• Suricata false positives

    4
    0 Votes
    4 Posts
    8k Views
    bmeeksB
    See this post, https://www.linkedin.com/pulse/qisniff-sniffs-quantum-injection-mayur-agnihotri, for details about the attack and the mention of the tool (qisniff).  Here is the link to the tool itself:  https://github.com/zond/qisniff Bill
  • Why is snort for business so expensive?

    Locked
    2
    0 Votes
    2 Posts
    517 Views
    NogBadTheBadN
    Try asking over in the snort forums, the pricing isn’t anything to do with pfSense.
  • Suricata not dropping any traffic

    13
    0 Votes
    13 Posts
    3k Views
    bmeeksB
    @Preacher22: Is there a central location some place where these sorts of concepts are documented? Unfortunately not – at least I've never found one.  There is at least one thread here on the pfSense forum that contains suggestions from other experienced users on which rules can safely be either disabled or their alerts suppressed.  You will have to search for "suppress list", for example, in the IDS/IPS sub-forum. Bill
  • A Couple of Snort suggestions

    1
    0 Votes
    1 Posts
    319 Views
    No one has replied
  • NIC's with Suricata Inline mode

    7
    0 Votes
    7 Posts
    1k Views
    W
    I posted to redmine. I will see what kind of answers I get.
  • Pass List adds unwanted IPv6 addresses

    7
    0 Votes
    7 Posts
    564 Views
    W
    Right, that's what I thought. If you use the pass list to create a 'sub-alias', that gets used in the Suricata Interface Inspect and Protect drop downs for Legacy and Inline.
  • Snort P2P Rules - Torrenting Still Existing

    3
    0 Votes
    3 Posts
    2k Views
    SoarinS
    I apologize, I didn't even notice the flaw. I have this anti-torrenting setup on my VPN interface, I want to allow torrenting on my WAN because I know the traffic inside my network and who's doing what, my dad and I are the main torrenters. However, I give VPNs out to friends who torrent and I'd rather have them off, just because I don't know what they're downloading.
  • Suricata keeps crashing since 2.4.2 upgrade

    11
    0 Votes
    11 Posts
    2k Views
    bmeeksB
    @micropone: Crash report begins.  Anonymous machine information: amd64 11.1-RELEASE-p6 FreeBSD 11.1-RELEASE-p6 #421 r313908+a5b33c9d1c4(RELENG_2_4): Tue Dec 12 09:20:59 CST 2017    root@buildbot2.netgate.com:/builder/ce/tmp/obj/builder/ce/tmp/FreeBSD-src/sys/pfSense Crash report details: PHP Errors: [13-Dec-2017 16:03:42 America/Los_Angeles] PHP Warning:  filesize(): stat failed for /usr/local/etc/suricata/suricata_18353_em0/rules/suricata.rules in /usr/local/pkg/suricata/suricata_generate_yaml.php on line 855 [13-Dec-2017 16:03:42 America/Los_Angeles] PHP Warning:  filesize(): stat failed for /usr/local/etc/suricata/suricata_18353_em0/rules/flowbit-required.rules in /usr/local/pkg/suricata/suricata_generate_yaml.php on line 857 [13-Dec-2017 16:03:42 America/Los_Angeles] PHP Warning:  filesize(): stat failed for /usr/local/etc/suricata/suricata_18353_em0/rules/custom.rules in /usr/local/pkg/suricata/suricata_generate_yaml.php on line 859 [13-Dec-2017 16:03:42 America/Los_Angeles] PHP Warning:  filesize(): stat failed for /usr/local/etc/suricata/suricata_57646_em1/rules/suricata.rules in /usr/local/pkg/suricata/suricata_generate_yaml.php on line 855 [13-Dec-2017 16:03:42 America/Los_Angeles] PHP Warning:  filesize(): stat failed for /usr/local/etc/suricata/suricata_57646_em1/rules/flowbit-required.rules in /usr/local/pkg/suricata/suricata_generate_yaml.php on line 857 [13-Dec-2017 16:03:42 America/Los_Angeles] PHP Warning:  filesize(): stat failed for /usr/local/etc/suricata/suricata_57646_em1/rules/custom.rules in /usr/local/pkg/suricata/suricata_generate_yaml.php on line 859 Filename: /var/crash/minfree 2048 this happens after I reinstall the whole package What type of hardware is this?  Those errors indicate problems within the file system.  Another possibility, if you have recently upgraded your hardware and imported an old config, is the interface names have changed (the em1 part of the error path).  So for example if your NIC driver is now say igb1 instead of em1, then you will get this error.  To fix it you will need to either delete the interface and recreate it from scratch, or manually go into your config.xml file and change all the instances of the strings "em0" and "em1" to match whatever the new name is for your physical interfaces.
  • Snort OpenAppID RULES - Server returned error code 0

    5
    0 Votes
    5 Posts
    811 Views
    S
    I have this error: Dec 14 10:25:30 php-fpm 57060 /snort/snort_interfaces.php: The command '/usr/local/bin/snort -R 20090 -D -q –suppress-config-log -l /var/log/snort/snort_igb020090 --pid-path /var/run --nolock-pidfile -G 20090 -c /usr/local/etc/snort/snort_20090_igb0/snort.conf -i igb0' returned exit code '1', the output was '' Dec 14 10:25:30 snort 91420 FATAL ERROR: /usr/local/etc/snort/snort_20090_igb0/rules/snort.rules(3803) Rule options must be enclosed in '(' and ')'. Dec 14 10:25:29 snort 91420 AppInfo: AppId 4115 is UNKNOWN Dec 14 10:25:29 snort 91420 AppInfo: AppId 503 is UNKNOWN Dec 14 10:25:29 snort 91420 AppInfo: AppId 503 is UNKNOWN Dec 14 10:25:29 snort 91420 AppInfo: AppId 503 is UNKNOWN Dec 14 10:25:29 snort 91420 AppInfo: AppId 503 is UNKNOWN Dec 14 10:25:29 snort 91420 AppInfo: AppId 4126 is UNKNOWN Dec 14 10:25:29 snort 91420 Invalid direct client application AppId, 4126, for 0x809fc83e0 0x8045ae180 Dec 14 10:25:29 snort 91420 AppInfo: AppId 4387 is UNKNOWN Dec 14 10:25:29 snort 91420 AppInfo: AppId 4385 is UNKNOWN Dec 14 10:25:29 snort 91420 AppInfo: AppId 4043 is UNKNOWN Dec 14 10:25:29 snort 91420 AppInfo: AppId 4109 is UNKNOWN Dec 14 10:25:29 snort 91420 AppInfo: AppId 4387 is UNKNOWN Dec 14 10:25:29 snort 91420 AppInfo: AppId 4387 is UNKNOWN Dec 14 10:25:29 snort 91420 AppInfo: AppId 4385 is UNKNOWN Dec 14 10:25:29 snort 91420 AppInfo: AppId 473 is UNKNOWN
  • Suricata signature rule - email alert

    2
    0 Votes
    2 Posts
    2k Views
    bmeeksB
    @michal: Hello everybody Is it possible to configure pfsense+suricate to make a e-mail alert when some signature rule is met? Means no watchdog, but e-mail alert when selected signature is detected. Best regards Michal No, this capability does not exist.  Sounds like you need a third-party alert correlator on separate server if you want that level of functionality. Bill
  • Snort alert log entry timestamp delta between GUI and syslog

    5
    0 Votes
    5 Posts
    961 Views
    bmeeksB
    @cyberzeus: Hi Bill, Yeah - really strange.  I considered the clog aspect as well but if that were part of this, then you would expect there to be skew consistent across the whole file which I do not see. I do think the 5m delay for the block resulting from the 12:00 related syslog message is due to the rules updating - I figure maybe the BLOCK_THIS IPC message somehow got head-of-line blocked due to Snort grinding through rule updates.  I believe Snort is single-threaded and if so, then this might make even more sense.  Would be curious to hear your comments on that possibility… In any event, still doesn't explain the different timestamps on the syslog messages... scratches head Snort is indeed single-threaded … at least the 2.x and older versions.  The new 3.0-ALPHA is multi-threaded, but it's not released as stable yet and is not in the FreeBSD ports collection. Bill
  • Error in snort rules

    2
    0 Votes
    2 Posts
    788 Views
    O
    Please see my post: https://forum.pfsense.org/index.php?topic=141319.0 for help fixing it in the short term. I am hoping someone knows who the maintainer is to file a proper bug report to get it fixed. This is of course making the assumption you are using the openappid rules…
  • Suricata, Tagged Packets and Interfaces

    1
    0 Votes
    1 Posts
    451 Views
    No one has replied
  • Suricata/Snort Kills Data Streaming

    16
    0 Votes
    16 Posts
    15k Views
    L
    Hi, may i know how do I access the file? through shell script? Kindly provide some guides. Thanks
  • Why Snort Blocks Apple Domain?

    8
    0 Votes
    8 Posts
    2k Views
    NollipfSenseN
    @NogBadTheBad: Thats HTTP inspection doing that. View the following page on your pfSense router :- Services -> Snort -> Alerts and select the WAN interface and write down the SID number, you get more details about the alert here. Then goto  :- Services -> Snort -> Edit Interface -> WAN -> WAN Rules and select pulldown preprocessor.rules. You can serach for the SID there. BTW I see these all the time :- 09:03:42 2 TCP Potentially Bad Traffic 172.16.2.41 52863 17.120.225.104 993 137:1 (spp_ssl) Invalid Client HELLO after Server HELLO Detected IMO you'd be better running SNORT on the LAN interface rather than the WAN interface as you'll see the client IP address rather than the WAN IP address. It also looks like you've got a double NAT going on as your WAN IP address is in RFC1918 address space. Thank you Nogbadthebad for responding with good insight. I plan to move soon; so, in the mean time, I am using my neighbor's WIFI, with permission of course, via a WIFI repeater that has an Ethernet port. My setup is PFSense for WAN and Mikrotik for LAN…so, even when I move; that's my official home network. So, Snort will always on WAN...in fact, that's exactly I got pfSense machine because although the Mikrotik is robust, I wanted to use pfSense to complement it to bring about, hopefully, the ultimate UTM. That's why I might have double NAT although only the Mikrotik has NAT enabled. I checked the SID...it's the same 137:1.
  • Suricata true inline IPS mode coming with pfSense 2.3 – here is a preview

    94
    0 Votes
    94 Posts
    69k Views
    W
    I have followed all the recommendations in the tuning guide and I still get a ton of bad pkt errors. Using an intel i350. Also tried Intel i219. Is anyone else using the i350 successfully?
  • 0 Votes
    2 Posts
    1k Views
    SoarinS
    I have the same problem, I was about to make a post for this then I came across this. If there's a solution for this that'd be great, works fine on every interface except my OpenVPN too.
  • Managing resources with Snort…max # interfaces...max rules? Snort 201

    3
    0 Votes
    3 Posts
    407 Views
    V
    I have a SG2440, pfSense 2.4.2…4g of RAM...now I am up to 92% of RAM usage. CPU seems fine...thanks for sharing what you are running seems like you run a lot and a rock solid configuration. I googled your HP Pavilion a6242n...you are running that with 3G of RAM? I have to assume you added more... I am running pfBlocker and Snort...but it looks like Snort is taking up most of the resources. I have a lot of rule running but struggled to find rules that are more for management and rules for threats...I understand there is some overlap but are there rules I just don't need for my use? Looking at your setup...I like the sound of Squid antivirus but struggled with just setting up the antivirus part, is this possible?
  • How to use Snort for traffic shapping purposes?

    4
    0 Votes
    4 Posts
    1k Views
    bmeeksB
    @FireBean: Then why was it even suggested? There is no way to get Snort to tag traffic in a sense for the FIREWALL to drop the traffic in the propper queue? No, not without rewriting the binary.  It's an IDS/IPS, not a traffic shaper.  The Level 7 inspecting part you saw in the blog post is about inspecting traffic against specific applications for alerting on it or blocking it, not for shaping it.  So the OpenAppID feature of Snort would allow it to identify and drop Facebook traffic or other social media apps, for example. Bill
  • Snort keeps turning itself off

    5
    0 Votes
    5 Posts
    1k Views
    ?
    @bmeeks: On the CATEGORIES tab for a Snort interface you will see a column over on the far right labelled Snort SO Rules if you have Snort VRT rules enabled on the GLOBAL SETTINGS tab.  All the categories under that vertical column are the shared-object rules.  If you don't have the VRT rules enabled, then the column is hidden.  So if you are only using Emerging Threats rule, the column is hidden. Give Suricata a try.  It should work better, but there may still be some issues with ARM hardware.  I've seen some posts with issues in other packages related to ARM hardware.  There are some compiler settings that will likely need tweaking by the pfSense team in order to get all the packages to compile properly for ARM hardware.  There are apparently some byte-alignment issues to contend with in ARM land that Intel land is happy with. ARM is not a clone of Intel like the AMD processors.  With Intel or AMD, it's pretty much identical in terms of instruction set and memory access requirements.  ARM is a completely different CPU platform and has its own instruction set and a different set of memory access requirements. Bill Thanks Bill. Suricata does the trick.
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.