• Suricata blocking hosts in the passlist (6.0.4)

    18
    0 Votes
    18 Posts
    1k Views
    bmeeksB
    @marc05 said in Suricata blocking hosts in the passlist (6.0.4): Something I've noticed is that my config.xml no longer contains <wanips>, and I don't see an option for that in the GUI. Looks like it was removed and never put back in, but there's still logic using it. https://github.com/pfsense/FreeBSD-ports/commit/22dc43fe8858ef0b724eb4bbcdd1a86b152b33c4 https://github.com/pfsense/FreeBSD-ports/blob/1fd0a3eecbfc1626d76716fdf2869c1057cabe22/security/pfSense-pkg-suricata/files/usr/local/pkg/suricata/suricata.inc#L340 That line is meaningless code now. It needs to be removed for cosmetics, but it has no impact on the real WAN IP getting into the Pass List. That is now pulled in automatically by code within the binary portion of the custom blocking module. It gets those by asking the operating system for local interface addresses. Here is a link to where this is handled now within the custom blocking module portion of the binary: https://github.com/pfsense/FreeBSD-ports/blob/devel/security/suricata/files/patch-alert-pf.diff#L515.
  • Suricata - interfaces

    suricata vlans
    6
    0 Votes
    6 Posts
    3k Views
    bmeeksB
    If you mix internal networks into EXTERNAL_NET, you very likely will increase the number of false positive alerts from routine traffic. If you have specific design goals, it is very easy to provide your own customized rules. You add them by choosing Custom Rules in the drop-down on the RULES tab and then typing in or pasting in the rules you need. They will be combined with any other rules from previously selected categories.
  • Suricata crash - PHP logging memory size

    2
    0 Votes
    2 Posts
    513 Views
    bmeeksB
    @lightingman117 said in Suricata crash - PHP logging memory size: Should I care about this kind of stuff? I turned Suricata on & off last night. I also looked at one log that didn't exist (blocks). I went to bed and woke up to this. Crash report begins. Anonymous machine information: amd64 12.3-STABLE FreeBSD 12.3-STABLE RELENG_2_6_0-n226742-1285d6d205f pfSense Crash report details: PHP Errors: [16-Jul-2022 08:21:47 CST6CDT] PHP Fatal error: Allowed memory size of 536870912 bytes exhausted (tried to allocate 18419998560 bytes) in /usr/local/www/suricata/suricata_logs_browser.php on line 54 No FreeBSD crash data found. That error happens when you try to view a log file that is too large to fit into available memory. Configure log rotation on the LOGS MGMT tab to keep your log sizes under control. This is a common error with several sub-systems on pfSense that must read text logs and display them. The log files need to be small enough to fit into the physical memory space allocated to PHP because they are processed into an in-memory string and then output via the web server of pfSense. If not, then the error you saw is thrown. It is harmless in that it will not crash your box, but obviously the large text file can't be read using the GUI tools.
  • can snort/suricata secure clients using VM?

    7
    0 Votes
    7 Posts
    1k Views
    bmeeksB
    @ezvink said in can snort/suricata secure clients using VM?: @steveits That's what I want to ask sir, right, the network used by VM Attacker is the same network as the VM Client, but it doesn't work, sir, to attack the client, it is not detected by snort/suricata Two hosts on the same network (meaning the same subnet and/or VLAN) will communicate with each other directly point-to-point. They will NOT send their traffic through any gateway or firewall on a third host. So the pfSense machine in the scenario you described will never "see" the traffic between those two hosts (your VM Attacker and VM Client) and therefore cannot generate alerts. pfSense and any IDS/IPS running on it is blind to the traffic. The only time hosts will send traffic through a gateway or firewall is when the destination of the traffic is on a completely different network. In your other posts here, you seem to lack basic knowledge of networking and the set up of Hypervisors. Before you try experiments with an IDS/IPS, you should first really study and learn fundamental networking theory. Even a cursory knowledge of how routing works in the OSI model would have allowed you to immediately see why your current setup will not work.
  • Odd Suricata Inline IPS behavior

    12
    1
    0 Votes
    12 Posts
    2k Views
    B
    @bmeeks said in Odd Suricata Inline IPS behavior: pfBlockerNG-devel and DNSBL I can access Anydesk with these 2 plug-ins I disabled all in individual rules on Snort and start Snort Anydesk was blocked right away and there was no alert at all
  • Impossible to stop Suricata after 22.05 update

    3
    0 Votes
    3 Posts
    692 Views
    S
    @huskerdu Possibly you have multiple Suricata processes running. Check for that or restart.
  • Recovery help with suricata sid management

    5
    0 Votes
    5 Posts
    805 Views
    bmeeksB
    @sgnoc said in Recovery help with suricata sid management: @bmeeks Worked like a charm. Minimal to have to do once everything came back up. Even easier with the reinstall feature where the installer can grab the old config and reinstall it after the software is installed. I checked and all of the sid management back back where it needed to be. Thanks again. You are welcome. Glad you got everything going again. The IDS/IPS packages save all of their configuration information in the XML file, so all previous settings can be restored upon reinstallation of the package (or from a restore/recovery procedure).
  • Snort won't start up after pfSense upgrade

    12
    1 Votes
    12 Posts
    1k Views
    Bob.DigB
    @gpinzone said in Snort won't start up after pfSense upgrade: @gpinzone Just to follow up, the GeoIP Top Spammers block list has some false positives. It is almost a given if you are outside of the US.
  • snort install - rules md5 checksum failed

    4
    0 Votes
    4 Posts
    652 Views
    bmeeksB
    @jonrusk said in snort install - rules md5 checksum failed: @bmeeks Yes and that appeared to be the issue. I increased the size of /tmp on RAM disk and Snort installed successfully. Thank you! Note that I don't recommend using RAM disks with either of the two IDS packages (Snort or Suricata). Most especially for /var where the log files are written. And not having enough free space on /tmp, as you experienced, leads to problems as well. Those two packages were not created with RAM disk usage in mind. They really want a spinning disk (or conventional SSD) with a fair amount of space for logging.
  • SG-3100: have all 32bit related issues been fixed?

    12
    0 Votes
    12 Posts
    1k Views
    M
    @michmoor I'm exporting logs to it, but not netflow.. Using these extractors to parse the data: https://github.com/loganmarchione/Graylog_Extractors_pfSense
  • Snort and NMAP scans

    1
    0 Votes
    1 Posts
    287 Views
    No one has replied
  • 0 Votes
    1 Posts
    290 Views
    No one has replied
  • Snort-4.1.6 Package Update - Release Notes

    4
    5 Votes
    4 Posts
    1k Views
    bmeeksB
    I'm still waiting around to update Suricata. The Netgate team pulled in the latest 6.0.5 Suricata version in the pfSense CE 2.7 DEVEL branch. The pfSense CE and Plus RELEASE branch is still running the 6.0.4 Suricata version. There is really not a ton of changes between those two that would impact typical pfSense users. I'm monitoring the progress on 7.0rc1 and 6.0.6 from the upstream GitHub repo.
  • Suricata in legacy mode block entire tor category with SID management

    3
    0 Votes
    3 Posts
    788 Views
    L
    @bmeeks Hi bmeeks, Thanks for your answer. Greats, I have changed the category name into my Sid file and it perfectly works. Appreciate. BR L.
  • can't update rules suricata

    51
    2
    0 Votes
    51 Posts
    10k Views
    NollipfSenseN
    @ezvink May be so, however, you had WAN in host-only Adapter mode so you shouldn't have any DNS issue...good luck!
  • Netmap: new API version (14)

    6
    0 Votes
    6 Posts
    1k Views
    N
    @bmeeks In my case, VLANs are mandatory. In the end only an implementation that allows VLANs to work fits my needs. Hope at least on pfSense, they will still work in future releases too. Thanks for the hint.
  • Suricata memory usage very high

    8
    1
    0 Votes
    8 Posts
    2k Views
    R
    @le_bleu said in Suricata memory usage very high: Pfsense 2.4.5.r.20200318.0600 This is a beta release of 2.4.5 and more than 2 years old. You should upgrade to 2.5.2 at this point or at least the RELEASE version of 2.4.5.
  • snort and span interface

    4
    0 Votes
    4 Posts
    967 Views
    bmeeksB
    @juniper said in snort and span interface: @bmeeks said in snort and span interface: @juniper said in snort and span interface: Hi, is it possible to use pfsense snort with a span interface as sensor? thanks in advance No, that configuration is not supported. If you want to do something like that, I recommend a dedicated FreeBSD or Linux machine running the base Snort package from whichever distro you choose the OS from. There would be no GUI, though. Thank you! Just to clarify, I have a pfsense firewall with snort on a wan bridge (but in this way i can't check https traffico), my needing is to analyze http traffic over a reverse proxy (reverse to private network, reverse https to private network http), if i undestrand the only way is to create another bridge? Bridges can get very messy, and Snort really does not understand those (meaning the Snort package on pfSense) as it's not designed and plumbed up operate with that configuration on the interface. It expects a traditional single network interface. Not saying you might not could get it to somewhat work with duct tape, baling wire, and glue, but it's not a setup I would recommend. For your setup, I would lean more toward the span port option using a separate and dedicated Unix-type distro to run Snort. And I mean Snort as a package from that Unix distro and NOT the GUI package used on pfSense. That would mean interacting with Snort via the CLI.
  • How to unblock IP on pfSense+Snort using API or command line ?

    3
    0 Votes
    3 Posts
    2k Views
    I
    @bmeeks perfect, very very very thanks
  • Snort suppress or disable alerts not working

    4
    0 Votes
    4 Posts
    635 Views
    C
    @bmeeks Thanks for the reply, if I see this issue again I will definitely look for additional snort processes running.
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.