• Snort starting blocking almost all downloads

    9
    0 Votes
    9 Posts
    2k Views
    A
    @dgall: My problem is I did go thru the blocks and alerts at the beginning and  and made it so everything I wanted to pass thru did . A year later with out touching any of the settings its starting to block all kinds of websites while I dont mind going in and changing a few things here and there in PFsense but  I dont have time to stop from what I am doing in the shop 5 or 6 times a day because another website is blocked. We have people online looking at all kinds of websites for research and purchasing different things This does happen occasionally, as new potential threats are added to the rulesets through updates. As bmeeks mentioned, you could either run a generally more permissive ruleset, or disable blocking and have a look at what's going on every so often. Good security does need proper maintenance, as new threats are always emerging.
  • Snort 100%

    5
    0 Votes
    5 Posts
    2k Views
    M
    Same here. After Update to 2.2.4-RELEASE (amd64/i386)  Snort (3.2.8)  goes Up to 100% CPU and also the Memory is going high. I changed also for a test the settings (Search Method aso. ..)  But nothing happen - after a short time the CPU and Mem going high. I thought that is a Hardware-Problem, so i switched to the second-system (carp). But there goes the CPU/Mem also high. At the 2.2.2 the problem was not visble.
  • Snort throws errors and won't start

    4
    0 Votes
    4 Posts
    1k Views
    bmeeksB
    Look in /var/log/snort and then the subdirectory for the interface.  You will should see a file in there showing you which rules got "auto-disabled" due to missing preprocessor dependencies. You should not be hitting this error unless you have done something funny with your rules (like enabling some default-disabled rules pertaining to sensitive data). Bill
  • 0 Votes
    5 Posts
    1k Views
    A
    OK, thanks for your help.  I'll give it a try.
  • 0 Votes
    21 Posts
    10k Views
    D
    Created a PR to get this removed from the 2.1.x packages feed, since the package is useless now. https://github.com/pfsense/pfsense-packages/pull/1065
  • Suricata 2.1.6 install completed with failure, and now fails to uninstall

    3
    0 Votes
    3 Posts
    1k Views
    T
    That worked.  I was able to delete the Suricata package.  I'm left with what's causing my package downloads to fail, but will create a different topic for that after a 7 GB CentOS download completes in a few hours, if that is successful. Thank you!
  • Problem with pass list and domain 360safe.com. Please help

    4
    0 Votes
    4 Posts
    4k Views
    D
    What strikes me - people who wrote this really don't seem to have ever run a recursive resolver? Because, exactly as described, you end up with all root DNS servers blocked, plus whole slew of others => totally broken DNS.  Anyone can kill DNS for everyone on the network merely by resolving a bunch of blacklisted domains. If you wanted to prevent damage, you'd block the actual traffic to hosts in that domain. Not block completely innocent DNS servers. [image: 1314029819767.png]
  • Snort crashes on update

    7
    0 Votes
    7 Posts
    2k Views
    D
    Perhaps you should just stop updating the rules until upstream guys come back to senses. Already reported by someone else as well with different .so - see https://forum.pfsense.org/index.php?topic=98920.0
  • Snort: Where do I find a specific rule?

    24
    0 Votes
    24 Posts
    11k Views
    F
    Bill, you can also use Suricata 2.1beta4. Been using it on linux boxes for months, w/0 trouble. More stable and feature rich than 2.0.8, including CIDR IP Rep, etc.. Considering inline operation in IPS mode. Its now a real must. Malware as small as 20kb get pass the snort hybrid mode of pfsense… F.
  • Requesting input on adding new features to Snort pkg from experienced users

    16
    0 Votes
    16 Posts
    3k Views
    M
    @bmeeks: @Music: Will you also be upgrading it to snort 3.0? No, not in the near-term.  No upgrade on pfSense until Snort 3.0 goes full production and is not ALPHA or BETA software.  Also will not happen until the FreeBSD ports maintainer for Snort updates the package here.  Finally, there is a distinct possibility that Snort 3.0 will lose the ability to block offenders on pfSense.  I have not investigated this in detail, but I do know that the Snort team is deprecating the output plugins API that the custom blocking module for pfSense depends on.  If the API hooks the current blocking module depends on are not in Snort 3.0, then blocking won't work. Bill oh when that happens it will become kinda useless. Multithreathed option in snort would be nice that it might run smoother/faster etc when you have more then 1 core in the box you use.
  • Share Oinkmaster code?

    11
    0 Votes
    11 Posts
    2k Views
    D
    Yeah, we are telling you to pick one and use it… Other than that, you still provided ZERO information to debug any issues.
  • Force-disable this rule and remove it from the current rule set

    4
    0 Votes
    4 Posts
    2k Views
    bmeeksB
    @MilesDeep: Snort.  So to disable the rule means to force allow the traffic? That's one way of looking at it.  The actual effect is that rule is removed from the list that traffic is evaluated against.  Since the rule is not evaluated against traffic, it can't "fire" and trigger an alert.  This is a per-interface setting, so if you run Snort (or Suricata) on multiple interfaces you can have a rule enabled on one and disabled on another. Bill
  • Suricata starting error

    2
    0 Votes
    2 Posts
    2k Views
    bmeeksB
    Did you by chance disable all the logging options on the INTERFACE SETTINGS tab for that Suricata interface?  Can you post a screenshot of the Logging Settings from that screen? Bill
  • Snort 2.9.7.5 update coming soon

    7
    0 Votes
    7 Posts
    2k Views
    F
    I update it on 2.1.5 and works great
  • PFsense configuration lost with Suricata.

    3
    0 Votes
    3 Posts
    858 Views
    N
    Hi, NOT a single problem on pfsense x64 v2.15 & Suricata and now updated to pfsense x64 v2.2.4 and Suricata 2.1.6.
  • Suricata 2.1.6 fails to install on pfSense 2.2.4

    5
    0 Votes
    5 Posts
    2k Views
    T
    Never mind.  It looks like the versioning is correct. Thanks for explaining the downloads. "Services: Suricata 2.0.8 RELEASE pkg v2.1.6 - Intrusion Detection System"
  • Can't start Snort interface

    3
    0 Votes
    3 Posts
    1k Views
    T
    @doktornotor: Upgrade your pfSense. :) Yes just did fixed the issue Thanks
  • Snort 2.9.7.5 pkg v3.27 Update – Release Notes

    2
    0 Votes
    2 Posts
    687 Views
    F
    Thanks!  :D
  • Snort 2.9.7.5

    13
    0 Votes
    13 Posts
    3k Views
    bmeeksB
    @simby: Bmeeks, will be this in this release? It's not in the currently open Pull Request. Bill
  • Snort check for rule updates appearing as syslog errs, not info severity

    3
    0 Votes
    3 Posts
    821 Views
    F
    So limited API functionality in a way then. Ok thanks for letting me know, I'll add some exception rules for the monitoring system.  :)
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.