• Suricata on pfSense 2.3 Bug Fix Status

    12
    0 Votes
    12 Posts
    3k Views
    bmeeksB
    @pfsenseboonie: Hi bmeeks, another one. When operating in legacy mode, blocks are shown on the blocks tab (https://<url>/suricata/suricata_blocked.php). Say I have list of blocks on this tab #1 - #7, If i want to delete block #3 and do so then blocks #3 - #7 are deleted instead of only #3</url> I will check this out.  I have some other fixes to put into the Suricata package as well. Bill
  • First shot at Snort…

    2
    0 Votes
    2 Posts
    959 Views
    A
    i have that rule in my supress List suppress gen_id 137, sig_id 1
  • After 2.3 Upgrade, Snort Auto Stops after an hour or so [SOLVED]

    5
    0 Votes
    5 Posts
    2k Views
    ?
    Seems this issue resolved itself when I updated to the 3.2.9.1_11 package so I'm marking it at solved.
  • Missing custom.rules.rules on startup

    8
    0 Votes
    8 Posts
    2k Views
    bmeeksB
    @nfr: This is now fixed since 3.2.9.1_11. I also had some old information in the configuration from years ago when when using squid proxy. I removed a bunch of lines that were related to that and did a restore configuration from file. When the system rebooted everything came up correctly as well as upgrading to 3.2.9.1_11 from 3.2.9.1_10. On a unrelated item I noticed that the <blockoffendersip>both</blockoffendersip> setting got cleared when comparing configuration files. I was able to change this back in the web interface and it created a <blockoffendersip>2</blockoffendersip> . Whoa.  The <blockoffiendersip>setting is not correct.  It should be "both".  Looks like another Bootstrap conversion boo-boo due to how combo select boxes are coded in Bootstrap.  That might explain what some other folks are seeing.  I will investigate the code to be sure.  In the meantime, that value in your config.xml really should be the string "both". UPDATE:  I found the source of that incorrect setting. The fix will be out soon. Thanks for reporting this to me. Bill</blockoffiendersip>
  • Snort GUI Package update to 3.2.9.1_11 for pfSense 2.3 – Release Notes

    3
    0 Votes
    3 Posts
    1k Views
    bmeeksB
    @jbhowlesr: Would you mind if I hit you up on a side bar private message? I have a few questions about some of the setting in Snort. Basically, I want to understand a little better what they are for and what they mean. I replied to your PM. Bill
  • Does the APU/2 support NETMAP method?

    1
    0 Votes
    1 Posts
    778 Views
    No one has replied
  • Suricata does not block/drop packages in inline mode

    12
    0 Votes
    12 Posts
    6k Views
    P
    I finally got it working  ;D ;D ;D As I have read in another posting, someone succeeded in deactivating all rules, started suricata, then activated the rules and restarted suricata again. Up from that point, suricata started showing alerts at least. Afterwards I let suricata rebuild the "Interface SID Management File Assignments", that´s when suricata started blocking packages and showing them red in the alerts view. So maybe there had been some incompatible rules or settings in the older pfs-version-data I imported in 2.3. Everything seems to be fine now. Thanks for your help.
  • Suricata Ignoring IPs in Pass List Aliases (Yes I've Restarted)

    14
    0 Votes
    14 Posts
    5k Views
    T
    You rock Bill. Thank you!
  • Suricata v3.0 / Custom.Rules

    3
    0 Votes
    3 Posts
    947 Views
    T
    @bmeeks: The fix for this is waiting for the pfSense developers to approve and merge.  I posted it late last Friday afternoon, so they are probably taking a bit of well-deserved downtime over the weekend.  I expect them to merge the fix this week. Bill No problem. I did spend some time looking to see if this was already mentioned. I guess I overlooked it. Thank you however for this fix and all the work you do for Surricata on pfSense.
  • Dual port intel card snort problem

    5
    0 Votes
    5 Posts
    1k Views
    G
    I already change to AC-BNFA still having the IP to Block source problem, the only way is to use both or destination. many thanks for the help
  • Snort Block List Displays only 1 Blocked Host

    4
    0 Votes
    4 Posts
    1k Views
    bmeeksB
    This will be fixed in the next Snort update, which should be out soon.  Just finished fixing a list of Suricata issues, so now my slate is clean and ready for me to tackle the reported Snort bugs. Sorry for all the little issues, but the conversion to Bootstrap for pfSense 2.3 was a big chore and lots of little errors crept in. Bill
  • Suricata not working!

    15
    0 Votes
    15 Posts
    8k Views
    bmeeksB
    Darn it!  I thought I had the Stream Memory Cap default set large enough, but apparently not true in all situations. Bill
  • Snort on 2.3 not showing all blocked IPs

    7
    0 Votes
    7 Posts
    2k Views
    bmeeksB
    @Creep89: I experience the same problem on my upgraded 2.3 (2.2.6 -> 2.3). Snort blocks all the IPs, but only one IP is shown under the Blocked tab. But if you download the blocked IP list, you can actually see that far more IPs are blocked. edit: Nevermind, setting a new value of blocked entries to view and hitting "save" actually resolves the issue, now all blocked IPs are shown. Ah-ha!  Thanks for posting the solution.  This is an artifact of some Bootstrap fixes.  That value is not being initialized properly.  I will take care of it in the next Snort package update.  I am working on Suricata now, but hope to finish it up today. Bill
  • Google owned site blocked by snort because of nmap scans??

    8
    0 Votes
    8 Posts
    6k Views
    ?
    Google doesn't trust their own internal networks so why should anybody else? It is normal that Google is 24/7 online and a good basis for the scripts called bots (robots) and from there scans will be a long not able to get rid of them. So many "peoples" are placing then there bots into Google or other 24/7 sites. If you will be scanned ones more it is not unusual so if nothing is opened at the WAN interface you can be forget that scans.
  • ET code supress not working Snort

    7
    0 Votes
    7 Posts
    2k Views
    S
    @bmeeks: @Soonie: You have two running, and one of them is probably a sort of "zombie".  Kill them all and then restart Snort.  This happens now and then for some unknown reason.  Multiple instances get started on the same interface.  I have never been able to pin down the cause. The two lines showing /usr/local/bin/snort -R 45659 are the duplicate instances on the same interface. Bill Oke ThX very much i kill the zombie ;-)
  • Snort GPLv2 Community Rules Disabled

    3
    0 Votes
    3 Posts
    2k Views
    bmeeksB
    You can use the features on the SID MGMT tab to help automate "turning on" many of the GPLv2 rules.  Go to that tab, enable SID MGMT, then read through the comments in the sample enablesid.conf file.  Click the edit icon beside the file to open it for viewing.  It has comments to show you how to use the feature.  Should you decide to use the feature, create your own enableside.conf file and name it something besides "sample".  That's because those sample files are overwritten on each package reinstall, so if you make changes to the sample files they will get lost on the next update. Bill
  • Snort Uninstall not complete

    3
    0 Votes
    3 Posts
    812 Views
    H
    Hi, that works. Thanks.
  • Snort widget in pfsense 2.3?

    3
    0 Votes
    3 Posts
    876 Views
    M
    Thanks
  • Suricata is still not updating the rules (2.3)

    1
    0 Votes
    1 Posts
    581 Views
    No one has replied
  • SNORT Inexperience

    5
    0 Votes
    5 Posts
    1k Views
    C
    Thanks Bill.  No NAT in the switch.  I will take another look after my 2.3 upgrade.
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.