• SID Mgmt change drop to block (white listing instead of blacklisting)

    7
    0 Votes
    7 Posts
    1k Views
    G
    @bmeeks said in SID Mgmt change drop to block (white listing instead of blacklisting): Yes, it's a bit of typing or copy-paste, but that's part of the drudgery of what an IDS/IPS admin does. Once done, it's done. And that's what I ended up doing, listing all the 50+ ET rules lists, except the three I wanted to keep as Alert only. Which, in order to keep track of what I did, I commented out and kept in the file. But once done, it's done isn't really true is it? Things change, and you constantly need to adjust, typically by disabling or suppressing rules that are false positives. Mostly individual rules, but it could possibly be an entire list. I think all changes I have ended up making are in the direction from Drop to Alert. Not the other way around... Starting out from some reasonable level based on e.g. Snort Policy (where I use Balanced) and some ideas about what other rules lists to disable or keep as Alert. And this is part of what is so good with the lists, also the suppress list, in that they are so simple to read, and can easily be copied over to other tools like excel. They give you a good overview of what it is you have done. And then we have usability aspect, and being practical or efficient. It's either: emerging-3coresec.rules emerging-activex.rules emerging-adware_pup.rules ... and so on for each list ... Or simply writing. emerging And then all the emerging threats rules are affected, and changed to Drop for example. Then the next simple step would be to have a few of them reverted back to Alert, by creating a list for that, as suggested.
  • Failed to block Proxies/VPN app :(

    3
    0 Votes
    3 Posts
    388 Views
    B
    Remember, blocking applications at the network level might have unintended consequences, and false positives are possible. Make sure to thoroughly test and monitor your network after implementing these rules. Additionally, keep in mind that determined users can find ways to bypass such restrictions. Consider implementing a comprehensive security strategy that includes education, user policies, and other layers of security to address different aspects of network security.
  • Suricata interfaces halting in legacy mode

    6
    0 Votes
    6 Posts
    1k Views
    bmeeksB
    @ajohnson353 said in Suricata interfaces halting in legacy mode: Hello! I am also seeing Suricata crash after updating to CE 2.7.1. Last error before the crash is "[167966 - W#06] 2023-11-29 22:44:22 Error: spm-hs: Hyperscan returned fatal error -1." Restarting only brings it back for a few minutes. That issue is being discussed in this thread: https://forum.netgate.com/topic/184101/suricata-process-dying-due-to-hyperscan-problem. Please post comments or questions over there to keep the discussion in a single thread.
  • Disabling snort after a few minutes version 4.1.6_13

    20
    0 Votes
    20 Posts
    3k Views
    JonathanLeeJ
    @bmeeks Thanks for sharing. I worked in IT for 15 combined years, even held some government clearences at one time a DOJ, SSA, and TNET. The amount of 16 hour shifts I did early on in my life limited many core social friendships. I quit once the company I worked for would not give me a regular schedule when my kid started Kindergarten. I just assumed I would get one after the many years. So I put my three weeks in. It was sad after 13 years there and many 16s, even 10 years without a holiday, the last thing I was told by the new manager... get Jon the @#@# out of here, take him home. No goodbyes, no card, after they even deleted half a week off my last check. Very toxic work environment. I went back to school even in my old age, I was able to share spread knowledge with a younger generation. All the scary situations I was in, it was just sad. Anyway looking forward I can't wait to learn C soon.
  • Snort 3.1.75.0 is available to download now.

    6
    0 Votes
    6 Posts
    1k Views
    JonathanLeeJ
    @michmoor I bet Bill will do it once he wants a good puzzle. Maybe if we donate $50.00...
  • Snort v3

    17
    1 Votes
    17 Posts
    4k Views
    JonathanLeeJ
    The pfSense Snort AppID de-cipher sorcerer's code file with case sensitive messages: --> 1696920726080-textrules2 (1).txt Sid range: 1000000 - 1003371 Total 3,371 AppID rules you can use with the custom option. Use this with AppID enabled and place it as custom to use all the AppID snort snubs with custom text rules. https://forum.netgate.com/topic/183210/guide-snort-s-appid-custom-rules-quick-guide-to-blocking-example-shows-openai-chatgpt-or-itunes This also has tictok in it.
  • 4.1.6_14 Snort 23.09 issue ARM

    arm snort plus
    2
    0 Votes
    2 Posts
    754 Views
    JonathanLeeJ
    https://redmine.pfsense.org/issues/15035
  • snort php error

    2
    0 Votes
    2 Posts
    205 Views
    JonathanLeeJ
    @denis_ju Snort does not work for me past version .11 on ARM processors
  • Snort doesn't want to start after latest upgrade to Snort 4.1.6_12

    24
    0 Votes
    24 Posts
    4k Views
    bmeeksB
    @repomanz said in Snort doesn't want to start after latest upgrade to Snort 4.1.6_12: I didn't notice there was a pfsense update before I went to latest snort. Get in the habit of always going to the pfSense Dashboard first, let the "update check complete", and if a pfSense update is avaiable, do not update your packages before first updating pfSense- unless you specifically go and choose "Previous stable version" in the UPDATE menu. But usually if you do that, the new package version you are after will not show as new packages generally appear only for the newest pfSense release.
  • Surricata alerts NULL ip address

    5
    0 Votes
    5 Posts
    705 Views
    bmeeksB
    @Euman said in Surricata alerts NULL ip address: @bmeeks Hi friend, . I looked closer at this versioning: suricata security 7.0.2_1 High Performance Network IDS, IPS and Security Monitoring engine by OISF. Package Dependencies: suricata-7.0.2_4  https://freshports.org/security/suricata I copied the pkg dependencies version 7.0.2 would have been the version that left the offending line. Thanks. If you have not seen any other instances, it may have just been some type of corruption in the file. That log is a text file processed by PHP code in the GUI to parse out the various fields. One of the fields apparently parse out incorrectly for some reason. For now I think it can be safely ignored. If it happens again, post back to this thread and I'll investigate further.
  • 9 Votes
    82 Posts
    24k Views
    bmeeksB
    Locking this thread for now as I am highly confident the original bug discussed here was fixed as of version 4.1.6_14 of the Snort package and version 7.0.2_1 of the Suricata package. If you are having Signal 11 or Signal 10 crashes with Suricata, please report those in this thread instead: https://forum.netgate.com/topic/184101/suricata-process-dying-due-to-hyperscan-problem.
  • Suricata VS Snort

    suricata snort appid arm kibana
    1
    0 Votes
    1 Posts
    583 Views
    No one has replied
  • 0 Votes
    24 Posts
    3k Views
    bmeeksB
    @wolfsden3 said in SNORT: promiscuous mode disabled + promiscuous mode enabled error + exited on signal 11 (core dumped): Hey guys / gals / they / thems, etc... I did the 2.7.1 update on one of the boxes I had this issue with > re-enabled kill states > haven't had a problem. Did 2.7.1 resolve this SNORT issue is some magical way? I think SNORT is the same version but I didn't confirm this. Many Thanks! As @SteveITS mentioned in his response with this link: https://forum.netgate.com/topic/184112/important-snort-and-suricata-package-announcement-probable-bug-in-legacy-blocking-module/ There is a thread where I am posting updates. I will put them in the original post at the top of that thread.
  • I can't start Suricata 7.0.0.2 on Pfsense + 23.09

    16
    0 Votes
    16 Posts
    3k Views
    bmeeksB
    @fernoliv said in I can't start Suricata 7.0.0.2 on Pfsense + 23.09: Thanks @bmeeks but in my case, even with the "kill states" option unticked/unchecked Suricata still not starting and still running. The kernel process is return on the System Logs the message below: (suricata), jid 0, uid 0: exited on signal 6 (core dumped) I'm going to wait for the fix be turned available via pfSense repositores (patches or a new 23.09.1 release) to overcome that issue. Signal 6 is an entirely different error. That means Suricata is missing some critical dependency or something vital is not initializing. What kind of hardware do you have? Is it Intel AMD64 or ARM based? Remove the packge, reboot the firewall, then try installing the package again.
  • Inverted search: Services>Suricata>Alerts>Alert Log View Filter

    3
    0 Votes
    3 Posts
    343 Views
    S
    @bmeeks Thank you. Excellent suggestions. My head was too much in a GUI mode. Never would have thought of a regexe. I'll stretch my Google-Fu and see if I can come up with a nice one-liner. Cheers.
  • Snort Update Procedure

    5
    0 Votes
    5 Posts
    797 Views
    bmeeksB
    @Ramosel said in Snort Update Procedure: @bmeeks said in Snort Update Procedure: And "yes", I retired back in February of 2014. I worked as a contractor in a "work from home" job starting in 2015 for about 2 years, but then retired for good at the end of 2017. Just enjoying life now as an official "Old Fart" . But I have not gotten to the "you kids get off my lawn" stage yet. Well, ya got some catching up to do... you'll get there... especially with the crap going on these days. I do reserve my right to complain about "the crap these days", even if I'm not all the way to "you kids get off my lawn". Oh, and both my wife and I like to complain about how much stuff costs now compared to "the good old days".
  • After upgrade to pf+ 23.09 Surricata says it's starting but..

    61
    0 Votes
    61 Posts
    15k Views
    bmeeksB
    @PalisadesTahoe said in After upgrade to pf+ 23.09 Surricata says it's starting but..: Noticed this morning that Suricata 7.0.2 was now available in the packages repository. I've upgraded and switched one of my LANs back to using Hyperscan. Although it seemed to run an little bit longer before crashing, it did eventually do so with the same error: "Hyperscan returned fatal error". Not sure if we were expecting Hyperscan to also be updated, but it is still at 5.4.0, which is odd since 5.4.2 has been out since 2023-04-19. No, no change in the HyperScan library yet. I need to first see if I can reproduce the problem. The upstream Suricata team says 5.4.0 should be okay, but that definitely 5.4.1 is broken for Suricata. The fact 5.4.0 suddenly is giving issues is puzzling to the upstream guys, too. And just to keep things clear-- there are currently two reported issues with Suricata, and they are NOT related. One is the issue with a Signal 11 fault when Legacy Blocking Mode is enabled with the Kill States option checked. That bug has been hopefully identified and fixed. Some new binaries will appear soon reflecting that fix. I believe some posts in this thread are actually a result of that bug and not necessarily the HyperScan one. The second bug appears to revolve around the Intel HyperScan library. That one is now under investigation. I initially thought 7.0.2 would take care of that, but it apparently has not. So, now I will see about replicating the issue so a fix can be identified for it. This one may take longer to find and fix, and so is likely not to be part of the upcoming package update correcting the Signal 11 fault.
  • Snort and Paid Rule Subscriptions

    16
    0 Votes
    16 Posts
    2k Views
    M
    @JonathanLee said in Snort and Paid Rule Subscriptions: @mcury I am going to get one to test items with soon. I have the 4B it even has 64 bit options. I have a raspberry pi 3b, it has only 1GB of RAM, so it is constantly running on swap. It is running a samba-ad-dc, freeradius, apache2 server with php and ssl, and a unifi controller, it is too much for it hehe I also have a raspberry pi 4 with 4GB that I'm using for Graylog server, but unfortunately Graylog loves RAM and 4GB is not enough. So my plan is to move Graylog server to Raspberry Pi 5 8GB, move everything that is running in the raspberry pi3 to raspberry pi 4 and then install KVM in the raspberry pi 3b. I'll use KVM to manage my computer through tailscale, I'll be able to turn it off, choose what OS I'll boot, boot to Linux or Windows as I desire..
  • [Solved] Snort 4.1.6_13 crashing on pppoe interface randomly

    3
    1 Votes
    3 Posts
    592 Views
    bmeeksB
    I think I may have found the bug. If I am correct, it's actually in the FreeBSD libpfctl library and not directly in the Snort code. I'm waiting on the Netgate kernel developer I'm working with to either confirm my finding or show me where I went off track .
  • 0 Votes
    6 Posts
    455 Views
    bmeeksB
    @ronv42 said in After update to 23.09 revewing log files in Suricata produces a PHP memory allocation error: @bmeeks Thanks I am exploring that directory right now. If I delete the logs there would that cause any issues? No, deleting files there is not a problem with one caveat. If you delete a current file (meaning one of the files without a UNIX timestamp appended), then the currently running Suricata instance on that interface may cease logging until it is restarted or the proper SIGHUP is issued to signal it to re-initialize the log files it was using. Rotated files will have a UNIX timestamp appended to their filename. "Active" files will not have a timestamp appended.
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.