• Some questions from a beginner

    7
    0 Votes
    7 Posts
    614 Views
    bmeeksB

    @kiokoman said in Some questions from a beginner:

    @bmeeks
    what about suricata, is it the same file ? snortrules-snapshot-29200.tar.gz ?

    Suricata is not tied to any specific rules version. And in fact, Suricata is really not designed to be 100% compatible with Snort rules. Most of them work, but quite a few (several hundred) do not due to the differences in keyword syntax between Suricata and Snort.

    With the Suricata package, users are free to download and install any Snort rules version they desire so long as it is compatible with the 2.9.x branch of Snort. You cannot use any Snort3 rules with Suricata. That will break the installation of the package quite badly! But you can use the 29161, 29181, or 29200 Snort rules package with Suricata. It is only the Snort binary that is locked to specifically matching rules versions.

  • Regex pattern matching with large payloads for TCP port

    1
    0 Votes
    1 Posts
    166 Views
    No one has replied
  • No Snort Alerts after moving behind ISP Router

    3
    0 Votes
    3 Posts
    285 Views
    bmeeksB

    @DaHai8 said in No Snort Alerts after moving behind ISP Router:

    My ISP recently forced their crappy Router/Fibermodem combo on me and I had to move my pfSense CE (Current) behind it. Now I don't get any Snort alerts.
    Is this normal?

    You were seeing Snort alert on normal "Internet noise". That refers to the constant barrage of traffic from various nefarious sources that your pfSense firewall rules were going to block.

    As stated by @SteveITS, Snort sees traffic on pfSense before the firewall rules are applied. That means when run on the WAN it would have been alerting on that noise, but your pfSense WAN interface firewall rules would block that traffic anyway. So, in effect, you had Snort chewing up CPU resources and RAM for very little or no gain as the firewall is going to block nearly all of that traffic anyway. Much better to run Snort on the firewall's internal interfaces such as the LAN and/or DMZ.

    Now as to your question, "yes" Snort is still working, But the NAT feature of your ISP's router is probably hiding that traffic now as the router will have its own built-in stateful firewall.

  • 9 Votes
    10 Posts
    978 Views
    N

    @bmeeks Glad to hear that you're ok, thank you for the Suricata release, even in these conditions.

  • Suricata - alert on pdf files

    2
    0 Votes
    2 Posts
    220 Views
    V

    My guess would be that if you’re moving the file over SMB, it’s likely to be on the same network, so would never actually touch the firewall to be detected.

  • Modification rules Snort

    2
    0 Votes
    2 Posts
    290 Views
    bmeeksB

    If you want to specifically enable rules that are "default disabled" by the rule authors, then you can do that on the RULES tab by selecting the appropriate category, finding the rule by SID in the list, and clicking the "Force Enable" option for that specific rule.

    You can also use the SID MGMT tab features to do this. Examples are provided in the sample conf files on that tab.

    The rule authors will disable a number of rules in their rulesets. This is something many users do not realize. Rules that are prone to false positives in many environments or rules that address very old threats are frequently provided in a "default disabled" state.

    Also, when using IPS Policy for rule selection, you should be aware that ONLY the Snort VRT ruleset contains the IPS Policy metadata required to automatically select rules by policy. The Emerging Threats rules do not contain IPS Policy metadata and thus are excluded from IPS Policy management.

  • Suricata SID management - drop list

    1
    0 Votes
    1 Posts
    149 Views
    No one has replied
  • SNORT - Broadcom BNXT

    3
    0 Votes
    3 Posts
    314 Views
    P

    @bmeeks Hello, that's exactly what I did. I ran Snort on the parent interface and not on the VLAN. However, as you suggested, there must be an issue with the Broadcom network card drivers.

  • Suricata - log management option not set on fresh install

    3
    0 Votes
    3 Posts
    250 Views
    bmeeksB

    Here is the Redmine Issue for this bug: https://redmine.pfsense.org/issues/15744.

    Thank you for reporting it.

  • 0 Votes
    2 Posts
    387 Views
    bmeeksB

    @magician-balmy-stainable said in Enabled Suricata on LAN interface, now can't access pfSense browser interface?:

    How can I regain access and/or fix this?

    You are going to need to access the console interface directly to fix this. You did not tell us anything about your hardware, so I'm giving the suggestions below based on the two most likely possibilities:

    Assuming you have whitebox hardware, get to the keyboard and monitor attached to the pfSense machine and login to the CLI (command line interface). After logging in to the firewall, choose Option "8" to exit to a shell prompt and type this command to stop all Suricata instances: /usr/local/etc/rc.d/suricata.sh stop If you have a Netgate hardware appliance, you will need to find and attach the USB serial console cable to access the CLI. After getting that connected and working (just like you did when you first configured the device), exit to a shell prompt and follow the same directions as given above for logging in and stopping Suricata.

    If you are using Inline IPS Mode, stopping the service should restore GUI access. If you are using Legacy Blocking Mode, then you will need to also clear out the snort2c table to remove any lingering IP blocks. Do that with this command from the shell prompt:

    /sbin/pfctl -t snort2c -T flush

    At this point you should be able to access the web GUI login. I would immediately navigate to Suricata under the SERVICES menu and edit the LAN interface where you have Suricata enabled and either disable it on that interface or turn off the blocking mode by unchecking the Block Offenders checkbox. Save the change. If you fail to do this, then Suricata will get automatically restarted at some point and you will likely find yourself locked out again.

    I am fairly certain you have a misconfiguration problem because Suricata has several built-in options to prevent locking you out. Either you have a fundamental hardware compatibility issue, or you have a significant misconfiguration of the package.

    @magician-balmy-stainable said in Enabled Suricata on LAN interface, now can't access pfSense browser interface?:

    Why did this happen?

    Can't really say with certainty because you gave us very little information to go on.

    What hardware are you using? What version of pfSense and what version of the Suricata package? What is your network topology? (what's connected to what?). Are you using Legacy Mode Blocking or Inline IPS Mode?

    Note that if you are a first time Suricata user, then I highly recommend that you NOT enable blocking when first installing the package. Instead, install it, choose the rules to enable, then let it run on your network for a few days or weeks and regularly monitor the alerts received on the ALERTS tab. See what things are generating alerts and deteremine whether they are legitimate alerts or false positives. Tune the enabled rules and create appropriate Pass Lists (if you intend to use Legacy Mode Blocking) or custom PASS rules (if you intend to use Inline IPS Mode).

  • inline custom pass rule no workie?

    8
    0 Votes
    8 Posts
    656 Views
    bmeeksB

    @Tantamount said in inline custom pass rule no workie?:

    I wonder, if you are still able to edit that 2018 post and correct the examples,

    I should be able to. Will give it a whirl.

    Update: fixed it!

  • Snort - Unable to Select Subscriber Ruleset

    14
    0 Votes
    14 Posts
    997 Views
    F

    @bmeeks said in Snort - Unable to Select Subscriber Ruleset:

    I am the volunteer package maintainer for Snort and the creator/maintainer for Suricata on pfSense. I tried on two different occasions to create a Snort3 package and gave up in frustation because of the massive amount of rewrite required for essentially very little gain compared to Suricata.

    Oh wow, I am even more humbled now. Thank you for your contributions to the Snort and Suricata projects!

  • Is there a rule set similar to Snort Open App ID in Suricata?

    12
    0 Votes
    12 Posts
    1k Views
    M

    @bmeeks said in Is there a rule set similar to Snort Open App ID in Suricata?:

    The problem with UTM is that someone must maintain the list of threats and distribute it.

    wait wait...I have to pay for the cool NGFW experience?!

  • 0 Votes
    1 Posts
    178 Views
    No one has replied
  • Snort creates a warning but does not block!

    3
    0 Votes
    3 Posts
    255 Views
    S

    @enesas I would recommend Suricata. The package maintainer for both has said he will probably not develop a package for Snort v3.

    You uninstall from the Installed Packages tab.

  • 0 Votes
    1 Posts
    119 Views
    No one has replied
  • Snort Exiting

    10
    0 Votes
    10 Posts
    663 Views
    C

    @bmeeks Thanks for this... I will see if Snort works after having one interface inline and the other legacy.

    Otherwise i may switch to Suricata..

  • Snort - Attempted Denial of Service - should I be concerned?

    7
    0 Votes
    7 Posts
    526 Views
    JonathanLeeJ

    @bmeeks it took me years of fine tuning and finesse to get mine to work the way I want, and ohhh does it work beautifully now.

    Thank you bmeeks

  • Testing FileStore

    8
    0 Votes
    8 Posts
    1k Views
    T

    @michmoor
    necro post, did this get resolved? In the GUI I do not see any files saved.

    In the /var/log/suricata/suricata<interface>/filestore path I have the 90 something folders that look like hex code but I guess are the first two digits of a hash to organize the files collected by hash. In those folders I have tons of 1-4kb some 1xx kb 'junk' files but no actual jpeg files I've been testing with.

    I have ensured to have file-store enabled, hashing enabled (tried MD5 then SHA-1) and upped memory in a lot of non-related settings. In the eve.json logs it shows file-storing=true but file-stored=false.

    I don't see in the GUI nor the resultant .yaml file the stream-depth setting mentioned in some suricata documentation. In the tutorial this is set to 10MB to catch decent sized files, pictures etc.

    All is see in the pfsense .yaml file generated for suricata in regards to file-store is:

    file-store:
    version: 2
    enabled: yes
    length: 0
    dir: /var/log/suricata/suricata_em036559/filestore

    Additional context, I have the files.rules enabled and have successful alerts of "File Found over SMB and stored" but within that log shows file-stored=false.

    I'm tempted to increase the length to some arbitrary large number but it wouldn't survive a service restart to make it valid anyhow- kind of a check-mate here.

  • Large custom rules file

    5
    0 Votes
    5 Posts
    384 Views
    G

    @bmeeks
    I've had a go at adding custom variables, PR: https://github.com/pfsense/FreeBSD-ports/pull/1380

Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.