• Suricata Configuration

    2
    0 Votes
    2 Posts
    903 Views
    B
    Configured as well as SNORT
  • Snort not catching everything

    5
    0 Votes
    5 Posts
    2k Views
    bmeeksB
    Couple of other things to consider – 1. By default in the pfSense Snort package, the vast majority of the Community rules are disabled.  Simply checking on the category on the RULES tab is not enough.  You have to individually (or using the SELECT ALL option on the RULES tab) enable the vast majority of them. 2. If you are using a SPAN port on the switch, then the sensor sees all traffic the switch does when mirroring ports.  However, the Snort sensor will only see traffic that is specifically passing through the firewall.  Don't know the particulars of the alerts you are seeing on the monitor and not the pfSense instance, but is it possible that host-to-host traffic on the LAN side is what the sensor is alerting on when pfSense does not?  The pfSense sensor will only see traffic either outbound to or inbound from the Internet.  Traffic from one LAN host to another will be seen by the passive Snort sensor but not the pfSense Snort sensor. Bill
  • Is Snort the right tool for the job?

    1
    0 Votes
    1 Posts
    710 Views
    No one has replied
  • Snort: Won't clear md5 after pfSense update to 2.3.1-RELEASE-p1

    5
    0 Votes
    5 Posts
    1k Views
    S
    Well, I've temporarily fixed it by modestly increasing the /tmp partition to 96MiB, but I suspect I'll run into problems again soon. Slightly irritatingly, unticking System/Advanced/Misc/Use RAMdisks doesn't seem to work on this version of pfSense/nanoBSD, so I can't set it to a partition on the Flash disk. It's a shame this little box has only lasted just over a year on my home network, looks like I'll have to buy a bigger one, like a LinITX APU2 C4 4GB. At least that would have enough memory and grunt to cope for a while. Thanks for the pointers Bill. smoker
  • SNORT with VLANS

    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
  • Snort seemingly crashing PFsense

    3
    0 Votes
    3 Posts
    1k Views
    C
    Never enable Snort blocking without first running for at least a week or two and reviewing what it's triggering and disabling signatures as appropriate, as the default Snort ruleset is way too touchy to be blocking.
  • 0 Votes
    2 Posts
    1k Views
    bmeeksB
    At the moment nothing like that is in the code, but I guess it could be added.  Perhaps as an option that is configurable on the GLOBAL SETTINGS tab.  The line of code you altered to trust self-signed CAs was added to the Snort GUI code base a while back in an attempt to improve security, but it has the unintended side effect of interfering with some edge-case setups. Bill
  • Looks like some headway with Suricata and FREEBSD is happening…

    4
    0 Votes
    4 Posts
    1k Views
    G
    Bill: Thanks for the update. I know it's complex to work on all the moving parts, Regards, Howard
  • How to sing suricata to capture packet

    1
    0 Votes
    1 Posts
    621 Views
    No one has replied
  • Snort - portscan - suppress UDP port

    6
    0 Votes
    6 Posts
    3k Views
    A
    @zxvv  Thanks very much for adding the ignore_scanned option.  I'm probably being slow, but I'm having trouble getting it to do what I need.  When I try to add an entry into ignore_scanned in the GUI, Snort fails to start.  I'm sure I'm not getting the syntax quite right. Basically, my set up and what I want to do are as follows: 1)  I have a WAN interface which gets a dynamic IP from my ISP.  Let's call that 12.34.56.78 2)  I have a NAT forward set up for a UDP port (let's say 1234) that forwards that port to a LAN address.  Let's call that 192.168.1.2 3)  When I connect using the service on UDP port 1234, the port scan preprocessor detects it as a port scanning attempt and blocks the incoming IP.  The portscanning engine is set only to look at UDP traffic. If it helps, that UDP port 1234 is the only UDP port that's fowarded. 4)  What I want to do is add an entry to ignore_scanned so that it ignores all traffic on UDP 1234 when deciding if it's being scanned. What do I type into the ignore_scanned box to achieve this please? I've tried various combinations of $HOME_NET, $EXTERNAL_NET, 192.168.1.2, 0.0.0.0/0 specifying port 1234 etc (the last entry just trying to catch any address)  but it's either ineffective or Snort doesn't start at all with the following error: FATAL ERROR: /usr/local/etc/snort/snort_57232_re0/snort.conf(355) => Invalid ip_list to 'ignore_scanned' option.
  • Snort process runs crazy when WAN IP (PPPoE) reconnects

    1
    0 Votes
    1 Posts
    787 Views
    No one has replied
  • Snort and Suricata on pfSense 2.3?

    13
    0 Votes
    13 Posts
    9k Views
    P
    After doing some more testing it seems like I am never getting reaching my max internet speeds with Suricata inline mode, even with Snort stopped. I also started another thread (https://forum.pfsense.org/index.php?topic=113195.0) about slow speeds with Suricata inline mode in general. This other thread is on different hardware, different network and not running Snort concurrently.
  • Syntax for ET categories for drop sid file

    4
    0 Votes
    4 Posts
    2k Views
    W
    Trying to modify the dropsid.conf file and having troubles…. Firstly, running the daily Beta releases. The on the SID Management tab there are no example.conf files. Trying to add a New file, I input dropsid.conf for a filename and a couple of lines in the body below and then save. After the save, there still is nothing there, nor after exiting and re-entering the GUI. I'm about to edit a file outside of the GUI and try the Import function. Any recommendations? Is there a location where the dropsid-example.conf file can be downloaded or pulled out of a distribution? TIA edit: Tried to create the file offline and import with same result. Copied crash report for this activity below: Crash report begins.  Anonymous machine information: amd64 10.3-RELEASE-p3 FreeBSD 10.3-RELEASE-p3 #104 95be4fb(RELENG_2_3): Sun Jun  5 10:51:54 CDT 2016    root@ce23-amd64-builder:/builder/pfsense/tmp/obj/builder/pfsense/tmp/FreeBSD-src/sys/pfSense Crash report details: PHP Errors: [05-Jun-2016 10:50:44 America/Denver] PHP Warning:  move_uploaded_file(/var/db/suricata/sidmods/dropsid.conf): failed to open stream: No such file or directory in /usr/local/www/suricata/suricata_sid_mgmt.php on line 125 [05-Jun-2016 10:50:44 America/Denver] PHP Stack trace: [05-Jun-2016 10:50:44 America/Denver] PHP  1. {main}() /usr/local/www/suricata/suricata_sid_mgmt.php:0 [05-Jun-2016 10:50:44 America/Denver] PHP  2. move_uploaded_file() /usr/local/www/suricata/suricata_sid_mgmt.php:125 [05-Jun-2016 10:50:44 America/Denver] PHP Warning:  move_uploaded_file(): Unable to move '/tmp/phpAm5LA8' to '/var/db/suricata/sidmods/dropsid.conf' in /usr/local/www/suricata/suricata_sid_mgmt.php on line 125 [05-Jun-2016 10:50:44 America/Denver] PHP Stack trace: [05-Jun-2016 10:50:44 America/Denver] PHP  1. {main}() /usr/local/www/suricata/suricata_sid_mgmt.php:0 [05-Jun-2016 10:50:44 America/Denver] PHP  2. move_uploaded_file() /usr/local/www/suricata/suricata_sid_mgmt.php:125 After investigation, found /var/db/suricata did not exist. Created /var/db/suricata/sidmods. Went back to the GUI and performed the import function again and the template was imported and displayed in the file list and I was able to select it from the Drop SID File section drop-down list.
  • Configure ignore_scanned for snort portscan

    12
    0 Votes
    12 Posts
    2k Views
    A
    Thanks.  The ignore scanned option is now available in the Snort pre-processor page. There remains an issue that you can't select UDP in the scan type pull down menu on that same page, as it's missing. I've fixed that here,  but it's waiting to be merged.  https://github.com/pfsense/FreeBSD-ports/pull/138
  • 0 Votes
    2 Posts
    2k Views
    bmeeksB
    Your rule syntax is missing the CLASSIFICATION tag (uses the classtype keyword).  The Snort binary on pfSense wants that in a rule because of some customization done in the CSV output module.  If that section of the rule is missing, it causes problems. Bill
  • Snort - portscan/Portsweep from WAN interface suddenly

    5
    0 Votes
    5 Posts
    2k Views
    R
    I'm seeing the same thing. I just noticed it today, but not sure how long it's been occuring.  I was running Snort rules from Jun 1st and EMThreat rules from Jun 2nd and still seeing problems.  Snort is blocking facebook, google, bing and others.  I forced an update and both rulesets are now dated Jun 2.  We'll see if that fixes it. I've always had my portscan sensitivity set to "low" and haven't changed anything with my Snort setup for months.  So hoping it was just a bad batch of rules.
  • Snort and blocking access to cctv system

    5
    0 Votes
    5 Posts
    1k Views
    MikeV7896M
    The way I set mine up at home was without blocking mode enabled for a few weeks. That way nothing was actually getting blocked when an alert was triggered. I would of course need to check all alerts, and fortunately all were not major. I think I suppressed like 13 or 14 rules over the course of the non-blocking period, and when I didn't see any further alerts for a week, I put it in blocking mode. Most of the ones I suppressed were HTTP or HTTPS related, though I did also get a couple of SIP ones since my VoIP provider breaks the caller ID length (they add the country code to the number, making it longer than normal). Of course, like I mentioned, my setup is at a home and not a business… but you should be able to do something similar there too. Just keep an eye on the alerts a little more often during the non-blocking period and make sure they're harmless before you suppress them.
  • Snort - Possible GUI Bugs

    3
    0 Votes
    3 Posts
    956 Views
    bmeeksB
    This is most likely a Bootstrap conversion bug in the GUI code.  Could be a "display only" bug meaning the correct values are actually stored and written to the snort.conf file.  I can add it to my list of bug fixes for the next update. Bill
  • Snort ip list added do not show in the interface config snort

    2
    0 Votes
    2 Posts
    613 Views
    E
    @enriluis: Hi all! I'm using pfsense 2.3.1_1 , snort package 3.2.9.1_13, when i try to add ip list with some ip address it will be trusted for example,  so in the interface config do not show the ip list added. sorry about my English Sorry i was making in wrong place
  • Suricata & PPPoE Interfaces - Bug Reported to Openinfosecfoundation.org

    21
    0 Votes
    21 Posts
    5k Views
    dotOneD
    Same place as it always was. Interface -> <if>Flow/Stream Subheader "Stream Engine Settings" /AV</if>
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.