• Suricata 3.0 Inline Mode & Traffic Shaping

    3
    0 Votes
    3 Posts
    1k Views
    G
    Bill: Thanks for the update. You have confirmed the issue. Howard
  • Snort Suppress List Edit in 2.3

    5
    0 Votes
    5 Posts
    1k Views
    bmeeksB
    @vbentley: I am unfamiliar with bootstrap, but I think this is a style sheet issue. I have had a quick look but run out of time today to actually start experimenting with changes. In pfSense.css it look like this style dictates the width .col-sm-10 .form-control {     width: calc(50% - 15px); } I will try and get back to this later in the week. You are correct it can be fixed by modifying the CSS, but it would not be good behavior for a package to do that.  You can override the Bootstrap default style for any object (HTML element, actually) by adding the appropriate attribute on the page.  I've done that in other places within the GUI for Snort and Suricata for textarea controls.  I will do the same for this control. If you want to experiment (and maybe learn a little about Bootstrap), here is an example of adding the additional attributes to the textarea control – $modal->addInput(new Form_Textarea ( 'logtext', '', '...Loading...' ))->removeClass('form-control')->addClass('row-fluid col-sm-10')->setAttribute('rows', '10')->setAttribute('wrap', 'off'); In Bootstrap, the class "col-sm-10" sets the width of an element relative to Bootstrap's 12-column grid.  It assumes the display device's screen is evenly divided into 12 columns.  So the widget above is set to be 10 columns wide.  Ignore the use of $modal.  In the file we are discussing for editing a Suppress List, the variable name is $section. Bill
  • PfSense wan (em1) constantly pinging my modem. Anyone knows Why?

    6
    0 Votes
    6 Posts
    1k Views
    P
    Thanks! I'll re-enable it for 1 time per second and disable that rule in suricata. No i its not a fancy setup just connected to the ISP fiber router/switch/modem.
  • Suricata and/or Snort categories on schedule

    4
    1 Votes
    4 Posts
    1k Views
    bmeeksB
    @lokapal: I guess real busyness environments will use Cisco solutions anyway in most cases  ::) My case is much more similar to educational organization campus. Do you like to explain to x00 linuxoids why they can't download at lightspeed their favorites ubuntus, debians, gentoos and scientific linuxes via bittorrent at least after worktime? 8) The same thing with online gaming…  ;D Why don't you create a Guest Wireless Network and give greater freedom there, but restrict its access to your school LAN?  Do you let the folks install and run P2P clients and games on your business or school machines?  If so, I would say that is a bad policy. At any rate, the answer to your original question is that currently neither IDS/IPS package offers such scheduling (it is not present in the underlying binaries anyway), and such a feature is not currently on the long-term planning radar.  You can schedule firewall rules within pfSense itself, but using those will be problematic because you would need to capture all the IP addresses of the potential P2P and gaming sites.  That is hard because the IPs can change frequently. Bill
  • Snort 3.2.9.1 on PFSense 2.2.6 - Alert but no host in Blocked list

    12
    0 Votes
    12 Posts
    3k Views
    bmeeksB
    I suspect it is working now.  That bug with the number of entries to display on the BLOCKS tab would cause it to by default display just one row.  Forcibly saving a new numerical value would fix any bogus value that might have gotten saved when the bug was in the code. All these things are fallout from the Bootstrap conversion of the package.  Bootstrap implements things a bit differently than the old system, and lots of things related to form input elements had to be changed in the GUI code. Bill
  • Snort Updating issue (SSL)

    22
    0 Votes
    22 Posts
    7k Views
    bmeeksB
    Firewall rules have nothing at all to do with your Snort rules update problem.  It is complaining about the certificate trust chain.  There either is, or your configuration makes cURL think there is, a self-signed certificate in the chain. Have you tried removing Squid entirely for a test to see if the rules download then?  The Snort code uses the built-in system function cURL() to download updates.  That function is called with a parameter set to verify SSL peers (in other words, check the certification trust chain).  That check is failing on your system because of the some specific configuration you have.  My bet is the problem is with Squid. Bill
  • Suricata inline mode and kernal error message

    14
    0 Votes
    14 Posts
    5k Views
    bmeeksB
    @ntct: Maybe similar problems about netmap. https://github.com/luigirizzo/netmap/issues/156 https://github.com/luigirizzo/netmap/issues/134 Hmm…might be some Netmap problems that are not directly related to Suricata.  pfSense 2.3 now compiles Netmap support into the kernel by default. Bill
  • Snort 3.2.9.1_12 Suppression List Error

    4
    0 Votes
    4 Posts
    2k Views
    bmeeksB
    There was a bug in the Suppress List code early on immediately after the initial Bootstrap version of the package was released.  It was eventually fixed, but it is possible it caused some junk to be left behind in your configuration. Bill
  • Snort blocks even after force disabling rule

    5
    0 Votes
    5 Posts
    2k Views
    S
    Good point and that is exactly what I was experiencing with Snort.  Seems to be working OK now after reinstall.  And just to follow up on my CRON issues that has cleared up as well. One of my CRON entries uses the wget command.  I'd forgotten I had to install that command as it is not native to the pFsense package.  So, for the machine I updated to 2.3 the wget command was already there and CRON worked.  For the machine I installed a fresh 2.3 the wget command was not there so CRON did not work and I assumed it was for some other reason.  Once I had time to look closer I realized the problem.  All is running smoothly now.  Again, thanks for your response.
  • PfSense-pkg-snort-3.2.9.1_12 – Release Notes

    1
    0 Votes
    1 Posts
    744 Views
    No one has replied
  • Suricata on pfSense 2.3 Bug Fix Status

    12
    0 Votes
    12 Posts
    3k Views
    bmeeksB
    @pfsenseboonie: Hi bmeeks, another one. When operating in legacy mode, blocks are shown on the blocks tab (https://<url>/suricata/suricata_blocked.php). Say I have list of blocks on this tab #1 - #7, If i want to delete block #3 and do so then blocks #3 - #7 are deleted instead of only #3</url> I will check this out.  I have some other fixes to put into the Suricata package as well. Bill
  • First shot at Snort…

    2
    0 Votes
    2 Posts
    957 Views
    A
    i have that rule in my supress List suppress gen_id 137, sig_id 1
  • After 2.3 Upgrade, Snort Auto Stops after an hour or so [SOLVED]

    5
    0 Votes
    5 Posts
    2k Views
    ?
    Seems this issue resolved itself when I updated to the 3.2.9.1_11 package so I'm marking it at solved.
  • Missing custom.rules.rules on startup

    8
    0 Votes
    8 Posts
    2k Views
    bmeeksB
    @nfr: This is now fixed since 3.2.9.1_11. I also had some old information in the configuration from years ago when when using squid proxy. I removed a bunch of lines that were related to that and did a restore configuration from file. When the system rebooted everything came up correctly as well as upgrading to 3.2.9.1_11 from 3.2.9.1_10. On a unrelated item I noticed that the <blockoffendersip>both</blockoffendersip> setting got cleared when comparing configuration files. I was able to change this back in the web interface and it created a <blockoffendersip>2</blockoffendersip> . Whoa.  The <blockoffiendersip>setting is not correct.  It should be "both".  Looks like another Bootstrap conversion boo-boo due to how combo select boxes are coded in Bootstrap.  That might explain what some other folks are seeing.  I will investigate the code to be sure.  In the meantime, that value in your config.xml really should be the string "both". UPDATE:  I found the source of that incorrect setting. The fix will be out soon. Thanks for reporting this to me. Bill</blockoffiendersip>
  • Snort GUI Package update to 3.2.9.1_11 for pfSense 2.3 – Release Notes

    3
    0 Votes
    3 Posts
    1k Views
    bmeeksB
    @jbhowlesr: Would you mind if I hit you up on a side bar private message? I have a few questions about some of the setting in Snort. Basically, I want to understand a little better what they are for and what they mean. I replied to your PM. Bill
  • Does the APU/2 support NETMAP method?

    1
    0 Votes
    1 Posts
    778 Views
    No one has replied
  • Suricata does not block/drop packages in inline mode

    12
    0 Votes
    12 Posts
    6k Views
    P
    I finally got it working  ;D ;D ;D As I have read in another posting, someone succeeded in deactivating all rules, started suricata, then activated the rules and restarted suricata again. Up from that point, suricata started showing alerts at least. Afterwards I let suricata rebuild the "Interface SID Management File Assignments", that´s when suricata started blocking packages and showing them red in the alerts view. So maybe there had been some incompatible rules or settings in the older pfs-version-data I imported in 2.3. Everything seems to be fine now. Thanks for your help.
  • Suricata Ignoring IPs in Pass List Aliases (Yes I've Restarted)

    14
    0 Votes
    14 Posts
    5k Views
    T
    You rock Bill. Thank you!
  • Suricata v3.0 / Custom.Rules

    3
    0 Votes
    3 Posts
    947 Views
    T
    @bmeeks: The fix for this is waiting for the pfSense developers to approve and merge.  I posted it late last Friday afternoon, so they are probably taking a bit of well-deserved downtime over the weekend.  I expect them to merge the fix this week. Bill No problem. I did spend some time looking to see if this was already mentioned. I guess I overlooked it. Thank you however for this fix and all the work you do for Surricata on pfSense.
  • Dual port intel card snort problem

    5
    0 Votes
    5 Posts
    1k Views
    G
    I already change to AC-BNFA still having the IP to Block source problem, the only way is to use both or destination. many thanks for the help
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.