• Snort for vpn traffic

    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
  • Suricata: Enabling payload and packet alert logging

    5
    0 Votes
    5 Posts
    7k Views
    J
    @bmeeks: @adam65535: I added config to the Advanced Configuration Pass-through text box in the interface edit settings and it does not appear to be added to the interfaces suricata.yaml file. I was hoping to add the payload logging to eve log.  Has anyone got the passthrough to work? outputs:   - eve-log:       types:         - alert:             payload: yes          # enable dumping payload in Base64             payload-printable: yes # enable dumping payload in printable (lossy) format             packet: yes             http: yes The best way to accomplish this is to add the information directly to the suricata_yaml_template.inc file in /usr/local/suricata/.  Just be sure to enter it within the correct section and DO NOT overwrite any of the string variables in curly braces (like "{$something}"). Configuration info entered into the template file will be added to every YAML conf file for every interface.  Once you add the new information to the template, you will need to manually stop then start Suricata on the INTERFACES tab. Bill I would like to this as well, but I am not as comfortable modifying the php as adam65535 did. I'd like to use the solution above, but I am a bit unclear on how to do so. In /usr/local/pkg/suricata/suricata_yaml_template.inc the relevant section for eve logging is: - eve-log:       enabled: {$enable_eve_log}       type: {$eve_output_type}       filename: eve.json       identity: "suricata"       facility: {$eve_systemlog_facility}       level: {$eve_systemlog_priority}       types: {$eve_out_types} so I am not sure how to add the relevant alert options under types as I can't control that it gets entered under the alert type properly with the {$eve_out_types} variable . Can anyone provide assistance on how to do this?
  • Uses aliases in snort suppress list

    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
  • Snort Rules Download Fail: "SSL certificate problem"

    14
    0 Votes
    14 Posts
    4k Views
    S
    BBcan177, Your white-listing suggestion seems to be working for the domain, "s3.amazonws.com" (which apparently hosts the Snort rules). Thank you for taking the time to provide this information! ;D All the best,
  • Snort: No more VRT-Updates? -> Snort-Version too old?

    14
    0 Votes
    14 Posts
    4k Views
    O
    I, too, am unable to download snort updates. Specifically, there are two issues: 1. I have unchecked "Click to retain Snort settings after package removal." Then uninstalled, then rebooted, and still Snort remembers my settings (including my oinkmaster code) 2. Ignoring that….. and more importantly, when trying to update VRT rules using snort 3.2.9.1_14, I get the following error. Any ideas? Starting rules update...  Time: 2016-08-11 22:05:58 Downloading Snort VRT rules md5 file snortrules-snapshot-2983.tar.gz.md5... Checking Snort VRT rules md5 file... There is a new set of Snort VRT rules posted. Downloading file 'snortrules-snapshot-2983.tar.gz'... Snort VRT rules file download failed.  Server returned error 0. The error text was: Connection timed out after 15015 milliseconds Snort VRT rules will not be updated. The Rules update has finished.  Time: 2016-08-11 22:07:59 I have tried more than 10 times over the last 3 days. I run the following packages: pfblockerNG 2.1.1_1 with TLD features enabled squid Squidguard Machine: C2758 16 Gigs ECC ram 4 onboard intel NIC 1x PCI-e intel 4 port pro/1000 PT
  • Suricata on pfSense 3 starts and kills the WAN

    32
    0 Votes
    32 Posts
    9k Views
    D
    Is it possible that the inline feature is blocking the src and dst. This would kill the WAN for sure. I would assume that the inline and legacy would treat the rules in the same manor. I do have the WAN and local IP's in the pass list. When this issue occurs in inline mode. I can no longer access the GUI, but the console still works. What can I run in the console to test the interfaces when this occurs?
  • Snort refused to start after this mornings update

    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
  • Snort time from detection to block

    5
    0 Votes
    5 Posts
    2k Views
    D
    Reading up on Suricata looks like the answer to my needs now that the inline option is available. Thanks
  • Block subnets in snort

    5
    0 Votes
    5 Posts
    1k Views
    D
    Impossible to control with a cron script. Attack is finished by the time script is run. If anyone has an ingenious way of handling this, let me know. Eventually every email server will be prone to this type of spam. I do prevent these emails from getting into mailboxes with a filter, I just want to eliminate it from the source so the attacker thinks this IP is blocked. Every day I add another 2K-4K IP's to the block alias. Eventually this will have performance effects.
  • Which system am I running?

    2
    0 Votes
    2 Posts
    841 Views
    D
    Best to ask over in the Packages-IDS/IPS subforum https://forum.pfsense.org/index.php?board=61.0, dedicated to exactly those type of questions.
  • HELP: high packet loss with suricata on pfsense in IPS mode

    1
    0 Votes
    1 Posts
    2k Views
    No one has replied
  • Netcore inbound Hacks Attempt

    6
    0 Votes
    6 Posts
    1k Views
    P
    All of the IPs that are scanning for this port are mainly in China and South America…..
  • Suricata custom.rules payloads doesn't block or alert

    3
    0 Votes
    3 Posts
    1k Views
    P
    Wrong depth keyboard in my rules. Thank's fsansfil, your rule works like a charm  ;)
  • Pfsense ids(snort) on bridge interface

    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
  • Pfsense Snort Takes too much time to start when Enabling all Rules

    5
    0 Votes
    5 Posts
    3k Views
    D
    Thank you Mr Bill, i will explore it
  • Snort as IPS - Blocking threshold

    3
    0 Votes
    3 Posts
    1k Views
    bmeeksB
    In a similar vein to manually creating rules as BBcan177 suggested, you can also manually create/edit a Suppress List and add thresholding values to GID:SID pairs.  After creating/editing the suppress list, make sure it is selected as "active" on the INTERFACE SETTINGS tab, and then restart Snort on the interface. Go to the SUPPRESS tab and either edit an existing list or create a new one and add the new threshold rule. Bill
  • Snort not update

    7
    0 Votes
    7 Posts
    4k Views
    S
    Upgrading to 3.2.9.1_14 fixed this issue for me.  This version updates the version of snort so between _13 and _14, it bigger then just a minor change.  Would be great for future changes to snort-pfsense, to be visually apparent when larger changes were made (meaning don't only change the minor version).  I was looking at this for an hour and didn't realize the version of snort changed, outside a few big fixes.  No more errors now w/ the latest pfsense and latest snort (as of this post).
  • Noob Question Snort/Oinkcode Rule Sets?

    1
    0 Votes
    1 Posts
    566 Views
    No one has replied
  • Snort VRT free gone?

    2
    0 Votes
    2 Posts
    1k Views
    D
    I did notice that there was a snort update, after I applied the update the snort VRT rules worked again.
  • Snort and subnet

    6
    0 Votes
    6 Posts
    3k Views
    bmeeksB
    @vehpbkrby: Thank you for your help! But I do not operate your suggestions. See. I have a few local subnet. 192,168,0,0 \ 24 192,168,1,0 \ 24 192,168,2,0 \ 24 192,168,3,0 \ 24 Pfsense has 2 interfaces (WAN, LAN) and NAT. LAN = 192.168.1.18, gateway = 192.168.1.30 (subnet 192.168.1.0/24) If I use the default settings home and external network is: All computers that have Adresse 192.168.1.0/24 subnet can not use Skype. But those computers that have the addresses of the other subnets, such as my computer is 192.168.0.46 address they are using Skype - it is not blocked! How do I set up what would snort could block Skype from all the local subnet range Oh, I see.  You have some other subnets behind the pfSense firewall that are not locally attached.  In that case you need to add just those specific networks to HOME_NET along with the default values.  Try this – 1. Create an Alias called ExpandedHomeNet or something else that is appropriate in your view. 2. Add these networks to the new alias:  192.168.0.0/24, 192.168.2.0/24 and 192.168.3.0/24 3. Create a Pass List on the PASS LIST tab and give it a name similar to CustomHomeNet or something.  Leave all the checkboxes enabled (checked) on the Pass List Edit page. In the Address field, enter the name of the alias created in step 1.  Save the new list. 4. Go to the INTERFACES SETTINGS tab for the interface in Snort and in the Home Net drop-down, select the list created above. 5. Click the View List button beside the control and verify the list contains your WAN IP, DNS IP, the 192.168.1.0/24 network, all three of the networks added to the alias and your default gateway IP. 6. Save the changes and restart Snort on the interface. Bill
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.