• Snort | Unknown rule option: 'stream_size'.

    3
    0 Votes
    3 Posts
    3k Views
    bmeeksB

    You most likely have a required preprocessor disabled.  Make sure the STREAM5 preprocessor is enabled on the PREPROCESSORS tab.  In fact, users should really never disable any of the default-enabled preprocessors unless they are very highly skilled with the operation of Snort.

    Bill

  • Suricata Package Update – 2.0.8 pkg v2.1.6 Release Notes

    2
    0 Votes
    2 Posts
    768 Views
    D

    Got the package updated during 2.2.4 upgrade. Works great.  8)

  • Suricata X-Forward-For

    4
    0 Votes
    4 Posts
    1k Views
    bmeeksB

    @digdug3:

    Yes, you are right, according to the thread they added it to Suricata 2.0 and in the unified2 chain.
    Can you explain where the current Suricata package is getting its blocking ip's from?
    Then I'll try to figure it out.

    From the alert-fast log chain.  The blocking plugin is in the Suricata output chain.  It may be that some additional information is buried in the Packet structure passed to the blocking plugin, but I have not investigated it that deeply yet.

    Bill

  • Snort or Suricata

    6
    0 Votes
    6 Posts
    4k Views
    D

    Also, lot of those unsupported rules should work with suricata 2.1.

  • Snort Aleart Port Scan Mulltiple & TOR

    7
    0 Votes
    7 Posts
    4k Views
    bmeeksB

    @Abhishek:

    google /youtube is getting blocked i whitelisted 1 ip in passthrough  i guess i need to find source rule which is blocking it and remove it since google uses lot of ip range and whitelisting entire range is imposible

    Correct.  Identify the blocking rule on the ALERTS tab and then click the red X beside the SID to automatically disable that rule for the interface.

    Bill

  • Snort 2.9.7.0 pkg v3.2.2 2.1.5-RELEASE (amd64) Snort VRT Rules Error 505

    9
    0 Votes
    9 Posts
    3k Views
    bmeeksB

    @foresthus:

    Hi there,

    Please give this hint.

    It should be the variable "VRT_DNLD_URL" (snort_defs.inc or snort.inc or snort_check_for_rule_updates.php) which must to be changed. But what ist the new url?

    thnx a lot.
    ;)

    The Snort VRT has removed the rules tarball for Snort versions older than 2.9.7.2, so there is no URL to give you for the 2.9.7.0 version.  With Snort, the version of the binary and the version of the rules tarball must match.  A check is done by the binary to be sure they match up.  This is not a pfSense problem, but is a decision of the Snort team.

    You need to upgrade your pfSense to a 2.2.x version and then update Snort to version 2.9.7.3.  By the way, version 2.9.7.5 of Snort was just released.  I will be submitting an update for the pfSense package in the near future.

    Bill

  • Correcting "FREAK Weak Export Suite From Client" Alerts

    6
    0 Votes
    6 Posts
    1k Views
    A

    @bmeeks this is working great and I can see now where the vulnerable client is.  Thank you.

  • Snort - rules update fails daily

    5
    0 Votes
    5 Posts
    2k Views
    bmeeksB

    I honestly don't think the Snort package is at issue here.  If it was, then I would expect many complaints here of similar nature.  My personal experience is that you do generally want to avoid the period around midnight U.S. Eastern Time.  I would frequently encounter errors then on the nightly downloads.  I moved the update time to 0130 Eastern and no more issues.  I suspected the VRT folks had some kind of server maintenance task running at midnight, but that was just a guess.

    Since you have problems even with manual downloads, I would look at other basic connectivity problems somewhere.  Is there anything else in the chain like a proxy (Squid perhaps?), another upstream firewall, etc.?

    Bill

  • SNORT blocking friendly IP alias

    7
    0 Votes
    7 Posts
    1k Views
    S

    Thanks man! Greatly appreciated!

  • Upgrade Snort to 3.2.6

    4
    0 Votes
    4 Posts
    979 Views
    bmeeksB

    @MilesDeep:

    Thanks.  That's easy enough.  Will all the conf files remain intact?

    Yes, Snort and Suricata upgrades use the existing configuration stored in the config.xml file on the firewall.  The actual snort.conf (or suricata.yaml) conf file for the binary is regenerated each time the binary is started.

    Bill

  • Snort behind an external firewall - Is there a need for Snort?

    6
    0 Votes
    6 Posts
    2k Views
    G

    @fsansfil:

    With everything going HTTPS these days a Bluecoat or squid with i-cap and sslbump is better for web filtering than an IPS.

    You might be better suited with a proxy.

    "So i am NOT complaining!"

    No harm, no offense; Its just me after working 12hrs in a row, doing suricata rules ;)

    F.

    I have the i-cap/clam anti-virus enabled in my squid3 config

  • Snort only runs ET rules, not Snort VRT

    5
    0 Votes
    5 Posts
    1k Views
    D

    2.1.5 is dead. Move on. No fixes will ever appear there.

  • Snort not starting after upgrade to 3.2.6

    12
    0 Votes
    12 Posts
    3k Views
    D

    As noted above - try without sync. (Hopefully gone everywhere again with 2.2.4.)

  • Why would a crawler coming from Google netblock show up as malevolent?

    2
    0 Votes
    2 Posts
    906 Views
    D

    Disable the broken rule. And while at it, disable 1:2015526, same idiocy.

  • Snort with OpenVPN Client uses 100% CPU

    3
    0 Votes
    3 Posts
    2k Views
    bmeeksB

    Using the ADVANCED PASS-THROUGH option would be the mechanism for using that config directive.  You will find that on the INTERFACE SETTINGS tab for the specific interface.

    Bill

  • Suricata randomly stops scanning interface

    4
    0 Votes
    4 Posts
    1k Views
    bmeeksB

    Swapping cables would be one thing to try.  It is possible that the libpcap library and the USB NIC don't play well together.

    Bill

  • BLACKLIST DNS rules question

    4
    0 Votes
    4 Posts
    1k Views
    D

    Well, the way to mass-disable rules is called SIG Mgmt.

  • Suricata Alerts

    2
    0 Votes
    2 Posts
    6k Views
    D

    Someone's pinging you… Some rules categories are just horrible idea to enable; icmp_info definitely among them.

  • Snort Package Update - 2.9.7.3 pkg v3.2.6

    5
    0 Votes
    5 Posts
    2k Views
    F

    Okey dokey, thanks for the clarification :)

  • SNORT blocks whitelisted IP's

    1
    0 Votes
    1 Posts
    703 Views
    No one has replied
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.