• My suppress list and Sid mgmt are not working

    4
    0 Votes
    4 Posts
    617 Views
    bmeeksB
    @seantree said in My suppress list and Sid mgmt are not working: Hi Bmeeks, You are right! There is a duplicated process. I have killed that Zombie and everything is good so far. Thank you very much! Glad you got it sorted out. That duplicate process thing happens occasionally to some folks. Both me and the package maintainer before me have tried to stop it from happening, but neither of us have had 100% success. It has to do with the mechanism inside the pfSense plumbing that sends a "restart all packages" command every time certain things occur on interfaces. When these triggers occur multiple times in quick succession, multiple copies of Snort can get started.
  • Taming the beasts… aka suricata blueprint

    504
    2 Votes
    504 Posts
    345k Views
    J
    @shred yup, I've been there, I also got confuse about that. but that rule is to block other interface to access management port. some of the link or pictures of this guide did not retrieve when netgate upgrade their forum. [image: 1565052185679-02268e4d-4c47-4b6c-b5ed-0cdbe7ee2a20-image.png]
  • Suricata Inline and Traffic Shaping

    2
    0 Votes
    2 Posts
    418 Views
    bmeeksB
    Running Suricata with Inline IPS Mode automatically activates the FreeBSD netmap device. Using the netmap device seems to break things like traffic shaping and bandwidth recording. These are all issues within FreeBSD itself and are not directly related to pfSense nor Suricata. Unfortunately netmap is not a 100% mature technology on FreeBSD and thus has some warts. If shaping and bandwith monitoring are important to you, you should switch over to Legacy Mode blocking. On the other hand, if those things are something you can do without, then Inline IPS Mode offers several benefits when compared to Legacy Mode blocking.
  • Barnyard2 can't connect to remote mysql

    5
    0 Votes
    5 Posts
    896 Views
    R
    I see. I will stop using Barnyard2.
  • 0 Votes
    3 Posts
    1k Views
    R
    I was bitten by this bug as well: https://forum.netgate.com/topic/145455/barnyard2-can-t-connect-to-remote-mysql What database do you use? Maria DB or MySQL? I tried both in my Fedora box (outside of pfsense). They both failed.
  • Snort running on SG-1100 randomly stops working

    13
    0 Votes
    13 Posts
    2k Views
    C
    @bmeeks Thanks! I will try some of your suggestions. I think I am going to adjust the IPS policy to Connectivity. I am very happy with the SG-1100. It's perfect for a home firewall application. Another observation. I rebooted my firewall this morning and noticed the mem usage drop from 66% down to 31%. I am going to monitor it see if it creeps backup.
  • Surricata upgrading not completing

    2
    0 Votes
    2 Posts
    308 Views
    bmeeksB
    Are you sure you have connectivity to the AWS infrastructure where the Snort rules are hosted? Are you running any other package such as pfBlockerNG with DNSBL? Sometimes in the past the IP space where the Snort rules are hosted has wound up on somebody's "bad IP space" list. How long have you waited for the download to compete? Depending on your Internet connectivity and how busy the pathway is between you and the site, it could take several minutes for the rules to download. Finally, are you using a RAM Disk? If so, you need at least 256 MB of free space in /tmp for rules downloads to succeed.
  • Suricata Getting Updates

    21
    0 Votes
    21 Posts
    2k Views
    bmeeksB
    @NollipfSense said in Suricata Getting Updates: @bmeeks Hi Bill, just a note to update you that I had gotten the Akitio thunderbolt 2 PCie enclosure and added the Intel i350NIC I had...now running Suricata inline mode on the Mac Mini server converted to pfSense box, no problem...persistency is the key to success! During this process, I learned that it was Intel in collaboration with Apple who had created the thunderbolt interface; so, intuitively, the interface would work with Intel's NIC. I am one happy camper here! I confess to be rather surprised the Intel NIC in the Thunderbolt interface worked. Apple is not known for being big on interoperability with other vendors.
  • Snort v4.0_4 Package Update -- Release Notes

    1
    1 Votes
    1 Posts
    181 Views
    No one has replied
  • Suricata v4.1.4_5 Package Update -- Release Notes

    1
    2 Votes
    1 Posts
    180 Views
    No one has replied
  • Suricata Parse Error (solved)

    2
    0 Votes
    2 Posts
    775 Views
    NollipfSenseN
    @NollipfSense said in Suricata Parse Error: <Error> -- [ERRCODE: SC_ERR_SIZE_PARSE(198)] - Error parsing defrag.memcap from conf file - <Error> -- [ERRCODE: SC_ERR_SIZE_PARSE(198)] - Error parsing defrag.memcap from conf file - 33,554,432. Killing engine. Well, this is a little embarrassing however, I got the issue fixed and it's right here (33,554,432)...should have been 33554432. Suricata now runs in inline mode.
  • Suircata Throughput

    3
    0 Votes
    3 Posts
    447 Views
    bmeeksB
    Like user @ekke mentioned, if you are sensible about the rules you enable then you can achieve your target throughput. If you enable every rule category, then "no", you won't achieve your target throughput. By "sensible" I mean things like not enabling rules that inspect for issues that will not be a threat to your environment. For example, if you do not have Internet-facing and public DNS and mail servers, then there is no need to run any rules that scan for threats targeting mail or DNS servers. If you do not have Internet-facing and public web servers, then you don't need any web server rules. There are other cases, too, where some threats may not be a problem in your network environment. One thing you will have to do with that many cores is bump up the Stream Memcap parameter. Here is a link to an older thread on the subject: https://forum.netgate.com/topic/124850/suricata-fails-to-start.
  • 0 Votes
    4 Posts
    5k Views
    jimpJ
    At the hypervisor level, running in promiscuous mode allows the VM to see traffic not destined for its MAC address. The most common use cases for this are: HA - It's required for CARP to function L2 Bridging - Otherwise traffic for non-firewall hosts will be dropped as they have different MAC addresses. It's not necessary for packet captures or an IDS. That's promiscuous mode of the interface at the OS level, not in the hypervisor.
  • Limiting simultaneous SMTP connections

    2
    0 Votes
    2 Posts
    351 Views
    GertjanG
    Hi, A little hammering on a mail server isn't necessarily a bad thing. It helps to keep you, and itself, in shape. I'm not running myself a mail server behind pfSense, I hide it behind an empty iptables firewall (really : true, it's empty when the machine starts). I'm using world's famous fail2ban to scan the mail server log file, and when fail2ban finds suspicious actions like rejected mail connections then it will load the IP into the firewall for some time. This is the result. Blocking some 5k IP's right now, and counting. It will be holiday soon, so some new scores will be reached in a week or so. fail2ban scans all log files of all server type applications, from SSH to mail to web server and some others. Blocking suspicious IP's was solved a decade or two ago. Just let the tools work for you ^^ Btw : setting up the tools is one thing. You, as an admin, has to read => yep, read ! - the logs to see for new behavior, and if found one, add new filters for it. It's a never ending story. Live is hard when you don't (know how to) script.
  • WAN traffic graph not showing outbound traffic

    Moved
    11
    0 Votes
    11 Posts
    2k Views
    P
    @bmeeks Thanks for the insight.
  • Reopening: Suricata inline mode hides outbound traffic graphs

    1
    0 Votes
    1 Posts
    135 Views
    No one has replied
  • 0 Votes
    8 Posts
    4k Views
    bmeeksB
    @oldrik said in Setup and configure snort on pfsense to detect an intrusion detection attemps within a LAN: @kiokoman pls if i understand well, does it mean that snort can't actually alert and block an attack such as a portscan performed by a user on a LAN network to another user on the same LAN ???? if that is the case, how can snort be configure to alert and block a user on a LAN from another user on the same LAN who perform an attack such as a portscan ??? Thanks in advanced Snort runs on the firewall. The firewall is not in the traffic path if two machines on the same LAN talk to each other. Only the LAN switch is in that pathway. The only time the firewall can see traffic from a LAN client is when that client is communicating with an IP address that is NOT part of the LAN. That would be a different LAN subnet where the firewall is the route to the different subnet, or some host out on the Internet (which means the traffic is traversing the WAN interface). So since Snort would not see one LAN client port scanning another LAN client (in the same subnet), it can't do anything about it. If you wanted to monitor traffic between LAN hosts on the same network, then you will need a managed switch that provides a span port (or port mirroring). You would then configure mirroring on the switch and set up a separate installation of Snort on say a Linux host on the LAN and connect that host to the span port on the switch. Only then could Snort on the Linux host see traffic between other LAN hosts.
  • Suricata - Block on drop not being respected for certain rules

    4
    0 Votes
    4 Posts
    454 Views
    bmeeksB
    @karel said in Suricata - Block on drop not being respected for certain rules: I was able to reproduce this every time. I've just suppressed those alerts for now. Thanks for the feedback. I will see about reproducing this in my test virtual machines and look for a cause. Might be something within the binary itself. It will be a few days before I have time for the testing, though.
  • Is it possible to block DoH and DoT, using SURICATA

    6
    0 Votes
    6 Posts
    2k Views
    johnpozJ
    @jwj said in Is it possible to block DoH and DoT, using SURICATA: I'm not holding my breath for relevant updates to privacy legislation. Too much money in surveillance capitalism and politics. Very very true! Also the lawmakers don't understand any of it.. Kind of hard to pass legislation on tech that is all just magic to you.. We are just doing what the users want! We are providing a service - they agreed to it, etc. etc. Oh by the way here is some $ for that thing you wanted to get done.. We are here to help! ;) Also problem is the tech "can" be used for good!!! What your watching on TV is minor shit in the big picture.. Guns can save your life from that bear, they can be used to feed your family... But they can also be used by bad guy to kill you.. Same goes for some of this tech - its all double edge swords.. They can cut the stuff you want to cut, but they can also cut you bad!
  • pFsense not connect to the Internet at all! + SNORT Update failed.

    2
    0 Votes
    2 Posts
    209 Views
    bmeeksB
    Well, first off your problem does not sound like a Snort problem. If you disable Snort on all interfaces do things work then? If not, you have to troubleshoot that first and only then come back and enable Snort. If you have any sort of Proxy package installed on your firewall, that's the first place I would start my troubleshooting. The fact you mention issues with basic package installation makes me think either connectivity issues at the hardware layer or something related to a proxy since you mentioned https_proxy in your post.
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.