcp $HOME_NET any -> $EXTERNAL_NET any (msg:"WhatsApp";flow:from_client;appid:whatsapp; sid:1000056 ; classtype:misc-activity; rev:1;) …it blocks to a lesser or greater extent, see attached image of the alerts generated, and a lot depends on how up-to-date and accurate the Snort detectors are and how quickly the applications change. You can get a list of applications from the Snort snort-openappid.tar.gz file at https://www.snort.org/downloads#openappid [image: 2018-05-19_15-20-44.png] [image: 2018-05-19_15-20-44.png_thumb]
  • What is Snort Blocking Right Now?

    Moved
    11
    0 Votes
    11 Posts
    2k Views
    Raffi_R
    Read through these forums on IDS/IPS, you will notice a trend that Bill is more than helpful. I've learned so much just reading through other people's issues as well as my own. Bill goes out of his way to not be condescending, but sometimes stating things in forums may seem that way. Unfortunately, you can't type tone. NollipfSense has great advice for this instance and in general when trying to isolate a specific case. Bill's advice is really the only long term solution. I went through the same troubles for a long time till I got my IPS working the way it does now. It takes time for trial, error, reading, more errors, more reading, watch some videos on it, and so on. Good luck
  • Snort: remove 'last_rule_upd_status' from config

    Moved
    3
    0 Votes
    3 Posts
    400 Views
    Z
    Sorry for the late reply, but forgot to click on 'notify' why is it not a good thing to know if your rule updates failed? It is good to "know" that, but I do not want my config management system catching this "change". It is not a configuration change but a component state change. Could it be stored as a global variable accessible to any component? The download fails a bit more often than in your system. Zsolt
  • 0 Votes
    1 Posts
    355 Views
    No one has replied
  • Alert [SURICATA IPv4 padding required] - Blocks Hosts - Unable to stop

    2
    0 Votes
    2 Posts
    968 Views
    NollipfSenseN
    I get them also; however, in my case though, my neighbor and I share the Internet so I ignore them because it's my neighbor's devices. It seems that your situation is similar to mine based on your WAN using RFC1918.
  • Snort fail to start

    Moved
    1
    0 Votes
    1 Posts
    788 Views
    No one has replied
  • Suricata+Booting sequence+email notifications

    2
    0 Votes
    2 Posts
    845 Views
    bmeeksB
    I would assume you have configured the notification app to use the email server's name instead of IP address.  If so, it appears from the error message the DNS lookup of the hostname is failing.  That's what you should investigate. To see if Suricata is the problem, simply look on the ALERTS tab to see if any alerts are present with the IP address of your DNS server.  Have you tried disabling Suricata to be sure that is actually the cause of the problem? Bill
  • Weird alert from suricata

    6
    0 Votes
    6 Posts
    1k Views
    bmeeksB
    @JohnSCarter: I guess that makes more sense. My understanding of drive by attacks is that you're "attacked" once exposed to the malicious agent, if it were an ad or webpage component wouldn't that happen once the asset was loaded when I first visited the page? could it have been delayed by nearly 15-20mins? Also my network is back online now, fingers crossed it doesn't happen again. Some web sites use Javascript timers that periodically cycle through different ads and display them in a common iframe on the page.  So depending on length of time at the site, it may have cycled through to an ad served from a less-than-reputable source and that's when the malicous code was detected. Don't let Suricata make you paranoid!  It will detect a lot of stuff.  Most of what it may detect is totally harmless to most home users and even to many corporate IT users.  So long as your LAN applications are patched and up-to-date, and Suricata is detecting only inbound attempts and is not showing outbound malicious traffic from your LAN to known CnC hosts and such, then things are probably fine.  In the case of the traffic you posted, that was an inbound attempt.  Likey just a site "shooting blind" to see what was out there.  For the specific traffic you flagged, it would be targeted at BSD operating systems as it was a BSD shell code exploit.  Other than pfSense itself, do you have any BSD devices on your LAN?  If not, then no worries as pfSense itself is quite secure out-of-the-box. Bill
  • Protocol filtering with Snort (openappid)

    1
    0 Votes
    1 Posts
    292 Views
    No one has replied
  • No alerts generated for emerging-trojan.rules, Suricata Inline

    5
    0 Votes
    5 Posts
    794 Views
    bmeeksB
    @crept: As for it to not show up in the Alerts tab, could this be a wrong configuration on my end? Thank you Bill! No, it's an issue with the way the Suricata binary logs drops when using Netmap.  I probably need to change the way the GUI gets alerts and drops when using the Inline IPS mode (which uses Netmap).  This happens from time to time. Bill
  • Snort Alias Issue

    6
    0 Votes
    6 Posts
    1k Views
    V
    I had the same issue. Turned out I had bad entry in the whitelist alias, forgot to put 0's for the Net address. Corrected it and problem went away.
  • SID mgmt enable/disable question

    8
    0 Votes
    8 Posts
    2k Views
    bmeeksB
    @bbspace: Thank you for this reply, Bill. I thought this was the case; I couldn't figure out why I just didn't get it. I appreciate your work in maintaining the package. May I suggest a feature that would allow to PCRE through the rules folder and pick just the rules wanted would be nice. If I have the time maybe I'll try a submitting a PR after I delve deeper into the package source. Cheers! All of the code for the SID MGMT rule selection logic is in the file /usr/local/pkg/snort/snort.inc and the initial function in that file is snort_prepare_rule_files().  That main function calls a number of other functions to build the rule set using the SID MGMT configurations.  It is all commented fairly well.  The one big concern would be not to break any of the existing functionality, so lots of testing would be required to verify no unexpected behavior creeps in. Bill
  • 0 Votes
    3 Posts
    907 Views
    bmeeksB
    UPDATE This problem turned out to be a typo in the updated MD5 filename on the Snort.org download site.  After some email communications with the Snort team the problem was corrected on their download site.  This issue should be resolved now. Bill
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.