• can snort/suricata secure clients using VM?

    7
    0 Votes
    7 Posts
    978 Views
    bmeeksB
    @ezvink said in can snort/suricata secure clients using VM?: @steveits That's what I want to ask sir, right, the network used by VM Attacker is the same network as the VM Client, but it doesn't work, sir, to attack the client, it is not detected by snort/suricata Two hosts on the same network (meaning the same subnet and/or VLAN) will communicate with each other directly point-to-point. They will NOT send their traffic through any gateway or firewall on a third host. So the pfSense machine in the scenario you described will never "see" the traffic between those two hosts (your VM Attacker and VM Client) and therefore cannot generate alerts. pfSense and any IDS/IPS running on it is blind to the traffic. The only time hosts will send traffic through a gateway or firewall is when the destination of the traffic is on a completely different network. In your other posts here, you seem to lack basic knowledge of networking and the set up of Hypervisors. Before you try experiments with an IDS/IPS, you should first really study and learn fundamental networking theory. Even a cursory knowledge of how routing works in the OSI model would have allowed you to immediately see why your current setup will not work.
  • Odd Suricata Inline IPS behavior

    12
    1
    0 Votes
    12 Posts
    2k Views
    B
    @bmeeks said in Odd Suricata Inline IPS behavior: pfBlockerNG-devel and DNSBL I can access Anydesk with these 2 plug-ins I disabled all in individual rules on Snort and start Snort Anydesk was blocked right away and there was no alert at all
  • Impossible to stop Suricata after 22.05 update

    3
    0 Votes
    3 Posts
    682 Views
    S
    @huskerdu Possibly you have multiple Suricata processes running. Check for that or restart.
  • Recovery help with suricata sid management

    5
    0 Votes
    5 Posts
    789 Views
    bmeeksB
    @sgnoc said in Recovery help with suricata sid management: @bmeeks Worked like a charm. Minimal to have to do once everything came back up. Even easier with the reinstall feature where the installer can grab the old config and reinstall it after the software is installed. I checked and all of the sid management back back where it needed to be. Thanks again. You are welcome. Glad you got everything going again. The IDS/IPS packages save all of their configuration information in the XML file, so all previous settings can be restored upon reinstallation of the package (or from a restore/recovery procedure).
  • Snort won't start up after pfSense upgrade

    12
    1 Votes
    12 Posts
    1k Views
    Bob.DigB
    @gpinzone said in Snort won't start up after pfSense upgrade: @gpinzone Just to follow up, the GeoIP Top Spammers block list has some false positives. It is almost a given if you are outside of the US.
  • snort install - rules md5 checksum failed

    4
    0 Votes
    4 Posts
    648 Views
    bmeeksB
    @jonrusk said in snort install - rules md5 checksum failed: @bmeeks Yes and that appeared to be the issue. I increased the size of /tmp on RAM disk and Snort installed successfully. Thank you! Note that I don't recommend using RAM disks with either of the two IDS packages (Snort or Suricata). Most especially for /var where the log files are written. And not having enough free space on /tmp, as you experienced, leads to problems as well. Those two packages were not created with RAM disk usage in mind. They really want a spinning disk (or conventional SSD) with a fair amount of space for logging.
  • SG-3100: have all 32bit related issues been fixed?

    12
    0 Votes
    12 Posts
    1k Views
    M
    @michmoor I'm exporting logs to it, but not netflow.. Using these extractors to parse the data: https://github.com/loganmarchione/Graylog_Extractors_pfSense
  • Snort and NMAP scans

    1
    0 Votes
    1 Posts
    287 Views
    No one has replied
  • 0 Votes
    1 Posts
    287 Views
    No one has replied
  • Snort-4.1.6 Package Update - Release Notes

    4
    5 Votes
    4 Posts
    1k Views
    bmeeksB
    I'm still waiting around to update Suricata. The Netgate team pulled in the latest 6.0.5 Suricata version in the pfSense CE 2.7 DEVEL branch. The pfSense CE and Plus RELEASE branch is still running the 6.0.4 Suricata version. There is really not a ton of changes between those two that would impact typical pfSense users. I'm monitoring the progress on 7.0rc1 and 6.0.6 from the upstream GitHub repo.
  • Suricata in legacy mode block entire tor category with SID management

    3
    0 Votes
    3 Posts
    776 Views
    L
    @bmeeks Hi bmeeks, Thanks for your answer. Greats, I have changed the category name into my Sid file and it perfectly works. Appreciate. BR L.
  • can't update rules suricata

    51
    2
    0 Votes
    51 Posts
    10k Views
    NollipfSenseN
    @ezvink May be so, however, you had WAN in host-only Adapter mode so you shouldn't have any DNS issue...good luck!
  • Netmap: new API version (14)

    6
    0 Votes
    6 Posts
    1k Views
    N
    @bmeeks In my case, VLANs are mandatory. In the end only an implementation that allows VLANs to work fits my needs. Hope at least on pfSense, they will still work in future releases too. Thanks for the hint.
  • Suricata memory usage very high

    8
    1
    0 Votes
    8 Posts
    2k Views
    R
    @le_bleu said in Suricata memory usage very high: Pfsense 2.4.5.r.20200318.0600 This is a beta release of 2.4.5 and more than 2 years old. You should upgrade to 2.5.2 at this point or at least the RELEASE version of 2.4.5.
  • snort and span interface

    4
    0 Votes
    4 Posts
    955 Views
    bmeeksB
    @juniper said in snort and span interface: @bmeeks said in snort and span interface: @juniper said in snort and span interface: Hi, is it possible to use pfsense snort with a span interface as sensor? thanks in advance No, that configuration is not supported. If you want to do something like that, I recommend a dedicated FreeBSD or Linux machine running the base Snort package from whichever distro you choose the OS from. There would be no GUI, though. Thank you! Just to clarify, I have a pfsense firewall with snort on a wan bridge (but in this way i can't check https traffico), my needing is to analyze http traffic over a reverse proxy (reverse to private network, reverse https to private network http), if i undestrand the only way is to create another bridge? Bridges can get very messy, and Snort really does not understand those (meaning the Snort package on pfSense) as it's not designed and plumbed up operate with that configuration on the interface. It expects a traditional single network interface. Not saying you might not could get it to somewhat work with duct tape, baling wire, and glue, but it's not a setup I would recommend. For your setup, I would lean more toward the span port option using a separate and dedicated Unix-type distro to run Snort. And I mean Snort as a package from that Unix distro and NOT the GUI package used on pfSense. That would mean interacting with Snort via the CLI.
  • How to unblock IP on pfSense+Snort using API or command line ?

    3
    0 Votes
    3 Posts
    2k Views
    I
    @bmeeks perfect, very very very thanks
  • Snort suppress or disable alerts not working

    4
    0 Votes
    4 Posts
    624 Views
    C
    @bmeeks Thanks for the reply, if I see this issue again I will definitely look for additional snort processes running.
  • snort

    Moved
    2
    1
    0 Votes
    2 Posts
    525 Views
    bmeeksB
    This is a harmless error. It means there is a mismatch between the name of an AppID entry as used in a text rule compared to the name in the OpenAppID stub detectors. This is a consequence of the fact the OpenAppID text rules have not been maintained by the original developer. You can manually grep through the various configuration files in the OpenAppID subsystem to identify the problem areas and fix them if desired. Sorry to say that more and more problems like this are going to crop up in OpenAppID for the Snort 2.9.x branch as the upstream Snort folks have concentrated all their efforts on the Snort3 branch. There is no Snort3 package for pfSense, and currently there is no plan to produce one. You may want to consider Suricata at some point, but there is no equivalent of OpenAppID in Suricata yet.
  • Snort ET scan detectors only half way working

    2
    0 Votes
    2 Posts
    604 Views
    JonathanLeeJ
    @jonathanlee the baseline has about 3 every morning that show and about 2 in the day time. [image: 1652192666473-screen-shot-2022-05-10-at-7.22.09-am-resized.png] Image: I use to see a lot more nmap scans caught during the night
  • pfSense+Suricata+VLANs+SID Mgmt = Odd unexpected behavior

    1
    0 Votes
    1 Posts
    254 Views
    No one has replied
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.