• Snort raw rule downloads

    2
    0 Votes
    2 Posts
    865 Views
    bmeeksB
    The entire tarball is not saved (it is downloaded to and extracted in a folder under /tmp and then deleted).  However, the individual rules files (category files) extracted from the raw tarball are save here on the firewall:  /usr/pbi/snort-amd64/etc/snort/rules.  Change the amd64 to i386 if you have a 32-bit install. Bill
  • Snort stops by itself

    22
    0 Votes
    22 Posts
    9k Views
    I
    Thanks for the AC-BNFA-NQ this seems to help us here as well. I want to contribute something I observed and can reproduce: Situation HW (old PC) based pfSense in a branch office Win 2012 R2 U1 based pfSense in our DC Snort HW based is running stable with AC-NQ even though it has only 2 Cores and 8GB memory at all Hyper-V based is running on 12 Cores and 16GB memory, but Snort failed with AC-NQ, the AC-BNFA-NQ does the trick, now it can be not only activated (about 2minutes) faster on all interfaces, instead of one only, it now can be activated on all interfaces and it is running stable now for 3d, usually it turned itself off every 2h to 6h. A strange side effect on IPSec stability?  :o We reported https://redmine.pfsense.org/issues/4790 (Titel: Established IPSec Tunnel refused transporting further traffic out of sudden.. it than refuses any rule based traffic to anywhere!). Even though it should be impossible from my point of view, we observed that since the only configuration change on both tunnel ends is the Snort thing it seems to be an obvious side effect. This seems to be fixed now as well - and I find this is 'a bit' disturbing..
  • Snort - Enable Everything

    2
    0 Votes
    2 Posts
    892 Views
    M
    If you go into categories, select one and click on the icon top right, what happens? I think it should work  :P
  • Snort time off after 2.2.3 update

    5
    0 Votes
    5 Posts
    1k Views
    jimpJ
    What probably happened is that when we updated the time zone data, your old named zone was moved/renamed/deleted and it defaulted since it didn't know what else to do. We don't make those edits ourselves, however. We get that data from FreeBSD so it must have changed upstream somewhere.
  • Pfsense behind adsl router - IDS problem

    9
    0 Votes
    9 Posts
    2k Views
    D
    On WAN? Yes, that's not a problem. That's correct. As said, you need to get this working on LAN to see LAN IPs. Explained above, plus explained here by Snort/Suricate maintainer. Really don't think there's much else to add here. P.S. Getting rid of double-NAT is a good thing regardless of IDS alerts.
  • Suricata & Snort Suppression List

    2
    0 Votes
    2 Posts
    2k Views
    bmeeksB
    A couple of issues can cause this.  One is Snort did not get restarted when the last change was made to the suppress list.  This should have automatically happened, but perhaps did not.  A second more rare possibility is that you have a duplicate zombie Snort process running and that process is blocking/alerting. You should have exactly one Snort process per interface where Snort is enabled.  Check that with this command from the CLI: ps -ax |grep snort If you see extra Snort processes, stop Snort then kill any remaining zombie processes and then restart Snort. Bill
  • Snort XMLRPC Sync

    2
    0 Votes
    2 Posts
    1k Views
    bmeeksB
    There should be sync messages written to the system logs (especially on the destination machine). I probably forgot to add a "sync trigger" to the new OpenAppID code. I will check that so that when it is enabled/disabled, a sync is forced. Bill
  • How do you manage your Snort Suppress List?

    4
    0 Votes
    4 Posts
    10k Views
    bmeeksB
    @simby: Bill can you please share your list or. PM? Please,.. Here is what I have on my home firewall.  I have not added or removed entries in quite some time… #"(http_inspect) JAVASCRIPT WHITESPACES EXCEEDS MAX ALLOWED" suppress gen_id 120, sig_id 10 #"(http_inspect) HTTP RESPONSE HAS UTF CHARSET WHICH FAILED TO NORMALIZE" suppress gen_id 120, sig_id 4 #"(http_inspect) NON-RFC DEFINED CHAR" suppress gen_id 119, sig_id 14 #(http_inspect) IIS UNICODE CODEPOINT ENCODING suppress gen_id 119, sig_id 7 #"BROWSER-IE Microsoft Internet Explorer userdata behavior memory corruption attempt" suppress gen_id 1, sig_id 16482 #"ET TROJAN Suspicious Malformed Double Accept Header" suppress gen_id 1, sig_id 2008975 #"GPL WEB_CLIENT PNG large colour depth download attempt" suppress gen_id 1, sig_id 2103134 #"FILE-IDENTIFY download of executable content" suppress gen_id 1, sig_id 11192 #"FILE-IDENTIFY Portable Executable binary file magic detected" suppress gen_id 1, sig_id 15306 #ET SCAN Behavioral Unusually fast Terminal Server Traffic, Potential Scan or Infection suppress gen_id 1, sig_id 2013479 #ET SCAN Behavioral Unusually fast Terminal Server Traffic, Potential Scan or Infection suppress gen_id 1, sig_id 2013479 #ET INFO Packed Executable Download suppress gen_id 1, sig_id 2014819 #(smtp) Attempted response buffer overflow: 1448 chars suppress gen_id 124, sig_id 3 #(http_inspect) UNESCAPED SPACE IN HTTP URI suppress gen_id 119, sig_id 33 #(http_inspect) TOO MANY PIPELINED REQUESTS suppress gen_id 119, sig_id 34
  • Request patch application

    7
    0 Votes
    7 Posts
    2k Views
    bmeeksB
    @somosane: Jim Thompson speaks about QI integration on his blog entry on https://blog.pfsense.org/?p=1724 Will the pfSense Snort packages have QI detection before upstream integration? Not sure how to interpret the blog post. I won't try to speak for Jim, but my guess is the answer to your question depends on whether or not QI detection is merged into the FreeBSD port of Snort before it makes it into upstream.  If or when that might happen, I have no idea.  I do know that pfSense likes to stay in sync to the maximum extent possible with FreeBSD ports. Bill
  • Snort says "Trojan was Detected" - but how can I see the payload?

    1
    0 Votes
    1 Posts
    3k Views
    No one has replied
  • PFblockerNG vs Snort blocked list?

    3
    0 Votes
    3 Posts
    3k Views
    S
    Thanks :)
  • Snort and firewall rules

    6
    0 Votes
    6 Posts
    5k Views
    P
    Thanks everyone for their inputs, especially bmeeks . I recently purchase the gold subscriptions :) ,  time for me to do some reading before asking some noob questions. Cheers
  • Suricata notice Wan Ip Change

    3
    0 Votes
    3 Posts
    702 Views
    S
    Hello Bill, that would be nice ;) many thanks for your dedication.
  • Suricata Passlist

    7
    0 Votes
    7 Posts
    2k Views
    bmeeksB
    Thanks doktornotor for the bug report.  It does appear I have some more work to do there with validation of aliases. Bill
  • Suricata - blocks Download from CentOS

    5
    0 Votes
    5 Posts
    2k Views
    S
    Thanks fsansfil, yes i think youre right. All alerts came together and was shown as one. I will have a look at this and try to download again.
  • Update Available - Worth it?

    3
    0 Votes
    3 Posts
    949 Views
    F
    Great thanks! I just get nervous when upgrading SNORT as once there was a bug that would clear my block list when it wanted to no matter which option I choose for keeping the list.
  • Alert, but no block…

    2
    0 Votes
    2 Posts
    885 Views
    bmeeksB
    Replied to you PM on this topic. Bill
  • Snort Barnyard2 stopped logging to mysql

    7
    0 Votes
    7 Posts
    2k Views
    bmeeksB
    I do recall seeing on the Barnyard2 Github page that OpenAppID events are not supported by Barnyard. Your new error seems to be related to the general issues the newer Barnyard2 code seems to have with SQL.  I became so frustrated with Barnyard2 and Snorby on my own home firewall installation that I just disabled Barnyard2 last month.  Got tired of restarting it and clearing the signature reference table and all the other hassles. Bill
  • Snort Wodpress Security

    2
    0 Votes
    2 Posts
    2k Views
    bmeeksB
    Go to the RULES tab in Snort.  In the Category drop-down, select Custom Rules.  That will open a text window where you can type in your rule.  Click SAVE and you're done… ;). Bill
  • Snort pkg 3.2.5 Update Release Notes

    9
    0 Votes
    9 Posts
    2k Views
    B
    @Beerman: Had some troubles to update the package. Output of the installation process stops sometimes at "…waiting for snort to start...". Sometimes it stops at "... generating interface configuation...". Even the attempt to remove the package, was sometimes not successful. Output stops at some point. Second try, works... I tried several times the installation, but no success... Snort was running, but no entry in the web-config. Then I restarted "php-fpm", and use the IE (before I was using Firefox - v.38.0.5) and installation was OK and did not take long... I don´t know what helped... My guess is the change of browser, because on console I saw the whole installation process and snort did run after that, but the output stuck. Unfortunately I tried both together... :-( I checked again, today. Removing and installation fails with Firefox 38.0.5 Output at removing of the package stops at: Starting package deletion for snort-2.9.7.3-amd64... Output at installation of the package stops at: Please wait while Snort is started... But with IE11 removing and installing of the package worked. Installation took ~ 5 min.
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.