• To Snort or not & pfBlocker

    8
    0 Votes
    8 Posts
    10k Views
    bmeeksB
    @johnpoz is correct. Having an IDS/IPS or pfBlockerNG is not mandatory to secure your data. They are just two of many different tools that when used in the right context for the right reason can enhance security. But they are not required. It all depends on the specific network that needs protection and what constitutes "normal" traffic on that network. My personal opinion is that most small home networks really don't need either package. The very best security practice is simply being committed to keeping your software packages updated. This means the firewall itself and of course any client applications on PCs, tablets, phones, etc. That simple practice goes a very long way towards enhancing security. If you have network users at home that are what I call "free clickers" (meaning they will click on any link anywhere .. ), then it might be helpful to have some additional tool such as an IDS/IPS or pfBlockerNG to help protect those users from themselves. On the other hand, if you have responsible, alert and careful users (that watch what they click), you very well need nothing else besides maybe the built-in anti-virus that comes with Windows just so you can scan any files you download. In a business network, there are other considerations where using an IDS/IPS or a tool such as pfBlockerNG with its geo-blocking capability is helpful to security. A great use of an IDS/IPS in a business network is to let it scan outbound traffic using rules that look for malware CNC server and botnet destinations, traffic destined to known untrusted countries, or any other traffic that should not normally be exiting your network. For example, if you have internal DNS servers that clients are configured to use, you could have a rule that would alert on any outbound DNS request that did not originate from your internal DNS server. Another handy thing for business networks would be using Snort's OpenAppID technology to identify non-work related traffic that violates a business policy. I am not a fan of having a list of say a couple of million IP addresses that my firewall is actively blocking. I would instead turn that around and be much more specific with what I allow in and then let the default deny rule take care of everything else. Your firewall will sweat a lot less and you won't have memory and stability issues caused by having huge IP block lists. Do a quick search here on the forum for users posting about Unbound problems that are frequently the result of having huge DNS blacklists enabled. I know some folks use this feature for ad blocking, but I prefer to do ad blocking at the client level using tools like uBlock Origin in the browser. Between that and AdBlock for YouTube I don't see a single add on any web site I visit or any YouTube video I watch. Granted I'm an old fart and do my web browsing on a PC where the screen is big enough for me to see it ... . Maybe if all my browsing was on my iPad or iPhone, where ad blockers are not as prolific, I might go for something like Pi-Hole or DNSBL. Just my two cents worth for the debate ... Bill
  • (Solved)Snort custom rules doubt?

    5
    0 Votes
    5 Posts
    1k Views
    perikoP
    @bmeeks thanks for your great help!!!
  • ET Open Ruleset not downloading

    10
    0 Votes
    10 Posts
    3k Views
    bmeeksB
    @talaverde said in ET Open Ruleset not downloading: pfBlockerNG is a possiblity A package such as pfBlockerNG is a very useful tool, but it can be misused or misapplied sometimes leading to frustration. It works essentially as a long list of IP addresses to be blocked. Those lists can be configured from many sources. Not all of the sources are "current", and even those that are can frequently contain errors in the form of a legitimate web site IP address or netblock being lumped into a "bad actor" list. So when you have a security tool such as an IDS/IPS layered with another security tool such as pfBlockerNG, you have to immediately consider any "failing to connect" issues on your network as being caused by one of those packages. So in your case, if I saw failing ET-Open downloads, my first instinct would be to check my pfBlockerNG blocks to see if the address had gotten inadvertently blocked. The rules vendors use various CDNs (content distribution networks) to host their rules file for worldwide download. Sometimes a pfBlockerNG list might get overly aggressive and block one of those CDNs (or a segment of a CDN) because a bad actor IP lives in the same netblock. This has happened to folks in the past with AWS addresses. In the same vein, if I had connectivity issues on a client with a web site or other service, I would check both the IDS/IPS alerts to see if the address showed up there as well as the pfBlockerNG alerts to see if something there tagged it. I would do that before I considered anything else on the client itself. Neither of these tools (Snort/Suricata nor pfBlockerNG) is a "click it on and forget it" type of package. They require constant baby sitting by a knowledgeable admin. So in the future, when you have any kind of connectivity issues outside of something obvious like a hardware failure, look first at your IDS/IPS and pfBlockerNG tools as the source of the connectivity issue. Only after eliminating both packages as the cause of the "block" should you look at potential client issues such as software bugs or something.
  • Snort intermittently seems to crash, trying to find why

    6
    0 Votes
    6 Posts
    1k Views
    bmeeksB
    @pftdm007 said in Snort intermittently seems to crash, trying to find why: @bmeeks Thanks for letting me know that! I did not happen to browse the forums about this specific issue/topic... I think these services should not be available in Watchdog's available services to monitor if this is that critical? Anyways, +1 for implementing a real monitoring feature for such critical processes I think.. Snort and Suricata are unique in how they operate. They are quite different from services such as the ntpd daemon or something like sshd, for example. The two main differences are Snort and Suricata spawn separate executables for each configured interface, and both services restart themselves following a rules update. If you have LAN and WAN instances of Snort or Suricata configured, that means two separate snort or suricata processes are running: one per interface. Service Watchdog simply does the equivalent of a ps -ax | grep snort to see if a monitored process is running. So if it finds any snort process with that query, it is happy. But Snort might be running on the LAN yet have crashed on the WAN. Service Watchdog would never know that. The other thing that trips up Service Watchdog is that it does not understand that Snort and Suricata restart themselves following a rules update. So if Service Watchdog happens to test for the existence of a Snort or Suricata process during that rules update restart, it will find no running instance and immediately try to start one up. That will likely collide with the restarting Snort or Suricata is doing itself following the rules update and can result in a crash.
  • (Solved)Snort ACL exist?

    3
    0 Votes
    3 Posts
    692 Views
    perikoP
    @bmeeks reading learning, thanks again!!!
  • Snort - not working with HTTPs urls/IPs

    2
    0 Votes
    2 Posts
    277 Views
    bmeeksB
    @sandeep335577 said in Snort - not working with HTTPs urls/IPs: I am using snort with my pfsense. I have added two IPs(By doing ping command for two different sites) in my IP lists file section and then marked the file as a blacklist file inside wan/lan. When i try to open non-https urls it gets blocked but the url with https doesnt get block. My first suspicion is that the two URLs are actually resolving to different IP addresses (but that would definitely be weird if they are supposedly the same site). Snort does not care about the protocol at all when using an IP blacklist. It only goes by the IP address.
  • Allow some LAN IPs bypass snort?

    4
    0 Votes
    4 Posts
    2k Views
    bmeeksB
    You can use the IP Reputation feature to accomplish this. First, upload an IP list containing the IP addresses of hosts you wish to exempt from Snort rules. You do this on the IP LISTS tab of the Snort GUI. Next, go to the LAN INTERFACE SETTINGS tab in Snort and edit the LAN interface. Choose the IP REP tab. There you will enable whitelisting by adding/selecting the IP list you uploaded earlier. Details on Snort whitelisting and blacklisting can be found in the Snort docs here.
  • How to test Snort LAN protection

    5
    0 Votes
    5 Posts
    2k Views
    T
    Perfect. That's what I needed to know. Now I have a new project to work on. Thanks! I'm already running my pfSense firewalls on HyperV. I don't have any unused physical ports, unless I un-team some. However, I'm sure I could simply add another internal network to my pfSense VM and connect the Kali Linux VM that way. I'll figure out something. Again, thanks.
  • Detect using proxy browser extension in local area network

    4
    0 Votes
    4 Posts
    563 Views
    johnpozJ
    Hey is saying that since there is detection listed for it ciscos VDB, that there is prob a rule... My guess would be openappid could be used to detect it.
  • Use Snort or Suricata to populate pfSense Alias?

    2
    0 Votes
    2 Posts
    442 Views
    bmeeksB
    You cannot populate aliases with either the Snort or Suricata packages. They are just not designed for that purpose. Also, Suricata does not have a DPI equivalent of Snort's OpenAppID feature. If I understand what you are wanting to do, I know of nothing that can do that. Sounds like you want to dynamically route traffic depending on the packet type (after a Layer 7 deep packet inspection to identify the underlying app protocol).
  • Suricata RAM for multiple processors/cores?

    2
    0 Votes
    2 Posts
    1k Views
    bmeeksB
    A high core count CPU like you have will definitely need more memory allocated for the TCP Stream Memory Cap. With 8 cores I would start with 256 MB and test upwards from there. The parameter is found on the FLOW/STREAM tab. View the suricata.log file for the interface on the LOGS VIEW tab to see if you are hitting a Stream Memory Cap limit.
  • Suricata 4.1.3 is available at freshports

    4
    0 Votes
    4 Posts
    279 Views
    bmeeksB
    The pull request to update the Suricata package to 4.1.3 has been posted for the pfSense developer team to review and merge into pfSense-2.5 DEVELOPMENT. Here is the link: https://github.com/pfsense/FreeBSD-ports/pull/631.
  • Cant enable Suricata on all interfaces

    5
    0 Votes
    5 Posts
    1k Views
    M
    Thought i would post for my own reference and anyone else with this problem.... Rebooting the firewall results in Suricata listening on all interfaces with 1 instance (startup). So, the problem fixed itself.
  • pfsense snort & suricata about

    Moved
    2
    0 Votes
    2 Posts
    2k Views
    Joe FridayJ
    Yes, Snort and Suricata are IDS/IPS packages that can be used in pfSense. Google would be a great place to compare features and differences. (Lots of reading available on the subject) If you are trying out either for the first time, BMeeks posted a reply to a question for another user trying out Snort that may be of some use for you. (another good read): https://forum.netgate.com/topic/141743/best-rules-to-best-protection-in-wan-and-lan-interface/2
  • 'SURICATA STREAM pkt seen on wrong thread' when using workers run mode

    3
    0 Votes
    3 Posts
    1k Views
    bmeeksB
    Hmm... that sounds like something you might want to ask the upstream Suricata team. I'm not sure of its significance. The Suricata bug reporting/issues site is here: https://redmine.openinfosecfoundation.org/projects/suricata. When giving them your configuration, tell them you are using inline IPS mode with netmap on FreeBSD. If you are on pfSense 2.4.x, then the FreeBSD version is 11.2; if you are using pfSense-2.5-DEVEL, then the FreeBSD version is 12.0.
  • Snort v3.2.9.8_5 - Release Notes

    1
    0 Votes
    1 Posts
    209 Views
    No one has replied
  • snort does not block

    5
    0 Votes
    5 Posts
    859 Views
    P
    @bmeeks thanks a lot!
  • False Positive?

    4
    0 Votes
    4 Posts
    968 Views
    K
    Thank you both for your input. Yes this will be a huge learning curve for me. I will keep on analyzing.
  • Limit what Snort listens to

    5
    0 Votes
    5 Posts
    585 Views
    R
    I'll probably just run anti-malware then and front everything in the DMZ with a WAF. I already have it behind NGINX and cloudflare. Thanks for the help!
  • Still seeing suricata stop an interface due to .pid error

    38
    0 Votes
    38 Posts
    6k Views
    V
    @bmeeks said in Still seeing suricata stop an interface due to .pid error: @val said in Still seeing suricata stop an interface due to .pid error: @bmeeks PM you the log file....it's way to big to post here. Thanks bmeeks. I looked through you log file. What version of the Snort Rules Snapshot file are you using? You should be using only rules packages for Snort 2.9.x if you are running Snort rules with Suricata. Your file name should be snortrules-snapshot-29120.tar.gz. Do not use the Snort3 rules (that means do not use any Snort rules file with 3 in the name). You should not be seeing those "unknown reference" error messages. The only time I've noticed those is when the user has downloaded the rules meant for use only with the new Snort3 beta package from the Snort team. Hi bmeeks I have since moved away from suricata backon Snort for now, my internet connection it's through an PPPoE connection so from my understanding suricata doesn't play well with PPPoE. I have tried few difference thing all result the same suricata still kill it self and wouldn't start again til I delete the pid file. Thanks for all the help.
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.