• Suricata 3.0

    2
    0 Votes
    2 Posts
    1k Views
    bmeeksB
    Suricata 3.0 is the new name for what was formerly called Suricata 2.1-BETA.  It is now in Release Candidate stage (currently on RC3).  There is some information posted about it on the Suricata site, but you have to dig around for the finer details.  Nothing really earth-shattering in terms of new features as compared to the 2.0.x Suricata tree.  The biggest bang in Suricata 3.0 comes from the new support for Netmap.  This allows super high speed packet handling with most major NICs (although Netmap support is network card driver dependent, so not every NIC will support it initially). Suricata 3.0 will be in pfSense 2.3.  Work is currently in progress to convert the GUI to the new Bootstrap code used in pfSense 2.3.  Once that work is complete, a Suricata 3.0RC3 package (or whatever the current version is) will be released for pfSense. Bill
  • Manual Updates for SNORT

    4
    0 Votes
    4 Posts
    1k Views
    bmeeksB
    No, I don't know if it offers offline updates or not.  You can post in the top-level Packages forum and someone there will chime in. Bill
  • Snort auto-update whitelist with dynamic WAN gateway?

    3
    0 Votes
    3 Posts
    768 Views
    E
    Wonderful.  Thank you, Bill. That would be very helpful.
  • New version snort/ suricata?

    4
    0 Votes
    4 Posts
    2k Views
    bmeeksB
    Snort 2.9.8.0 will be along soon.  Working on converting the GUI to Bootstrap, and was trying to get that finished before updating the binary.  If the Bootstrap conversion drags out too long, I can post a Pull Request to update the binary to 2.9.8.0. As for Suricata, it too is being converted to Bootstrap.  One of the pfSense developers is helping with (actually he is doing) the work.  He also has other responsibilities, and the Suricata conversion is a bit behind schedule.  I have tested Suricata 3.0RC3 and it works in pfSense.  The goal is to release the updated GUI along with the new Suricata 3.0RC3 binary (or whatever is current at the time).  We are also planning to provide the long-awaited inline IPS mode with Suricata 3.0 using Netmap.  I have tested it and it works.  We just need to modify the GUI a bit to provide the necessary configuration fields.  Suricata will sport two IPS/IDS modes:  (1) legacy mode using libpcap and the custom blocking plugin (what it uses today); and (2) true inline IPS mode using Netmap. Bill
  • Snort output to syslog (not what I want)

    4
    0 Votes
    4 Posts
    3k Views
    E
    Ah, very helpful.  Thank you, fragged.
  • Snort: Suppress Source Addresses

    12
    0 Votes
    12 Posts
    4k Views
    RuddimasterR
    Hi Bill, many thanks… Dirk
  • Snort Rules Configuration - Backup / Duplication?

    4
    0 Votes
    4 Posts
    2k Views
    bmeeksB
    Which file are you editing?  When I directly edit the config, I use the file /conf/config.xml.  I navigate to the file using Diagnostics > Edit File.  It is living dangerously to directly edit the production file, but since mine is a home system I take the risk.  I don't know why your changes are getting overwritten.  I've never had that happen to me. I think there are some hoops to jump through if you import or copy in a new config.xml file itself from a remote source.  The contents of the file are saved in a large global memory array.  Perhaps something is triggering a "dump" of the in-memory data back to the file and thus overwriting the changes you just made. Bill
  • Snort 2.9.4.1 pkg v.2.5.8

    168
    0 Votes
    168 Posts
    106k Views
    BBcan177B
    @NetDefense: OK I did some digging and figured that out. Your post now makes sense to me now that I know what emerging threats is. I did notice this post is kind of old and when I take a look at the RBN rules and it appears they are no longer updated. http://doc.emergingthreats.net/bin/view/Main/RussianBusinessNetwork The RBN list has been discontinued for awhile now… The only two free lists available from Emerging Threats (now Proofpoint) is ET Compromised and ET Block....  With the ET IQRisk suite (Paid subscription) they have an IPRep list available...
  • Best Way to Bypass Snort for Specific Servers?

    3
    0 Votes
    3 Posts
    3k Views
    ?
    Create an extra DMZ and place the server inside of this then. Set up snort scanning on your LAN port. So the Server will have Internet connection and the rest of the LAN will be scanned by snort. WAN - NAT and pf DMZ - Snort is not scanning LAN - snort is scanning
  • Suricate signature issues

    3
    0 Votes
    3 Posts
    4k Views
    T
    Ok great.  THank you Bill.  I can definitely live with that!
  • Suricata offline rules update

    3
    0 Votes
    3 Posts
    2k Views
    J
    thanks for your reply, I already tried that, but it didn´t work out, there are a number of configuration files that need to be updated, but I could not find  which ones and what to write
  • Suricata/Snort and VPN protection

    4
    0 Votes
    4 Posts
    3k Views
    T
    Did it !  :D  Great ! In effect, I only intend to set up Suricata for the moment. Thank you a lot !
  • Https://papertrailapp.com/ or a free cloud syslog for WAN Barnyard2

    5
    0 Votes
    5 Posts
    1k Views
    H
    I tried to put only the adresse and i have change de port from 514 to the pappetrailapp port and I have opened this port in firewall and it doesn't work. I want to try again.
  • 0 Votes
    4 Posts
    1k Views
    bmeeksB
    Multiple instances happens sometimes when the pfSense core code sends more than one "restart packages" command in a short time interval.  This can happen, for instance, during a WAN IP update caused by DHCP (if you have that configured on the WAN side).  There are a few other triggers of the "restart packages" command. Bill
  • 0 Votes
    37 Posts
    16k Views
    C
    Hi guys, this topic really helped me, but in my case the solution was create two databases, one for each Barnyard instance (i have two monitored interfaces), no more "Duplicate entry" now, thanks!
  • Snort & Suricata question

    1
    0 Votes
    1 Posts
    879 Views
    No one has replied
  • OpenAppID Stats

    1
    0 Votes
    1 Posts
    2k Views
    No one has replied
  • Add an URL in the snort pass list

    2
    0 Votes
    2 Posts
    1k Views
    H
    Finaly i found the solution. I have create a supress list and then apply to the interface then restart snort. I have find a youtube video.
  • ET POLICY HTTP traffic on port 443 (POST)

    3
    0 Votes
    3 Posts
    5k Views
    F
    @bmeeks: You could safely disable that rule if you wish. Bear in mind that if you decide to allow HTTP traffic on 443, all the rules with $HTTP_PORTS wont be inspecting that traffic. Unless you add 443 to the $HTTP_PORTS variable, which will cause other false positive with some HTTPS inspection. In other word, the way alot of rules are made, HTTP, non encrypted traffic,  shouldnt be on 443 F.
  • Using Snort for gateway selection ?

    3
    0 Votes
    3 Posts
    963 Views
    J
    Thanks for your reply. That makes perfect sense. Hadn't thought it through enough… Happy Holidays, John
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.