• Snort Behavior

    14
    0 Votes
    14 Posts
    2k Views
    DefenderLLCD
    @bmeeks said in Snort Behavior: @defenderllc said in Snort Behavior: @steveits said in Snort Behavior: @bmeeks said in Snort Behavior: the next packet through will simply trigger another block He's saying it was triggering alerts while the service/interface was showing stopped in the GUI. Hence my comment about a zombie process. It was still still blocking with the interfaces completely deleted from Snort. I had to reboot to get this to stop. You should look for Snort alerts under the ALERTS tab of the Snort GUI. You can see blocks under the BLOCKS tab. Here is what was happening. An excessive amount of SIP traffic triggered a bunch of blocks that pushed memory utilization to nearly 100% and the firewall was inaccessible for about 10 minutes. I was finally able to get in via console cable and then eventually the GUI. The Snort LAN interface was stopped which was fine with me so I could make some adjustments. The memory remained at nearly 70% and I was super busy with work, so I tried to stop the bleeding by simply stopping the service. That did not work because it would just restart within seconds even without it being configured in Service Watchdog. The next step was just to delete all of the interfaces in Snort, clear all alerts and blocks... I did this over and over and it did not matter because they just kept coming back despite a lack of any interfaces configured. Memory utilization was still high. A reboot was what it took to clear everything - include the memory utilization. #LessonLearned
  • pfsense software pro package list empty - IDS / IPS

    2
    0 Votes
    2 Posts
    281 Views
    S
    @smoses Plus? There are a few recent posts about empty package lists…try re-saving your existing update branch setting (Settings/update/Settings).
  • Source of IP addresses blocked by Snort

    10
    1
    0 Votes
    10 Posts
    710 Views
    johnpozJ
    @yet_learningpfsense said in Source of IP addresses blocked by Snort: may be cases where a supposedly safe website could become a dangerous one That is anysite on the planet to be honest - sites get compromised all the time, and then become hosts to malware, etc.
  • Snort 4.1.6 upgrade Crash

    3
    0 Votes
    3 Posts
    570 Views
    T
    @bmeeks This worked perfectly thanks so much! Wish I did that before posting!
  • Automated Snort rules update failing

    6
    0 Votes
    6 Posts
    1k Views
    C
    Thanks for the additional information bmeeks! I did check the documentation on Rules Update Settings and didn't see anything about altering the time if scheduled rule updates fail. It's documented here now so hopefully it will help others.
  • Converting undesired Snort blocks into suppression list entries

    8
    0 Votes
    8 Posts
    739 Views
    bmeeksB
    @oak9 said in Converting undesired Snort blocks into suppression list entries: The only cleartext transmissions I've seen recently were around the blocks discussed earlier (updater-related stuff apparently still using HTTP). Some DNS lookups are still cleartext (if you do not have TLS enabled). Most all websites are now HTTPS including most (if not all) of the Microsoft sites. Rules can trigger off metadata without actually looking at the payload. That is what many of the ET-Info rules look at. Examples are source or destination IP addresses, protocols, ports, and certain non-encrypted metadata present in some protocols. SNI is an example of metadata associated with HTTPS connections that is still mostly unencrypted. But that is changing with the coming introduction of encrypted SNI. But metadata analysis is not effective for malware detection. After all, a blackhat hacker is not going to clearly identify his malware unless he is a complete idiot .
  • Suricata SID Mgmt Config List examples

    9
    0 Votes
    9 Posts
    1k Views
    J
    ultimately i still have no idea what i'm doing.. just as i think i might have gotten it, something else raises a question that makes me second guess everything.
  • Rule Behavior Check Please!

    7
    1
    0 Votes
    7 Posts
    914 Views
    U
    @bmeeks Oh, I see the PASS list now, it was right below the EXTERNAL_NET in the UI. Also, thank you so much for that explanation on HOME_NET and EXTERNAL_NET. That makes sense the way you've explained it. I really apricate you taking the time to do that. :)
  • suricata inline confusion

    7
    0 Votes
    7 Posts
    983 Views
    J
    @jdeloach said in suricata inline confusion: @cyberconsultants @jc1976 Just in case you are not aware, Snort and Suricata are not packages that you just install, configure and then forget about like antivirus programs. These packages require constant maintenance if you want to get the full effect of what tasks they perform. i understand that. I just thought that there would be a way to more easily have the benefits of in-line scanning with the easier configuration of legacy.
  • SpeedTest logging server + pfsense with Snort

    3
    0 Votes
    3 Posts
    330 Views
    B
    @steveits I collect descriptions from suppress file: (http_inspect) PROTOCOL-OTHER HTTP server response before client 120:18 (http_inspect) NO CONTENT-LENGTH OR TRANSFER-ENCODING IN HTTP RESPONSE 120:3 (http_inspect) UNESCAPED SPACE IN HTTP URI 119:33 (http_inspect) BARE BYTE UNICODE ENCODING 119:4 All alerts has it's own GID:SID I know that alerts are from SpeedTest because I have done an extensive test.
  • Error log help

    3
    0 Votes
    3 Posts
    403 Views
    J
    @steveits said in Error log help: https://redmine.pfsense.org/issues/13377 ok thanks! I'll give it a shot when i get home.
  • suricata on wan interface question

    4
    0 Votes
    4 Posts
    892 Views
    S
    @jc1976 There was a thread in recent weeks. IIRC one scenario was when the router had lots of internal interfaces, so running once on WAN was better than running 10-20 instances. It runs outside the firewall so on WAN it will end up scanning packets that will be dropped by the firewall. Also it cannot identify the LAN IP since it can only see the NATted WAN IP.
  • Snort dont detect P2P traffic

    1
    0 Votes
    1 Posts
    336 Views
    No one has replied
  • Alerts received on incorrect interface

    25
    1
    0 Votes
    25 Posts
    3k Views
    S
    @bmeeks thanks for the explanation. Since yesterday the limit seems to work, just checked.
  • 0 Votes
    2 Posts
    999 Views
    bmeeksB
    99% chance it is a false positive. A quick Google search for that rule alert description turns up a lot of other false positive posts going back over several years.
  • I would like to check if Suricata is able to analyze SSL communication

    12
    0 Votes
    12 Posts
    4k Views
    GertjanG
    @bmeeks said in I would like to check if Suricata is able to analyze SSL communication: Here is a great read about CAs from Wikipedia: https://en.wikipedia.org/wiki/Certificate_authority. Yeah : great When I post this message on this "forum.netgate.com", I use most of all that stuff without needing to know whats going on. I'm pretty sure that the reader of that wiki page must have to have some knowledge about the subject. If not, he'll be lost after the very first two phrases.
  • Snort Rule 1:2044746 ET Trojan SOMNIRECORD

    14
    2 Votes
    14 Posts
    2k Views
    J
    @dbmandrake @jimmychoosshoes @phodge [image: 1680731299120-049f1f8c-728f-452f-a423-d415de931fd0-image.png] Found the actual contact attempt in the pihole logs .. the wife's Macbook Air. Hmm, time to exorcise that laptop.
  • 0 Votes
    6 Posts
    578 Views
    bmeeksB
    @nsuttner said in After upgrade from pfsense 22.05 to 23.01 - SNORT is getting a core dump!!!!: @mcury Hello, i'm a little confused now, but I understand the basics. So I need to make this change in the Makefile for the Snort binary. Sorry, where can I find this file, i'm not that deep into the matter! Thanks so much, Norbert No, there is nothing you can do on your end. The pfSense developer team will make the change on their package builder infrastructure for the SG-3100, and then a new version of the Snort package will appear under SYSTEM > PACKAGE MANAGER. It may take a few days for this to transpire.
  • Snort and OpenID

    1
    3
    0 Votes
    1 Posts
    230 Views
    No one has replied
  • Attack from aggrosoperations.ltd

    5
    0 Votes
    5 Posts
    1k Views
    M
    @edils0n-lima Não ative o Snort na WAN. Isso é inútil, pois a ação padrão do firewall é bloquear. Coloque o Snort na sua LAN. Do not enable Snort on the WAN. That is pointless to do as the default action of the firewall is to block. Place Snort on your LAN.
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.