• Suricata Inline and Traffic Shaping

    2
    0 Votes
    2 Posts
    411 Views
    bmeeksB

    Running Suricata with Inline IPS Mode automatically activates the FreeBSD netmap device. Using the netmap device seems to break things like traffic shaping and bandwidth recording. These are all issues within FreeBSD itself and are not directly related to pfSense nor Suricata.

    Unfortunately netmap is not a 100% mature technology on FreeBSD and thus has some warts. If shaping and bandwith monitoring are important to you, you should switch over to Legacy Mode blocking. On the other hand, if those things are something you can do without, then Inline IPS Mode offers several benefits when compared to Legacy Mode blocking.

  • Barnyard2 can't connect to remote mysql

    5
    0 Votes
    5 Posts
    886 Views
    R

    I see. I will stop using Barnyard2.

  • 0 Votes
    3 Posts
    1k Views
    R

    I was bitten by this bug as well: https://forum.netgate.com/topic/145455/barnyard2-can-t-connect-to-remote-mysql

    What database do you use? Maria DB or MySQL? I tried both in my Fedora box (outside of pfsense). They both failed.

  • Snort running on SG-1100 randomly stops working

    13
    0 Votes
    13 Posts
    2k Views
    C

    @bmeeks Thanks! I will try some of your suggestions. I think I am going to adjust the IPS policy to Connectivity.

    I am very happy with the SG-1100. It's perfect for a home firewall application.

    Another observation. I rebooted my firewall this morning and noticed the mem usage drop from 66% down to 31%. I am going to monitor it see if it creeps backup.

  • Surricata upgrading not completing

    2
    0 Votes
    2 Posts
    297 Views
    bmeeksB

    Are you sure you have connectivity to the AWS infrastructure where the Snort rules are hosted? Are you running any other package such as pfBlockerNG with DNSBL? Sometimes in the past the IP space where the Snort rules are hosted has wound up on somebody's "bad IP space" list.

    How long have you waited for the download to compete? Depending on your Internet connectivity and how busy the pathway is between you and the site, it could take several minutes for the rules to download.

    Finally, are you using a RAM Disk? If so, you need at least 256 MB of free space in /tmp for rules downloads to succeed.

  • Suricata Getting Updates

    21
    0 Votes
    21 Posts
    2k Views
    bmeeksB

    @NollipfSense said in Suricata Getting Updates:

    @bmeeks Hi Bill, just a note to update you that I had gotten the Akitio thunderbolt 2 PCie enclosure and added the Intel i350NIC I had...now running Suricata inline mode on the Mac Mini server converted to pfSense box, no problem...persistency is the key to success! During this process, I learned that it was Intel in collaboration with Apple who had created the thunderbolt interface; so, intuitively, the interface would work with Intel's NIC. I am one happy camper here!

    I confess to be rather surprised the Intel NIC in the Thunderbolt interface worked. Apple is not known for being big on interoperability with other vendors.

  • Snort v4.0_4 Package Update -- Release Notes

    1
    1 Votes
    1 Posts
    180 Views
    No one has replied
  • Suricata v4.1.4_5 Package Update -- Release Notes

    1
    2 Votes
    1 Posts
    178 Views
    No one has replied
  • Suricata Parse Error (solved)

    2
    0 Votes
    2 Posts
    764 Views
    NollipfSenseN

    @NollipfSense said in Suricata Parse Error:

    <Error> -- [ERRCODE: SC_ERR_SIZE_PARSE(198)] - Error parsing defrag.memcap from conf file - <Error> -- [ERRCODE: SC_ERR_SIZE_PARSE(198)] - Error parsing defrag.memcap from conf file - 33,554,432. Killing engine.

    Well, this is a little embarrassing however, I got the issue fixed and it's right here (33,554,432)...should have been 33554432. Suricata now runs in inline mode.

  • Suircata Throughput

    3
    0 Votes
    3 Posts
    434 Views
    bmeeksB

    Like user @ekke mentioned, if you are sensible about the rules you enable then you can achieve your target throughput. If you enable every rule category, then "no", you won't achieve your target throughput. By "sensible" I mean things like not enabling rules that inspect for issues that will not be a threat to your environment. For example, if you do not have Internet-facing and public DNS and mail servers, then there is no need to run any rules that scan for threats targeting mail or DNS servers. If you do not have Internet-facing and public web servers, then you don't need any web server rules. There are other cases, too, where some threats may not be a problem in your network environment.

    One thing you will have to do with that many cores is bump up the Stream Memcap parameter. Here is a link to an older thread on the subject: https://forum.netgate.com/topic/124850/suricata-fails-to-start.

  • 0 Votes
    4 Posts
    4k Views
    jimpJ

    At the hypervisor level, running in promiscuous mode allows the VM to see traffic not destined for its MAC address. The most common use cases for this are:

    HA - It's required for CARP to function L2 Bridging - Otherwise traffic for non-firewall hosts will be dropped as they have different MAC addresses.

    It's not necessary for packet captures or an IDS. That's promiscuous mode of the interface at the OS level, not in the hypervisor.

  • Limiting simultaneous SMTP connections

    2
    0 Votes
    2 Posts
    338 Views
    GertjanG

    Hi,

    A little hammering on a mail server isn't necessarily a bad thing. It helps to keep you, and itself, in shape.

    I'm not running myself a mail server behind pfSense, I hide it behind an empty iptables firewall (really : true, it's empty when the machine starts). I'm using world's famous fail2ban to scan the mail server log file, and when fail2ban finds suspicious actions like rejected mail connections then it will load the IP into the firewall for some time.
    This is the result. Blocking some 5k IP's right now, and counting. It will be holiday soon, so some new scores will be reached in a week or so.

    fail2ban scans all log files of all server type applications, from SSH to mail to web server and some others. Blocking suspicious IP's was solved a decade or two ago. Just let the tools work for you ^^

    Btw : setting up the tools is one thing. You, as an admin, has to read => yep, read ! - the logs to see for new behavior, and if found one, add new filters for it. It's a never ending story. Live is hard when you don't (know how to) script.

  • WAN traffic graph not showing outbound traffic

    Moved
    11
    0 Votes
    11 Posts
    2k Views
    P

    @bmeeks Thanks for the insight.

  • Reopening: Suricata inline mode hides outbound traffic graphs

    1
    0 Votes
    1 Posts
    135 Views
    No one has replied
  • 0 Votes
    8 Posts
    4k Views
    bmeeksB

    @oldrik said in Setup and configure snort on pfsense to detect an intrusion detection attemps within a LAN:

    @kiokoman pls if i understand well, does it mean that snort can't actually alert and block an attack such as a portscan performed by a user on a LAN network to another user on the same LAN ????

    if that is the case, how can snort be configure to alert and block a user on a LAN from another user on the same LAN who perform an attack such as a portscan ???

    Thanks in advanced

    Snort runs on the firewall. The firewall is not in the traffic path if two machines on the same LAN talk to each other. Only the LAN switch is in that pathway. The only time the firewall can see traffic from a LAN client is when that client is communicating with an IP address that is NOT part of the LAN. That would be a different LAN subnet where the firewall is the route to the different subnet, or some host out on the Internet (which means the traffic is traversing the WAN interface).

    So since Snort would not see one LAN client port scanning another LAN client (in the same subnet), it can't do anything about it.

    If you wanted to monitor traffic between LAN hosts on the same network, then you will need a managed switch that provides a span port (or port mirroring). You would then configure mirroring on the switch and set up a separate installation of Snort on say a Linux host on the LAN and connect that host to the span port on the switch. Only then could Snort on the Linux host see traffic between other LAN hosts.

  • Suricata - Block on drop not being respected for certain rules

    4
    0 Votes
    4 Posts
    437 Views
    bmeeksB

    @karel said in Suricata - Block on drop not being respected for certain rules:

    I was able to reproduce this every time. I've just suppressed those alerts for now.

    Thanks for the feedback. I will see about reproducing this in my test virtual machines and look for a cause. Might be something within the binary itself. It will be a few days before I have time for the testing, though.

  • Is it possible to block DoH and DoT, using SURICATA

    6
    0 Votes
    6 Posts
    2k Views
    johnpozJ

    @jwj said in Is it possible to block DoH and DoT, using SURICATA:

    I'm not holding my breath for relevant updates to privacy legislation. Too much money in surveillance capitalism and politics.

    Very very true! Also the lawmakers don't understand any of it.. Kind of hard to pass legislation on tech that is all just magic to you..

    We are just doing what the users want! We are providing a service - they agreed to it, etc. etc. Oh by the way here is some $ for that thing you wanted to get done.. We are here to help! ;)

    Also problem is the tech "can" be used for good!!! What your watching on TV is minor shit in the big picture..

    Guns can save your life from that bear, they can be used to feed your family... But they can also be used by bad guy to kill you.. Same goes for some of this tech - its all double edge swords.. They can cut the stuff you want to cut, but they can also cut you bad!

  • pFsense not connect to the Internet at all! + SNORT Update failed.

    2
    0 Votes
    2 Posts
    206 Views
    bmeeksB

    Well, first off your problem does not sound like a Snort problem. If you disable Snort on all interfaces do things work then? If not, you have to troubleshoot that first and only then come back and enable Snort. If you have any sort of Proxy package installed on your firewall, that's the first place I would start my troubleshooting.

    The fact you mention issues with basic package installation makes me think either connectivity issues at the hardware layer or something related to a proxy since you mentioned https_proxy in your post.

  • suricata/snort/etpro rules - how to be?

    2
    0 Votes
    2 Posts
    1k Views
    bmeeksB

    @Shazams said in suricata/snort/etpro rules - how to be?:

    Hello!
    I use the latest version suricata. I would like to expand the set of rules.

    Snort has two subscription options: $ 30 and $ 400. What is the difference in the rules between two subscriptions?

    I have to give you the smart alec answer first ... LOL. The difference is $370 ... ☺ .
    Okay, now that I've had my fun for the day, the real answer is there is no difference. The Snort team just has a different rate structure for private (as in individuals) versus commercial (business) users. Read the fine print on their licensing site. If you are purchasing a Snort subscription for a business, you should pay the higher rate. A pricing structure such as this is not too uncommon. Microsoft had something similar for students versus other users for their Office products.

    @Shazams said in suricata/snort/etpro rules - how to be?:>

    Does it make sense to apply the rules from etpro, if I purchased a snort subscription.

    p.s. Normal user.

    Unless you are Jeff Bezos or Bill Gates and just flush with cash, I think you will find an ET-Pro subscription fairly expensive (as in $2369.99 per year). That is way too rich for my wallet as an individual user. So in my case, and it's the same for the majority of users here, I would choose Snort over ET-Pro. Nothing wrong with using Snort and the free ET-Open rules, though.

    If I were the firewall admin for a larger business, and I had the budget, I would opt for the ET-Pro rules and use them along with Snort. It can never hurt to have multiple eyes looking out for trouble, or in this case multiple signatures.

  • Snort reload/restart

    5
    0 Votes
    5 Posts
    3k Views
    D

    No, it is not. Just two "ordinary" interfaces -> WAN & LAN.

Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.