• Is it possible to block DoH and DoT, using SURICATA

    6
    0 Votes
    6 Posts
    2k Views
    johnpozJ
    @jwj said in Is it possible to block DoH and DoT, using SURICATA: I'm not holding my breath for relevant updates to privacy legislation. Too much money in surveillance capitalism and politics. Very very true! Also the lawmakers don't understand any of it.. Kind of hard to pass legislation on tech that is all just magic to you.. We are just doing what the users want! We are providing a service - they agreed to it, etc. etc. Oh by the way here is some $ for that thing you wanted to get done.. We are here to help! ;) Also problem is the tech "can" be used for good!!! What your watching on TV is minor shit in the big picture.. Guns can save your life from that bear, they can be used to feed your family... But they can also be used by bad guy to kill you.. Same goes for some of this tech - its all double edge swords.. They can cut the stuff you want to cut, but they can also cut you bad!
  • pFsense not connect to the Internet at all! + SNORT Update failed.

    2
    0 Votes
    2 Posts
    209 Views
    bmeeksB
    Well, first off your problem does not sound like a Snort problem. If you disable Snort on all interfaces do things work then? If not, you have to troubleshoot that first and only then come back and enable Snort. If you have any sort of Proxy package installed on your firewall, that's the first place I would start my troubleshooting. The fact you mention issues with basic package installation makes me think either connectivity issues at the hardware layer or something related to a proxy since you mentioned https_proxy in your post.
  • suricata/snort/etpro rules - how to be?

    2
    0 Votes
    2 Posts
    1k Views
    bmeeksB
    @Shazams said in suricata/snort/etpro rules - how to be?: Hello! I use the latest version suricata. I would like to expand the set of rules. Snort has two subscription options: $ 30 and $ 400. What is the difference in the rules between two subscriptions? I have to give you the smart alec answer first ... LOL. The difference is $370 ... . Okay, now that I've had my fun for the day, the real answer is there is no difference. The Snort team just has a different rate structure for private (as in individuals) versus commercial (business) users. Read the fine print on their licensing site. If you are purchasing a Snort subscription for a business, you should pay the higher rate. A pricing structure such as this is not too uncommon. Microsoft had something similar for students versus other users for their Office products. @Shazams said in suricata/snort/etpro rules - how to be?:> Does it make sense to apply the rules from etpro, if I purchased a snort subscription. p.s. Normal user. Unless you are Jeff Bezos or Bill Gates and just flush with cash, I think you will find an ET-Pro subscription fairly expensive (as in $2369.99 per year). That is way too rich for my wallet as an individual user. So in my case, and it's the same for the majority of users here, I would choose Snort over ET-Pro. Nothing wrong with using Snort and the free ET-Open rules, though. If I were the firewall admin for a larger business, and I had the budget, I would opt for the ET-Pro rules and use them along with Snort. It can never hurt to have multiple eyes looking out for trouble, or in this case multiple signatures.
  • Snort reload/restart

    5
    0 Votes
    5 Posts
    3k Views
    D
    No, it is not. Just two "ordinary" interfaces -> WAN & LAN.
  • Suricata Snort VRT Rules Problem/Missing Fixed!

    11
    0 Votes
    11 Posts
    3k Views
    bmeeksB
    @Snowaks said in Suricata Snort VRT Rules Problem/Missing Fixed!: So one question I had now that 3.0 is out for snort will the 2.9 train no longer get updated ?? at least I've seen was snortrules-snapshot-29140.tar.gz and was almost a year old. Snort3 is not actually "out" yet. It is still in Beta and has been in a Beta for about a year. The Snort 2.9.x rule sets and source will continue to be updated for a while. And DO NOT attempt to use the Snort3 rules with Suricata. You will break it badly if you try that. Suricata cannot work properly with Snort3 rules. The snortrules-snapshot-29140.tar.gz file is not a year old. Not sure where you think you are seeing that. The file is updated approximately twice per week. Snort 2.9.13 is the current binary version, and those rules are also updated about twice a week. Since there is a 2.9.14 rule set posted on the Snort site, I suspect a release update for the binary is about to drop (that would be Snort 2.9.14).
  • Is it possible to use IDS/IPS with pfSense in bridged mode?

    6
    0 Votes
    6 Posts
    1k Views
    johnpozJ
    Normally what you would do in a double nat setup is yeah put pfsense wan IP in the dmz host of the router upstream.. This way you only need to mess with 1 place for port forwards. But sure if you need port X to be forwarded on pfsense to something behind, then you would make sure the nat upstream forwards port X to pfsense wan IP first.
  • Snort3 Package Status Update

    4
    5 Votes
    4 Posts
    630 Views
    bmeeksB
    @Actionhenk said in Snort3 Package Status Update: does this version support multithreading ? Yes, Snort3 is multithreaded. But don't expect a huge performance gain from that. Suricata is multithreaded, and in several independent tests I've seen posted on the web in the past where it was compared with the current single-threaded Snort 2.x, there was not a lot of difference in packet throughput. Even multithreaded applications still have some bottleneck points where things have to come back down to a single thread. While multithreaded is not a bad thing, and it can help in some situations, I just don't think it is the quite the "super thing" that some folks think it is.
  • [resolved] suricata inline - cpu idle at 80/85 %

    2
    0 Votes
    2 Posts
    212 Views
    A
    uninstalled suricata and installed snort, seems to be working
  • Compiling Software on the Firewall

    2
    0 Votes
    2 Posts
    228 Views
    R
    @ravi said in Compiling Software on the Firewall: Under this section, one thing is mentioned that create binaries in a FreeBSD similar to pfSense's FreeBsd. Copy those binaries to pfsense. Does it work?. I will take bro ids and create binaries and copies it to pfsense. Thank you. Note: Section : " Compiling software on the Firewall" from pfsense website Above view from First paragraph of "Compiling Software on the Firewall" section 0f this link "https://docs.netgate.com/pfsense/en/latest/development/compiling-software-on-the-firewall.html"
  • no snort option under pfsense pkg manager

    15
    0 Votes
    15 Posts
    2k Views
    R
    Done fresh installation. Snort came. Thank you.
  • installation of BRO IDS

    4
    0 Votes
    4 Posts
    832 Views
    jahonixJ
    @ravi You mean other than via the Package Manager available from System | Package Manager | Available Packages ?
  • Disk full with packet logs

    4
    0 Votes
    4 Posts
    414 Views
    bmeeksB
    @bhjitsense said in Disk full with packet logs: Thanks. That took care of it. In the GUI, is there not an easy way to view/export the .pcap files that have been logged? No. You can see the files using DIAGNOSTICS > EDIT FILE from the pfSense menu, but there is nothing within the Suricata GUI for looking at the .pcap files. It is the admin's responsibility to either view them using some CLI tool or export them off the box over to another server for analysis with third-party tools. The PHP system of the firewall does not provide a great programming environment for opening up and viewing large files.
  • Migrated from igb to bge Suricata Won't Run (solved)

    20
    0 Votes
    20 Posts
    2k Views
    NollipfSenseN
    Bill, I just rebooted and Suricata is now running! [image: 1562524823426-screen-shot-2019-07-07-at-1.38.08-pm.png]
  • [Solved] snort faield to up date rules

    8
    0 Votes
    8 Posts
    996 Views
    S
    yups fixed this in next release to avoid extra space.
  • Suricata/Snort master SID disablesid.conf

    96
    0 Votes
    96 Posts
    110k Views
    D
    @asterix Could you share for us your last disablesid.conf ? maybe you have some NEWS. and that can use for snort and suricata ? or only suricata? Do you have any new post of config suricata for WAN and snort for LAN? Thanks for your help. Best Regards, Daniel T
  • New Install High CPU from Suricata even with practically no trafffic

    2
    0 Votes
    2 Posts
    441 Views
    bmeeksB
    You have multiple Suricata processes on the same interface. I count 5 on igb2. There should usually be only 1. Those multiple processes are chewing up your CPU. Are you by chance trying to run the Service Watchdog package with Suricata? If so, DON"T! It will cause this issue as it does not understand how Suricata works nor how to properly monitor it. If you don't have Service Watchdog, then something weird is happening on your box (unless you have a lot of VLANs on igb2). If you do have a lot of VLANs on that interface, I would suggest running on the parent only and not each VLAN. To kill those errant processes (assuming you don't have multiple Suricata-enabled VLANs on igb2), do this. Stop Suricata on whatever interface igb2 is (LAN, WAN or whatever). Look for any remaining Suricata processes using this command: ps -ax | grep suricata If you see any for interface igb2, then kill them with: kill -9 <pid> That should reduce your CPU utilization to almost nothing with no traffic.
  • Snort v4.0_3 -- Release Notes

    1
    0 Votes
    1 Posts
    206 Views
    No one has replied
  • (SOLVED) Suricata Interfaces have to be manually Restarted

    45
    0 Votes
    45 Posts
    6k Views
    Raffi_R
    @bmeeks said in (SOLVED) Suricata Interfaces have to be manually Restarted: @digdug3 said in (SOLVED) Suricata Interfaces have to be manually Restarted: @bmeeks Would it be possible to check for those processes during the uninstallation of the package? So you can warn the user? It tries to do that now, but does so by looking for a PID file in /var/run. A crashed/runaway process may no longer have a valid PID file in /var/run. I can look at some other approaches using pgrep maybe to find all suricata processes and then force kill them. Me with Suricata and Snort, and the former package maintainers before me for Snort, have been struggling with multiple instances getting launched forever. It stems somewhat from the way pfSense itself will sometimes issue multiple "restart all packages" commands in response to WAN IP changes or changes in the WAN interface state or problems with a gateway. These multiple "restart all packages" commands can lead to multiple instances of Suricata (or Snort) running on an interface. That sounds like a pain to deal with. It would be great if another approach could be implemented.
  • Suricata 4.1.4_2 not blocking hosts

    49
    1 Votes
    49 Posts
    8k Views
    bmeeksB
    @wangel: Glad it's working for you. I was really pretty certain I had fixed the bug. I even went back through the binary code two more times to convince myself. All ways for that error to happen were removed from the code. So in your case, it seems you had what I call zombie Suricata processes out there, and your issues were actually coming from them as they would have been running old copies of the binary (hence the continuing error).
  • Snort interferes with traffic on VLAN - Known issue, any solutions?

    6
    0 Votes
    6 Posts
    1k Views
    P
    All fixed now, have DHCP running on each VLANs with proper FW rules! Thanks @NogBadTheBad !
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.