• Snort IDS remote logs suppressed when OpenAppID enabled

    6
    0 Votes
    6 Posts
    975 Views
    bmeeksB
    @InfnBiz No, there is no staff support for Snort or Suricata. I am a volunteer package maintainer for those packages. In fact, the vast majority of the pfSense packages are supported by volunteers. This statement is incorrect: So with that said, there are 3 remote syslog server points on pfesense (system logs, snort/ids logs, barnyard2logs) There is no built-in mechanism within just Snort for remote syslog servers. You must either configure Barnyard2 for syslog export or use the built-in pfSense remote syslog option to export all system logs to a remote server. In order for that last method to work with Snort, you must then configure the option on the INTERFACE SETTINGS tab to log Snort alerts to the system log. So which of these two methods are you using? All pfSense system logs are being exported to a remote syslog server and Snort is configured to log to the system log for the interface in question; Barnyard2 is configured on the interface and Barnyard2 is configured for remote syslog logging.
  • Crash report begins. Anonymous machine information:

    Moved
    2
    0 Votes
    2 Posts
    374 Views
    bmeeksB
    A quick forum search with this error information will uncover lots of posts that give you the cause and the fix. Short version is the log file you are trying to open and view is too large to be read into the available PHP memory. Enable automatic log management on the LOGS MGMT tab and don't let your log files get so large. Or else don't try to view them via the LOGS VIEW tab and instead open them with a third-party editor from a command-line session. Or better still, export them off the firewall into a SIEM-type server. This is a limitation of the PHP sub-system that the GUI works on top of.
  • Latest Snort Upgrade error in library engine

    30
    0 Votes
    30 Posts
    11k Views
    D
    It helped me: ln -s /usr/lib64/libdnet.so.1.0.1 /usr/lib64/libdnet.1
  • Suricata IP Reputation Configuration Help

    5
    2
    0 Votes
    5 Posts
    2k Views
    J
    @bmeeks said in Suricata IP Reputation Configuration Help: he IP REP tab was originally put in place to s Thankyou good info
  • Setting all rules of a category to drop

    2
    0 Votes
    2 Posts
    244 Views
    NollipfSenseN
    @hebein You can use SID, edit the dropsid.conf and add the list. In my example below shows different individual SID and not a whole rule set. Also, you might not enable that rule set. [image: 1580066854890-screen-shot-2020-01-26-at-1.24.03-pm.png] [image: 1580066885721-screen-shot-2020-01-26-at-1.23.37-pm.png]
  • SG-4860 Suricata Inline IPS

    2
    0 Votes
    2 Posts
    348 Views
    NollipfSenseN
    @petrt3522 Any Netgate hardware would, I believe because they would use a NIC that supports!
  • suricata and ipv6 trouble

    2
    0 Votes
    2 Posts
    463 Views
    NollipfSenseN
    I noticed both Suricata 4.1.6_2, and 4.1.6_3 caused a crash report to be generated...I am also on pfSense 2.5 and dual Intel i350. [image: 1579884504854-screen-shot-2020-01-23-at-11.09.04-am.png]
  • Suricata breaks when I lose internet from ISP.

    10
    0 Votes
    10 Posts
    508 Views
    bmeeksB
    @twennywonn said in Suricata breaks when I lose internet from ISP.: @NollipfSense I’m not sure you’re great at reading. He mentioned that could be the issue depending on what the logs say. I mentioned I didn’t know if I have access to those logs as I have uninstalled Suricata entirely. To answer the other question I do not have PPPoE. I will reinstall tonight and simulate and internet loss. Then if Suricata fails I’ll let you know what the logs indicate. The logs are likely still there unless you specifically checked "Remove Logs when Uninstalling" under the GLOBAL SETTINGS tab. The PID file would automatically get removed, though, when removing the package. To see the logs without Suricata being installed you will need to use the DIAGNOSTICS > EDIT function in pfSense and browse to /var/log/suricata/suricata_xxxxx where that last bit is a sub-directory created for each configured Suricata interface. The subdirectory name will be the physical interface along with a randomly-generated UUID. If you install the Suricata package again, the suricata.log from the previous install will get overwritten when Suricata is started. That file is overwritten with each start of Suricata on the interface. I don't recall anyone else ever posting with this particular issue. It seems strange for loss of Internet connectivity to crash Suricata. The only other possibility is if your interface is rapidly cycling and as a result Suricata is getting sent multiple "restart all packages" commands in quick succession. When interfaces come up, pfSense will issue an internal "restart all packages" command which attempts to restart all the installed packages. If that happens multiple times in quick succession, you could wind up with multiple copies of Suricata all attempting to start at the same time on a single interface.
  • OpenApp ID alerts not displaying

    4
    0 Votes
    4 Posts
    355 Views
    L
    So I change the setting from IPS Selection group to manual configuration and was able to start logging App info. Thanks for the recommendation and will be looking into the possibility of customizing the IPS selection groups.
  • 0 Votes
    4 Posts
    2k Views
    bmeeksB
    @Chinojames said in Suricata Error PHP Fatal error: Allowed memory size of 536870912 bytes exhausted (tried to allocate 540538808 bytes) in /usr/local/www/suricata/suricata_logs_browser.php on line 54: @bmeeks said in Suricata Error PHP Fatal error: Allowed memory size of 536870912 bytes exhausted (tried to allocate 540538808 bytes) in /usr/local/www/suricata/suricata_logs_browser.php on line 54: sure the automatic log management is enabled already. how can i avoid this error? you said i allowed my log files to get too large, how can i manage my log file and reduce it to the limit so that this error will not occur anymore. or whats the best should i do? my pfsense keep on giving me this error and it said fatal error. thanks for your response. Are you running the most recent version of the Suricata package? When you go to SYSTEM > PACKAGE MANAGER does it show any update available? If it does, install that update. There was an issue some time back where the autotmatic log management was not functioning properly. What exactly are you trying to view when you get this error? Which log file are you choosing? Or does this error happen before you choose any log to view? Looking at the code in the area of line 54, I see that it is attempting to load the contents of the log file into memory in preparation for viewing. The log file is larger than the amount of available PHP memory in pfSense, hence the crash. You will not be able to open that file in the web GUI. It is possible that on a busy network, you may have to reduce the file size limits substantially in order to keep some logs from chatty sub-systems from getting too large. The Suricata binary itself does not have built-in log limiting for some logs, so the GUI code does its own check every 5 minutes of log file sizes and prunes and rotates when necessary. However, on a very busy network a log file can possibly get very large (beyond 200-500 MBytes) in that short period of time.
  • Suricata 4.1.X interface stopping [Sorted by going back to Snort]

    14
    0 Votes
    14 Posts
    1k Views
    R
    Ok, so after 5 days of running snort with same rulset as suricata without single problem I would say that suricata was a problem. So I will keep using snort as stability is more important for me. Thank you for help!
  • Update Failed: Server 302 error when running update.

    8
    0 Votes
    8 Posts
    911 Views
    Z
    Hi, I have the same error, I have 2 pfsense server, the pfsense-A doesn't have that problem and Update all. But the pfsense-B(VM) have a pfsense out of the box whitout any config extra, just snort. this server have the same Snort Oinkmaster Code that Pfsense-A, maybe that's the problem?
  • Suricata GPU support?

    2
    0 Votes
    2 Posts
    993 Views
    bmeeksB
    Suricata upstream removed CUDA support two years ago. Here is the upstream pull request that removed it: https://redmine.openinfosecfoundation.org/issues/2382. So with the feature removed from upstream, that also makes it unavailable on pfSense. But the pfSense package never supported CUDA anyway. There are currently no plans for such support.
  • reinstalling snort problem

    2
    0 Votes
    2 Posts
    332 Views
    bmeeksB
    @Simbad said in reinstalling snort problem: Hi! After reinstalled snort, i dont see snort in menu & recive this error: PHP ERROR: Type: 1, File: /usr/local/pkg/snort/snort.inc, Line: 2340, Message: Allowed memory size of 402653184 bytes exhausted (tried to allocate 301989888 bytes) @ 2020-01-12 08:29:01 How can I complete the installation without previous configuration? It looks like from that message that PHP itself ran out of available memory. That particular line of code in the snort.inc file indicates you have something miconfigured perhaps in your SID MGMT files. You can try these steps to recover. Make a backup of the firewall's config.xml file. Under DIAGNOSTICS > EDIT open /conf/config.xml. Search through that file and find this line in the XML code: <auto_manage_sids>on</auto_manage_sids> Change the "on" to "off" and save the file. That will tell Snort not to use SID MGMT. Delete the package and reinstall. Since your installation is not completing, you likely don't have a Snort menu option under SERVICES, so you will be stuck with manually editing the config.xml file. That is very dangerous, so make a backup before making any modifications to the file.
  • Is this something that will be part of suricata in the future?

    2
    0 Votes
    2 Posts
    855 Views
    bmeeksB
    @jpgpi250 said in Is this something that will be part of suricata in the future?: On reddit, there is a topic, discussing code, added to suricata to detect, among other things, DOH connections. I wonder if this feature will ever make it into the pfsense version of suricata, detecting and possibly blocking DOH might be a real benefit for users that absolutely want to prevent it. GitHub code here. Only if and when that code is merged into the offical upstream release of Suricata. The pfSense package uses the upstream binary. The only patch applied is to incorporate the custom blocking plugin. So if Suricata upstream accepts and merges that programmer's code edits, then it will appear in pfSense when the Suricata package updates to the latest upstream binary. If the programmer does not submit it to the Suricata upstream team via their Github site, then it will never make it into pfSense.
  • Suricata and Snort for pfSense 2.4.5 (Solved)

    3
    0 Votes
    3 Posts
    689 Views
    NollipfSenseN
    The solution was just upgrade to pfSense 2.5-dev...now, running Suricata inline mode WAN and Snort inline mode LAN...like it so far, especially having Snort preprocessors on LAN in inline mode.
  • Suricata - File-store location - impossible to change

    5
    0 Votes
    5 Posts
    2k Views
    bmeeksB
    The option to specify a custom file-store logging directory is now available in the latest 4.1.6_1 version of the Suricata package. See the Release Notes in this post: https://forum.netgate.com/topic/149490/suricata-v4-1-6_1-package-update-release-notes.
  • 3 Votes
    1 Posts
    302 Views
    No one has replied
  • Suricata 4.1.6 crashes when starting Interfaces

    suricata crashing pfsense 2.4.4
    4
    0 Votes
    4 Posts
    2k Views
    G
    @kiokoman THX! System is up and running :)
  • PFSense Suricata - High Availability?

    2
    0 Votes
    2 Posts
    1k Views
    bmeeksB
    The Suricata package has a SYNC tab where you can configure the package to send its settings to one or more identical pfSense hosts. The two boxes must be identical in terms of hardware up to and including NIC types and port assignments (i.e., which one is LAN, WAN, etc.). All the SYNC does is copy settings such as configured interfaces and rules. There is no sort of state sync or any other type of realtime data exchange between the synced packages. So not exactly HA in the true sense, but it does give you a twin version of the package should the active firewall go down and the standby takeover. However, in terms of Suricata, there would be a traffic disruption of sorts since the standby version coming online will have no idea what TCP streams the other host was seeing/handling. And there is no synchronization of blocked hosts.
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.