• [solved] Suricata in legacy mode with Wireguard interface

    2
    0 Votes
    2 Posts
    357 Views
    Bob.DigB

    So it does work. 😊

    Capturexx.PNG

  • pcap on alert

    7
    0 Votes
    7 Posts
    769 Views
    B

    @bmeeks It looks like they might have put this into v7.

    https://forum.suricata.io/t/how-to-log-alert-into-a-pcap/2127/4

  • 2.6.0 --> 2.7.0 Upgrade Crash Report

    Moved
    9
    0 Votes
    9 Posts
    2k Views
    bmeeksB

    @TAC57 said in 2.6.0 --> 2.7.0 Upgrade Crash Report:

    Something must be screwed up because if I reboot a number of packages don't automatically start,

    Yes, this would be a red flag that your upgrade did not complete properly.

  • 0 Votes
    9 Posts
    767 Views
    Yet_learningPFSenseY

    @SteveITS Thank you very much. I heard that even current antivirus software can be bypassed by creating viruses that can evade detection through pre-testing by attackers. However, if they are using AI for checking, it might be possible to detect them. I would like to consider using it.

  • everyday at 6am suricata crashes

    21
    0 Votes
    21 Posts
    2k Views
    E

    @bmeeks I believe I know why suricata would crash when geolite2 was updated and I believe suricata was using lots of data and holding ip address's well over 5000 them in snort2c tables, that, coupled with using too large a RAM Disk for /var & /tmp, I was simply out of ram. I have changed the ram disk size and adjusted suricata to NOT keep ip's longer than 7 days and this helped as I've had no more 6am suricata crash nor core dumps have occurred.

    I really appreciate all of you guys help here on the forum :) Thank you again!

  • Snort fatal error after emerging.rules update

    38
    0 Votes
    38 Posts
    5k Views
    EmergingThreatsE

    @InstanceExtension Greetings - and apologies all for the disruption this caused last week. As identified within this thread, two rules (SIDs 2046273 and 2046274) were released to the live ruleset with syntax errors. The rules had the "flow: stateless" option set with "to_server" also set which causes a Fatal Error within Snort. Upon investigation it was found that due to a text parsing issue in our QA infrastructure these errors were missed and the rules were released into production.

    Going forward, we have made adjustments to our QA process to ensure this will not recur and errors of this sort will be caught within our QA process and mended. The next morning we released an out-of-band update to address.

    Feel free to reach out here via DM, on twitter (@et_labs) or on our Discourse.

  • ET Rules or Snort Subscriber rule

    10
    0 Votes
    10 Posts
    3k Views
    DefenderLLCD

    @EmergingThreats said in ET Rules or Snort Subscriber rule:

    @DefenderLLC Greetings - unfortunately, there is currently no alternative pricing at that tier. I will let the sales team know of the interest, though.

    Thanks for the reply. I would be gladly pay a modest fee for both licenses. Perhaps you can offer a home lab license kind of like what Netgate does for pfSense+ licenses for home users.

  • SNORT pork borked

    1
    0 Votes
    1 Posts
    163 Views
    No one has replied
  • SNORT borked again and again LOL

    1
    0 Votes
    1 Posts
    148 Views
    No one has replied
  • it works for me

    1
    0 Votes
    1 Posts
    146 Views
    No one has replied
  • Snort: Alert log format

    9
    0 Votes
    9 Posts
    6k Views
    D

    @johnnybee I have the same question.
    Please share with me if you have the answer.
    Thanks in advance.

  • Best way to block when behind a proxy

    4
    0 Votes
    4 Posts
    576 Views
    M

    @bmeeks was hoping there was some…trickery. But alas it’s reading the IP header so not much can be done

  • Suricata Alert Log View Filter

    3
    0 Votes
    3 Posts
    303 Views
    NogBadTheBadN

    @bmeeks Thanks Bill.

  • Snort block only inbound traffic

    2
    0 Votes
    2 Posts
    217 Views
    bmeeksB

    The only way to accomplish that would be to rewrite all the rules and reverse the direction logic. That's a lot of work.

  • Snort Custom Rule not alerting on traffic

    5
    0 Votes
    5 Posts
    2k Views
    E

    @bmeeks
    Ah, that is right. I might have gotten confused with that field. It does work omitting the content section.
    I appreciate your help!

  • Suricata inline mode with Netgate 6100

    8
    0 Votes
    8 Posts
    1k Views
    bmeeksB

    @pfsjap said in Suricata inline mode with Netgate 6100:

    Wasn't a driver issue after all. MTU of this interface was 9000 and netmap buffer size (dev.netmap.buf_size) was 2048 (default). After setting buffer size to 9100, Suricata started in inline mode.

    Found this tunable in here.

    Ah! Good detective work.

    The error message certainly was not helpful in this instance. It could have said "out of memory" or "insufficent buffer size" you would think. This error comes from the netmap device code within FreeBSD and has nothing to do with Suricata's use of netmap. Not many folks are using MTU sizes larger than 1500, though.

  • Is Suricata package updates blocked by an internal decision?

    15
    0 Votes
    15 Posts
    2k Views
    DefenderLLCD

    @bmeeks Thank you, Mr. Meeks.

  • Snort vs Suricata Lists

    5
    0 Votes
    5 Posts
    617 Views
    DefenderLLCD

    @Dobby_ Good idea. I do have two 8GB RP4B's just sitting around doing nothing. I was using those for Pi-hole before switching to pfBlockerNG.

  • Blocking p2p on vlan

    5
    0 Votes
    5 Posts
    332 Views
    C

    @the-other I got pfblockerng installed... are there preloaded p2p blocklists or is this something I need to create myself?

  • How to enable IPS - Blocked Offenders is enabled

    7
    0 Votes
    7 Posts
    1k Views
    M

    @bmeeks I meant to update this thread before your response. Beat me to the punch.
    My misunderstanding is really how to work with the GUI in regards to IPS/IDS. Some of the elements aren't exactly clear so it did require poking through several threads here to understand how the pieces work.

Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.