• 0 Votes
    2 Posts
    2k Views
    bmeeksB
    This is a bug within the Suricata binary itself.  It has been reported to Suricata upstream and will be fixed in the next release, I think.  It is only a warning and will not affect operation. Some changes were made to a section of code in the 3.2.x series, but one line got missed when those changes were made.  You can find the bug report and details on the Suricata Redmine site. Bill
  • Suricata Still adds IP's to snort2c table and blocks for disabled rules?

    5
    0 Votes
    5 Posts
    1k Views
    P
    Thank you that's very good to know for the future!
  • Using snort as sniffer and ide

    4
    0 Votes
    4 Posts
    823 Views
    bmeeksB
    Currently the GUI package builds a snort.conf file configured for alerting and capturing packets related to those alerts.  It was never intended to use Snort like Wireshark on pfSense, so that capability is not part of the standard snort.conf generation. Bill
  • Suricata to block time on home use!

    3
    0 Votes
    3 Posts
    745 Views
    M
    thanks Bill you tha MAN
  • [SOLVED] Snort Updates Fail Bad Checksum

    5
    0 Votes
    5 Posts
    2k Views
    bmeeksB
    @Ghostdragon97: That did the Trick. Thanks for the help! All rules updated just fine. Glad you got it going.  The /tmp directory is where the tar.gz files from the rules update are downloaded and then unzipped.  From there they get copied to /usr/local/etc/snort/rules.  You need enough free space on /tmp to hold the tar.gz rules package and then the unzipped contents as well.  I included /var because that's where log and alerts files go.  That volume can fill up on you as well. Bill
  • IDS on WAN ONLY?

    2
    0 Votes
    2 Posts
    701 Views
    NogBadTheBadN
    https://forum.pfsense.org/index.php?topic=91844.msg508332#msg508332
  • How to find rule which have sid,des alert?

    3
    0 Votes
    3 Posts
    651 Views
    bmeeksB
    There once was a web site out there where you could do that (match a GID:SID with category).  I'm not sure it exists or is maintained anymore.  I no longer have the URL. You can open a CLI prompt on the firewall and use grep to find a GID:SID within the rules.  To search all the available categories, grep all the *.rules files in this directory for Snort: /usr/local/etc/snort/rules/ If you have Suricata instead, then search the files in this directory: /usr/local/etc/suricata/rules/ Bill
  • Suricata IOS blocked

    5
    0 Votes
    5 Posts
    1k Views
    M
    thanks I got it working…. and yes I red X'ed it...
  • Snort alerts when logged in to network via VPN

    3
    0 Votes
    3 Posts
    885 Views
    K
    @bmeeks: Some guesses on my part – Something on your laptop was maybe trying to swap some AFP share info with FreeNAS.  That would not really be unexpected if you also use the laptop at home on the LAN. When you are home and everything is within your LAN, Snort will not necessarily be seeing NAS-to-laptop traffic as everything would be switched at layer 2 by your network switch.  So no alerts then if Snort and firewall does not see the traffic. When you are on the road, Snort sees everything on the VPN as it comes in from the WAN and gets sent on to the LAN. As for the alert itself, it could very well just be some kind of false positive in your setup.  Maybe some fragmentation is/was happening on the VPN side ??? Bill You are right of course that snort would not see this traffic if I was home.  The alert must be a false positive.  I'll suppress it. Thanks for all the work you do on the snort package.
  • Activate/Dynamic Rules

    3
    0 Votes
    3 Posts
    846 Views
    H
    Thanks a alot, Bill  ;)
  • PfSense 2.2 Snort pkg versions have been EOL'd, rules aren't updating

    3
    0 Votes
    3 Posts
    759 Views
    bmeeksB
    Yep, the current pfSense release versions and the 2.4-BETA have supported versions of Snort.  As soon as FreeBSD ports updates to a new Snort version, I try to get it submitted to the pfSense team for inclusion in the current release.  It is often times not possible to backport a new Snort to older pfSense versions due to changes in other dependent libraries.  Best to try and keep your pfSense installs in sync with the current release. Bill
  • Suricata 3.2.1 Package Update – Release Notes

    6
    0 Votes
    6 Posts
    2k Views
    A
    I'm also happy to report that transferring a sample .ISO file of a few gigabytes over HTTP with pattern matcher being set to AC resulted to 15-20M/s speeds with my connection. With HyperScan I'm seeing 24-29+M/s which is very close to the line speed. I'm on a 250/50 fiber. [image: fiber.PNG] [image: fiber.PNG_thumb]
  • Snort just completely and randomly has stopped working

    12
    0 Votes
    12 Posts
    4k Views
    P
    Figured it was now a good time to try out Suricata :)
  • Snort passlist - URL table IPs alias

    4
    0 Votes
    4 Posts
    1k Views
    bmeeksB
    @nagaraja: Hey Bill, for the infos i got, the only address snort is able to understand and whitelist, is only the URL address record inside URL alias. In other terms http://myserverip:port/list.something instead of the list content. I  also think this could be bad for snort since it allows numeric values only Thanks for your quick reply Yes, if the text URL got written into the actual passlist/whitelist file produced for the Snort binary that would cause errors.  However, the code in the binary plugin that parses the pass list entries will discard any non-numeric values and print an error to the system log.  So it should not cause the entire pass list to be ignored.  Just the offending line or lines would be ignored. Bill
  • SNORT rules update failing - already fixed, just future improvement?

    2
    0 Votes
    2 Posts
    535 Views
    bmeeksB
    Yes, it should be possible.  For that particular AppID feature, I was not the author of the code.  Another contributor from Brazil added that code and maintains the rules.  It is part of a University, I believe.  All that to say I have not examined that part of the code since the original pull request and I don't remember exactly how the URLs are handled. I will add it to my TODO list. Bill
  • Snort reverting to different rule sets

    2
    0 Votes
    2 Posts
    554 Views
    bmeeksB
    Something is really hosed up someplace.  Snort just should never do that, and I can't imagine any scenario under which that could happen.  Snort is not autonomous.  Are you sure your firewall is not haunted …  ;D. You can carefully examine the system log to see when (and if) Snort is restarting.  Do these "rule changes" coincide with restarts logged in the system log?  Is it possible someone else has access to your firewall and is making changes? I would suggest completely removing the package and then reinstalling it.  If that does not do it, then uncheck the box on the GLOBAL SETTINGS tab for saving settings and remove the package again and reinstall it.  Of course this second method will cause a loss of all previous settings, but it's possible that may be necessary to wipe out whatever corruption must exist someplace. Bill
  • PfSense suricata not working in bridge mode

    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
  • Update broken from 3.1.2_2 to 3.2.1_1

    6
    0 Votes
    6 Posts
    1k Views
    N
    @bmeeks: The "Save Settings" option is checked by default. Bill Smart Decision!  ;D
  • Snort alerts on LAN caused by VLANs traffic (LAN is parent interface)?

    3
    0 Votes
    3 Posts
    1k Views
    V
    Thanks Bill!
  • Problem with rules

    18
    0 Votes
    18 Posts
    5k Views
    bmeeksB
    @sthames42: @bmeeks: I don't mean to insult an IDS/IPS admin nor impune anyone's abilities.  There are lots of questions asked here and generally the background, training and skill level of the poster is unknown.  Sometimes those of us replying make erroneous assumptions, and for that I apologize in advance (and in hindsight if I offended with my original reply as I did not intend to offend). You didn't insult me, Bill, and I'm sorry for giving that impression. I really do appreciate the help. I was tired and frustrated with searching for information on what would seem an obvious question: what categories and rules are suggested for a fully robust IPS protecting public web, ftp, and mail servers and also acting as the portal for all of a company's access to the Internet. I confess I'm trying to cheat, here. As IT Director, this is just one of many, many enhancements I am trying to make to our networking architecture so I just want to learn, if I can, without covering old ground, what rule categories would be suggested for my commercial network IPS. Is there a list of categories you would suggest enabling that would give sufficient protection for the services we provide? All the recommendations I can find seem to be for home-based routers and not for a commercial web portal. Would you recommend starting with https://raw.githubusercontent.com/jflsakfja/suricata-rules/master/list.txt for my situation? Thanks, again. Steve He has a very good set of rules and is an experienced Suricata user.  I have not had contact with him in quite some time.  I believe he lives in Greece and suffered some serious injuries in a motorcycle or automobile accident a couple of years ago (can't remember which).  Prior to that he was very active on the forum here. Bill
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.