• Suricata incompatibility with pcap utils? (tcpdump / tshark)

    5
    0 Votes
    5 Posts
    2k Views
    T
    Just wanted to confirm that this happens even in a vm (VMware Workstation 12 Pro), so it's not a hardware/driver issue.
  • Suricata GUI package v3.0_6 for pfSense 2.3 - Release Notes

    29
    0 Votes
    29 Posts
    7k Views
    N
    i have doble the rules for LAN interface performed the test for some unknown reason…may be start/restart service i start seeing wan alerts. i have no explanations ...still looking on to understand why it start working now
  • Suricata / Drop rule

    7
    0 Votes
    7 Posts
    10k Views
    T
    Bill, thank you for the additional information. It is helping my understanding click together. I am not interested in MITM attacks. I just want to shut down certain things not eavesdrop. fsansfil, thank you for showing a way to achieve what I was looking for. There is so much to Suricata to take in. As with anything, time and experience is what is needed along with some outside help.
  • Certificate Error Flagged - Suricata V 3.0

    3
    0 Votes
    3 Posts
    665 Views
    G
    Thanks Bill your thoughts are the same as mine. It must be their web hosting service.
  • Suricata v3.0 - Drop Rules Highlight Color

    4
    0 Votes
    4 Posts
    1k Views
    bmeeksB
    @TEP71: Bill, Thank you very much. I understand I will have to change this every time there is an update. It wasn't a hard change to make and it is something I can do when needed. Thank you again for your time. –Thom Glad to be of help. Bill
  • Snort - Performance Tweaks

    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
  • Snort blocked pfSense Forum

    4
    0 Votes
    4 Posts
    4k Views
    MikeV7896M
    That's happening because of a SIP rule (spp_sip)… and yeah, a web address URL for many sites would certainly be too long for SIP. The better question would be why a SIP rule is being triggered for a web connection.
  • Test Snort Rule

    2
    0 Votes
    2 Posts
    4k Views
    bmeeksB
    Your rule is missing the proper action keyword and a classification parameter.  The valid action keywords are generally "alert" or "drop".  On pfSense, "alert" is the only valid keyword.  The classification is a parameter string obtained from the classification.config file. One easy way to test Snort is to enable the Emerging-Threats Scan rules, then visit one of the online scanner web sites and have it scan your public IP for exposed services.  That should trigger Snort.  You can do the same by scanning your WAN IP (assuming that's where Snort is installed) with nmap. Saves you the problem of writing a custom rule.  Snort is quite unforgiving with syntax errors as you see. Bill
  • Bug tracker for the Snort/Suricata GUI?

    9
    0 Votes
    9 Posts
    2k Views
    W
    Not Nano - full standard install from .iso onto 90gb SSD. Yes, I did a complete wipe and installed 2.3 Release, then set up pfBlockerNG and Suricata. I couldn't get suricata to work at all. I disabled it, installed Snort, set up and it is working. Then, I upgraded to 2.3.1 Dev and it is still all working. I think i may have the netmap issues going on. I'll wait until problem is solved before tackling Suricata again. Thank you for your help and your comments in other threads about issues with netmap.
  • PfSense-pkg-suricata-3.0_7 – Release Notes

    10
    0 Votes
    10 Posts
    3k Views
    bmeeksB
    @pfsenseboonie: Wishlist Item When listing internal IPs in alerts tab it uses the real IP and not the IP of the external pfsense interface. For example… client = 1.2.3.4 router external iface = 2.2.3.4 ISP modem = 2.2.3.1 ping from any client to ISP modem. In alerts log would be DST = 2.2.3.1 and SRC = 2.2.3.4 Running Suricata (or Snort) on the WAN means the sensor sees inbound traffic before any NAT rules have applied, and outbound traffic after NAT rules have been applied.  Either way internal hosts are generally not visible if you use NAT and have Suricata or Snort on the WAN.  The solution to this problem is to run the sensor on your LAN interface(s) and not the WAN when using NAT. Bill
  • Suricata 3.0 Inline Mode & Traffic Shaping

    3
    0 Votes
    3 Posts
    1k Views
    G
    Bill: Thanks for the update. You have confirmed the issue. Howard
  • Snort Suppress List Edit in 2.3

    5
    0 Votes
    5 Posts
    1k Views
    bmeeksB
    @vbentley: I am unfamiliar with bootstrap, but I think this is a style sheet issue. I have had a quick look but run out of time today to actually start experimenting with changes. In pfSense.css it look like this style dictates the width .col-sm-10 .form-control {     width: calc(50% - 15px); } I will try and get back to this later in the week. You are correct it can be fixed by modifying the CSS, but it would not be good behavior for a package to do that.  You can override the Bootstrap default style for any object (HTML element, actually) by adding the appropriate attribute on the page.  I've done that in other places within the GUI for Snort and Suricata for textarea controls.  I will do the same for this control. If you want to experiment (and maybe learn a little about Bootstrap), here is an example of adding the additional attributes to the textarea control – $modal->addInput(new Form_Textarea ( 'logtext', '', '...Loading...' ))->removeClass('form-control')->addClass('row-fluid col-sm-10')->setAttribute('rows', '10')->setAttribute('wrap', 'off'); In Bootstrap, the class "col-sm-10" sets the width of an element relative to Bootstrap's 12-column grid.  It assumes the display device's screen is evenly divided into 12 columns.  So the widget above is set to be 10 columns wide.  Ignore the use of $modal.  In the file we are discussing for editing a Suppress List, the variable name is $section. Bill
  • PfSense wan (em1) constantly pinging my modem. Anyone knows Why?

    6
    0 Votes
    6 Posts
    1k Views
    P
    Thanks! I'll re-enable it for 1 time per second and disable that rule in suricata. No i its not a fancy setup just connected to the ISP fiber router/switch/modem.
  • Suricata and/or Snort categories on schedule

    4
    1 Votes
    4 Posts
    1k Views
    bmeeksB
    @lokapal: I guess real busyness environments will use Cisco solutions anyway in most cases  ::) My case is much more similar to educational organization campus. Do you like to explain to x00 linuxoids why they can't download at lightspeed their favorites ubuntus, debians, gentoos and scientific linuxes via bittorrent at least after worktime? 8) The same thing with online gaming…  ;D Why don't you create a Guest Wireless Network and give greater freedom there, but restrict its access to your school LAN?  Do you let the folks install and run P2P clients and games on your business or school machines?  If so, I would say that is a bad policy. At any rate, the answer to your original question is that currently neither IDS/IPS package offers such scheduling (it is not present in the underlying binaries anyway), and such a feature is not currently on the long-term planning radar.  You can schedule firewall rules within pfSense itself, but using those will be problematic because you would need to capture all the IP addresses of the potential P2P and gaming sites.  That is hard because the IPs can change frequently. Bill
  • Snort 3.2.9.1 on PFSense 2.2.6 - Alert but no host in Blocked list

    12
    0 Votes
    12 Posts
    3k Views
    bmeeksB
    I suspect it is working now.  That bug with the number of entries to display on the BLOCKS tab would cause it to by default display just one row.  Forcibly saving a new numerical value would fix any bogus value that might have gotten saved when the bug was in the code. All these things are fallout from the Bootstrap conversion of the package.  Bootstrap implements things a bit differently than the old system, and lots of things related to form input elements had to be changed in the GUI code. Bill
  • Snort Updating issue (SSL)

    22
    0 Votes
    22 Posts
    7k Views
    bmeeksB
    Firewall rules have nothing at all to do with your Snort rules update problem.  It is complaining about the certificate trust chain.  There either is, or your configuration makes cURL think there is, a self-signed certificate in the chain. Have you tried removing Squid entirely for a test to see if the rules download then?  The Snort code uses the built-in system function cURL() to download updates.  That function is called with a parameter set to verify SSL peers (in other words, check the certification trust chain).  That check is failing on your system because of the some specific configuration you have.  My bet is the problem is with Squid. Bill
  • Suricata inline mode and kernal error message

    14
    0 Votes
    14 Posts
    5k Views
    bmeeksB
    @ntct: Maybe similar problems about netmap. https://github.com/luigirizzo/netmap/issues/156 https://github.com/luigirizzo/netmap/issues/134 Hmm…might be some Netmap problems that are not directly related to Suricata.  pfSense 2.3 now compiles Netmap support into the kernel by default. Bill
  • Snort 3.2.9.1_12 Suppression List Error

    4
    0 Votes
    4 Posts
    2k Views
    bmeeksB
    There was a bug in the Suppress List code early on immediately after the initial Bootstrap version of the package was released.  It was eventually fixed, but it is possible it caused some junk to be left behind in your configuration. Bill
  • Snort blocks even after force disabling rule

    5
    0 Votes
    5 Posts
    2k Views
    S
    Good point and that is exactly what I was experiencing with Snort.  Seems to be working OK now after reinstall.  And just to follow up on my CRON issues that has cleared up as well. One of my CRON entries uses the wget command.  I'd forgotten I had to install that command as it is not native to the pFsense package.  So, for the machine I updated to 2.3 the wget command was already there and CRON worked.  For the machine I installed a fresh 2.3 the wget command was not there so CRON did not work and I assumed it was for some other reason.  Once I had time to look closer I realized the problem.  All is running smoothly now.  Again, thanks for your response.
  • PfSense-pkg-snort-3.2.9.1_12 – Release Notes

    1
    0 Votes
    1 Posts
    744 Views
    No one has replied
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.