• One way snort and WAN

    1
    0 Votes
    1 Posts
    707 Views
    No one has replied
  • Suricata: How many Suricata processes should be seen?

    5
    0 Votes
    5 Posts
    2k Views
    G
    Suricata seems to allocate 1.5 detection threads per core.  So on my Firewall with 4 cores, I get 6 detection threads and a management thread making 7 for a single LAN interface. More information in the Threading sections here: https://redmine.openinfosecfoundation.org/projects/suricata/wiki/Suricatayaml
  • Snort Blocking Disabled on LAN - Keeps On Blocking

    10
    0 Votes
    10 Posts
    4k Views
    bmeeksB
    @jpvonhemel: All is well and I am only seeing alerts and no blocking now.  Any idea how I ended up with duplicate processes running? Thanks, Jerold This can happen when your WAN IP address changes/updates or for whatever reason the system issues multiple "restart all packages" commands in a short period of time.  Snort can get started multiple times in this scenario.  There is logic in the shell startup script for Snort that tries to prevent this, but it does not always work. Bill
  • Fatal Error Starting Snort

    2
    0 Votes
    2 Posts
    2k Views
    bmeeksB
    @joemamasmac: Hello, I am getting an error when starting snort on my pfsense home installation.  The error is as follows. FATAL ERROR: /usr/local/etc/snort/snort_41876_re1/rules/snort.rules(9) Unknown ClassType: protocol-command-decode I was not getting any errors until May 13th, then suddenly this started.  It appears is it failing on reading a rule when snort starts, but I have no idea how to clear this out.  Any suggestions? Joe The failing rule is on line #9 in the file given in the error message.  Open that file and look at line 9 for the offending rule.  Have you fiddled with any of the preprocessor settings on the PREPROCESSORS tab?  Fiddling with preprocessors (as in disabling some of them that are enabled by default) without a total and complete knowledge of what each one is for frequently results in this kind of error.  Not saying a rule vendor cannot make a mistake now and then, but the most common cause of errors like yours is when someone has turned off a required preprocessor. Bill
  • Snort WAN Rules - Recommendation?

    1
    0 Votes
    1 Posts
    2k Views
    No one has replied
  • Rule reference links in Snort/Surricata Alerts GUI

    2
    0 Votes
    2 Posts
    1k Views
    bmeeksB
    This would involve quite a bit of overhead.  Currently none of the references data is recorded with alerts.  That is just the way Snort and Suricata work.  The only thing you get is the GID:SID and a handful of other parameters.  The References are not included, so the PHP code would have to work some complicated magic behind the scenes to find and link the references. If you want this level of information, better to configure Snorby or a similar logging repository and send alerts over there.  Snorby has a process where it will automatically find the references if you configure a separate product to provide it the raw rules files.  To do this right and with decent speed would require a relational database.  You don't want that running on your firewall. Bill
  • GUI suggestion

    3
    0 Votes
    3 Posts
    999 Views
    M
    Hi Bill! Thanks for the insights of how things work :) If it can be modded great, it it can`t I will click trough :) Not a problem at all.
  • Snort - Best Search Method for Core 2 Duo, 4GB RAM. ET Open rules ?

    3
    0 Votes
    3 Posts
    3k Views
    H
    @THS: Hello. I noticed that my CPU was hitting 77 degrees C with my 100Mbps connection saturated. What Search Method is ideal for this setup ? Default is AC-BNFA.  I notice that my system is only using 1.8GB out of the 4GB available. Is one of the search methods easier on the CPU but better utlilizes the 4GB ? Also, what about ET Open rules ? For VRT, I have IPS Policy Selection set to "Balanced" There is no Policy for ET Open rules.  Which ones are recommended for home / home office use ? I am NOT running any servers btw. I have a similar set-up to your system running snort and its using less than 1GB! Try AC-BNFA-NQ for search method. Personally I do not tick/use IPS Policy,  I pick the rules manually (untick that option to pick rules manually). I also use Snort GPLv2 Community Rules (VRT certified) If you choose to pick the rules manually I recommend starting with the following rules below, test them for false positives and suppress the false positives there will be quite a few when your just starting to use snort. Add new rules as you go along test and suppress. Good luck! Start with these: emerging-malware.rules, emerging-trojan.rules, emerging-worm.rules, emerging-ciarmy.rules, emerging-current_events.rules, emerging-dshield.rules,  emerging-compromised.rules, emerging-scan.rules, emerging-info.rules, emerging-exploit.rules,  emerging-mobile_malware.rules, emerging-misc.rules.
  • 0 Votes
    2 Posts
    1k Views
    N
    For anyone else having this issue:  delete the file /var/run/snort_pkg_starting.lck and try again. Snort should start right up.
  • [Solved] Snort Updates - Bad MD5 checksum's (all files)

    3
    1 Votes
    3 Posts
    5k Views
    bmeeksB
    Very, very bad idea to use RAM disks with Snort or Suricata.  You will run out of disk space and have weird issues.  You just experienced one of them. I suggest only running the IDS/IPS packages on systems with a relatively large hard disk (conventional or SSD) and stay away from NanoBSD installs and the use of RAM disks. Bill
  • Backup doesn't save dropsid.conf file…

    2
    0 Votes
    2 Posts
    706 Views
    bmeeksB
    Those files reside physically on the firewall and are not part of a config.xml backup.  That's why the icons are there to download the files so you can save them offline elsewhere. Bill
  • Snort alert due to .pw DNS request : rule 1:28039

    16
    0 Votes
    16 Posts
    7k Views
    M
    @BBcan177: How do you quickly find out in which category that SID is, BB? In the screenshot… it says "INDICATOR-COMPROMISE" So short answer: "Snort-Indicator-Compromise" category… Looking at the rule, its enabled with the "Balanced" and "Security-policy" setting: alert udp $HOME_NET any -> any 53 (msg:"INDICATOR-COMPROMISE Suspicious .pw dns query"; flow:to_server; content:!"|01|u|02|pw"; content:"|01 00 00 01 00 00 00 00 00 00|"; depth:10; offset:2; content:"|02|pw|00|"; distance:0; fast_pattern; metadata:policy balanced-ips alert, policy security-ips drop, service dns; classtype:trojan-activity; sid:28039; rev:5;) You can click on the "Disable Sid" Icon in the Alerts, or Blocked Tab, to disable on the WAN… and then goto the "LAN Rules" tab in Snort/Suricata and select the Category "Snort_indicator_compromised.rules" and enable sid 28039. You might need to re-start the Interfaces for it to take effect... If you find that its a False Positive, you could add a suppress to the LAN Interface suppress List, so the rule will only fire for other .pw domains, excluding this particular DST IP... (Once you figure out which DST IP you want to suppress that is...) suppress gen_id 1, sig_id 28039, track by_dst, ip x.x.x.x You know I love you with all my heart, BB  :P But I have no'Snort-Indicator-Compromise'-category, really not ;D Pic to prove**:-*** It turns out I found it, thanks to your tip, in IPS Policy - Security.It was disabled, I enabled it now. Let's see what shows up now. Thanks BB  :P [image: BB_daman_hecan.jpg] [image: BB_daman_hecan.jpg_thumb]
  • Suricata 3.0_7 crash report - pfSense 2.3 (2.3_1)

    1
    0 Votes
    1 Posts
    869 Views
    No one has replied
  • Suricata incompatibility with pcap utils? (tcpdump / tshark)

    5
    0 Votes
    5 Posts
    2k Views
    T
    Just wanted to confirm that this happens even in a vm (VMware Workstation 12 Pro), so it's not a hardware/driver issue.
  • Suricata GUI package v3.0_6 for pfSense 2.3 - Release Notes

    29
    0 Votes
    29 Posts
    7k Views
    N
    i have doble the rules for LAN interface performed the test for some unknown reason…may be start/restart service i start seeing wan alerts. i have no explanations ...still looking on to understand why it start working now
  • Suricata / Drop rule

    7
    0 Votes
    7 Posts
    10k Views
    T
    Bill, thank you for the additional information. It is helping my understanding click together. I am not interested in MITM attacks. I just want to shut down certain things not eavesdrop. fsansfil, thank you for showing a way to achieve what I was looking for. There is so much to Suricata to take in. As with anything, time and experience is what is needed along with some outside help.
  • Certificate Error Flagged - Suricata V 3.0

    3
    0 Votes
    3 Posts
    665 Views
    G
    Thanks Bill your thoughts are the same as mine. It must be their web hosting service.
  • Suricata v3.0 - Drop Rules Highlight Color

    4
    0 Votes
    4 Posts
    1k Views
    bmeeksB
    @TEP71: Bill, Thank you very much. I understand I will have to change this every time there is an update. It wasn't a hard change to make and it is something I can do when needed. Thank you again for your time. –Thom Glad to be of help. Bill
  • Snort - Performance Tweaks

    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
  • Snort blocked pfSense Forum

    4
    0 Votes
    4 Posts
    4k Views
    MikeV7896M
    That's happening because of a SIP rule (spp_sip)… and yeah, a web address URL for many sites would certainly be too long for SIP. The better question would be why a SIP rule is being triggered for a web connection.
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.