• After upgrade to 2.7.2, enabling Suricata causes reboots

    1
    0 Votes
    1 Posts
    238 Views
    No one has replied
  • Suricata interfaces on HA setup need to be identical

    3
    0 Votes
    3 Posts
    522 Views
    bmeeksB
    @SteveITS said in Suricata interfaces on HA setup need to be identical: Perhaps I am misunderstanding but I don't see any paths in config.xml? The paths are hard-coded into the template files (and in a few cases the PHP source files themselves). They are not recorded in the config.xml. The package source code files for Suricata are here: https://github.com/pfsense/FreeBSD-ports/tree/devel/security/pfSense-pkg-suricata/files/usr/local/pkg/suricata and here: https://github.com/pfsense/FreeBSD-ports/tree/devel/security/pfSense-pkg-suricata/files/usr/local/www/suricata Feel free to modify them and submit a pull request to add the feature if you would like. Just be sure to fully test the new package with several types of configurations to be sure the migration does not break someone's existing install.
  • suricata sync

    8
    0 Votes
    8 Posts
    1k Views
    S
    @bmeeks I created a new thread: https://forum.netgate.com/topic/185153/suricata-interfaces-on-ha-setup-need-to-be-identical
  • Suricata logging the mac-address with EVE JSON Log

    9
    0 Votes
    9 Posts
    2k Views
    P
    Thanks. I was able to reduce the logging to focus on what I was looking for and they are much less noisy than default and working for what we need.
  • Suricata on Backup PFSense give me alerts

    suricata ha carp alerts
    7
    0 Votes
    7 Posts
    2k Views
    S
    @farazb59 The “stream” events ruleset seems to generate a lot of false positives. Consider just turning it off, which is what we do. Curious how any traffic goes through the secondary, if it hasn’t become master?
  • pfSense Suricata Crashes on Malformed Block List Entry

    suricata crash ips
    19
    0 Votes
    19 Posts
    3k Views
    bmeeksB
    @bitslammer said in pfSense Suricata Crashes on Malformed Block List Entry: @bmeeks I'm guessing the rules that I enabled have grown over time so I'll try to trim them. Oddly this doesn't happen every time which you'd kind of expect. It's a Netgate 3100 so it looks like I need to look at some other options since this isn't upgradeable. Thanks for the quick reply adn happy holidays. Several memory parameters have new increased minimums in Suricata 7.x. You are probably seeing the impact of those on the SG-3100. Same issue exists for SG-1100 users, too. 4GB is the new minimum, and even that might get cramped with lots of rules (more than 15,000). If I were spec'ing a box today for someone who wanted to run IDS/IPS (and most folks want to run pfBlockerNG with DNSBL, too), then I would set 8 GB as a new minimum RAM requirement. The new default ZFS install will also chew up much more RAM than the old UFS setup. Edit: also looking once again at your log snippet post, I see it seemed to be updating the rules as I see a "rule reload" message. RAM usage will increase during rule swaps, especially if "live rule swap" is enabled.
  • Telegraf Plugin - Suricata - Influxdb2

    1
    0 Votes
    1 Posts
    202 Views
    No one has replied
  • Suricata Inline on LAGG interface

    4
    0 Votes
    4 Posts
    1k Views
    S
    @gwaitsi I don’t think we ever tried it. Our LAGG was to abstract the interfaces to facilitate HA replacement but that’s no longer a thing…HA can have different hardware now. So no more LAGG. When we tried inline many years ago we found it broke Remote Desktop over time, no idea why. At the time one NIC was Realtek which isn’t ideal. But, haven’t been in a situation to experiment much again.
  • Is it possible to limit scanning on the WAN interface to a single port?

    3
    0 Votes
    3 Posts
    399 Views
    J
    @SteveITS re: scanning on both interfaces... well, i suppose if i can limit it then the firewall on the windows box that it's port-forwarding to would take care of it.. but in a perfect world i would prefer to have suricata scanning the one port on my wan that i have open. i've thought about putting that box on it's own vlan, i believe i can do that. i'm just not advanced/savvy enough to where i can whittle it all down to what's needed and what isn't
  • 0 Votes
    1 Posts
    170 Views
    No one has replied
  • Snort intermittent Crash and snort Deamon stopped.

    6
    0 Votes
    6 Posts
    986 Views
    bmeeksB
    @feins said in Snort intermittent Crash and snort Deamon stopped.: @bmeeks I never create any rules myself all the rules are from the Snort Lan Categories. The only thing i did is to disable the rules from alerts that cause my application been block only. Here the rules from the syntax 12558. alert udp $HOME_NET any -> any 53 (msg:"ET INFO DYNAMIC_DNS Query to a *.is-a-teacher .com Domain"; content:"|01|"; offset:2; depth:1; content:"|00 01 00 00 00 00 00|"; distance:1; within:7; content:"|0c|is-a-teacher|03|com|00|"; nocase; distance:0; fast_pattern; reference:url,help.dyn.com/list-of-dyn-dns-pro-remote-access-domain-names/; classtype:bad-unknown; sid:2042426; rev:2; metadata:attack_target Client_and_Server, created_at 2022_12_08, deployment Perimeter, former_category INFO, performance_impact Low, signature_severity Informational, updated_at 2022_12_08, mitre_tactic_id TA0011, mitre_tactic_name Command_And_Control, mitre_technique_id T1568, mitre_technique_name Dynamic_Resolution;) I'm working on a Suricata issue at the moment, so give me a little time to reconfigure my test VM for Snort and I will test this rule. It appears to be coming from the ET-INFO category. Looking over it, I don't see any problem with the syntax.
  • 0 Votes
    5 Posts
    1k Views
    DaddyGoD
    @bmeeks said in Starting suricata, failing netmap, on "oversized" HW (multiple processors/cores + RAM): I suspect a reboot will be required Yeah I thought so too, since it's still just in test mode, it's often restarted without consequence...
  • Emerging Threats Open rules file download failed. Bad MD5 checksum.

    8
    0 Votes
    8 Posts
    2k Views
    K
    @bmeeks Thanks! I had 100M /tmp tmpfs and run exactly into this issue. After increasing /tmp to 400M it worked!
  • Alert rule triggering Drop rule?

    40
    0 Votes
    40 Posts
    9k Views
    G
    Here we go again, with three different IP's all showing up as Alerts in the Alerts tab (as they should) [image: 1702590034904-0cfb3856-c273-4460-8cd9-e0aed9c006d8-image.png] But also showing up in the Blocked IPs tab (which they shouldn't): [image: 1702590083998-e9a8579e-9524-445e-a39a-7f14a3e4ec80-image.png]
  • Since upgrade to PFS 2.7.2 i can not stop Snort interface anymore.

    2
    0 Votes
    2 Posts
    277 Views
    G
    After a Halt of the router for few minutes and a restart Snort interface en/disable seems to work again. A reboot earlier did not help t o fix the problem. A poweroff for a few minutes did.
  • Suricata 7.0.0 being killed by kernel in 23.09.

    11
    0 Votes
    11 Posts
    2k Views
    J
    @Maltz hmmm, I will try that and monitor.
  • LAN and VLAN

    5
    0 Votes
    5 Posts
    754 Views
    S
    @bmeeks I see that there is an update out now. I just install it a few minutes ago. So will update if I run into that same issue again.
  • Large 1.7 G "snort.core"

    2
    0 Votes
    2 Posts
    412 Views
    bmeeksB
    Yes, that snort.core file can safely be deleted. That is a memory dump produced by a crash (looks like back on December 7th).
  • Snort / PfBlocker-NG vs Subscription to Talos

    3
    0 Votes
    3 Posts
    511 Views
    D
    @michmoor Thank you for the reply. So now I need to experiment with the rule-sets so see why my PfSense box does not block the same sites as the Z4.........
  • Suricata 7 cannot detect app-layer traffic in Inline mode

    1
    0 Votes
    1 Posts
    272 Views
    No one has replied
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.