• Snort 3.x Awesome ... (?)

    1
    0 Votes
    1 Posts
    415 Views
    No one has replied
  • Exclude own IP addresses in firewall logging

    1
    0 Votes
    1 Posts
    239 Views
    No one has replied
  • ISP Injecting Java Script into pages (XSS)

    14
    0 Votes
    14 Posts
    2k Views
    jimpJ

    If your ISP is pulling shady shenanigans, you can:

    Get a new ISP that doesn't engage in shenanigans Use a VPN to tunnel past their shenanigans

    /shenanigans

  • NGINX Behind Snort?

    1
    0 Votes
    1 Posts
    634 Views
    No one has replied
  • 0 Votes
    9 Posts
    1k Views
    bmeeksB

    @tsmalmbe
    The confusion stems from the somewhat primitive way the plugin has to handle blocking. The blocking plugin is actually written as a Snort logging output plugin, and it gets a copy of every alert that is triggered. Unfortunately, the rule "action" is not part of the alert data that is sent to the plugin. So it cannot know if the alert it was copied on was from an alert action rule, a drop action rule or a pass action rule. So it has to treat every alert notice it receives as a "block" or "drop" action.

    So in your case, the alert is actually just a notification, but the blocking plugin does not know that. So it has to assume the alert is something it needs to block.

  • Snort + Barnyard2 + What?

    14
    0 Votes
    14 Posts
    3k Views
    B

    Yes, you can specify SSL/TLS settings

    One limitation I've run into is that you cannot easily send the same logs to multiple destinations directly from Filebeat. You have to either run multiple instances on the firewall or duplex it from eg a central Logstash service to other locations. It has load balancing built-in, but not duplexing.

  • Suricata service stops/wont restart if blocking mode enabled (Solved)

    6
    0 Votes
    6 Posts
    1k Views
    T

    Great thanks.

    I certainly understand the ramifications!

    However my network is designed into segments, for example there is a DMZ, this has an internal addressing scheme. If this zone started poking around other internal zones it would mean there is a breach so I'd want it blocked.

  • 0 Votes
    5 Posts
    573 Views
    bmeeksB

    @tsmalmbe said in Snort: Two firewalls, missing a lot of rules although similar configuration/setup (Solved):

    This was it. What a simple solution for once.

    Glad you got it sorted out. Snort or Suricata and RAM disks are not good matches. I always recommend no RAM disk when running either of those two packages.

  • Snort Blocking too much.

    Moved
    4
    0 Votes
    4 Posts
    877 Views
    bmeeksB

    @nambi said in Snort Blocking too much.:

    @nogbadthebad said in Snort Blocking too much.:

    Create a VPN, IPsec or OpenVPN, don't allow access through the firewall so you can view your CCTV cameras.
    If Snort is blocking too much don't set Block Offenders and leave it running for a week or two, then decide what rules to switch off before enabling blocking.

    Thank You I currently have a VPN for this access but was hoping to leave my mail server and CCTV access open.

    Read up on how to use Snort and how to use Suppression Lists. Google is your friend for that. Lot's of tutorials out there on how to do that.

    For your mail server and CCTV systems, look at what rules are alerting (and thus blocking). Determine if they in fact represent false positives in your environment. If so, you can suppress those rules using three different techniques. You can suppress the alert entirely for any IP address, you can suppress the alert when the destination IP address is a specific host or subnet, or you can suppress the alert when the source IP address is a specific host or subnet. There are also suppress (also called thresholding) options for only alerting after a specific number of alerts in a given time period have occurred. In short, there are many options for tuning an IDS/IPS like Snort or Suricata. Google "thresholding and suppression" for Snort.

    An IDS/IPS is not a package you install and then walk away from and expect it to work without any hassles. Every IDS/IPS requires tuning by an experienced network security admin using knowledge about the unique network environment being protected by the system.

  • Huge Suricata Stats Logs

    16
    0 Votes
    16 Posts
    3k Views
    S

    @bmeeks Then I'll just wait. We just started rolling out the 2.4.4 updates to our managed routers when 2.4.4_1 came out. We're holding off on upgrading to it until we finish testing in our office (after the first of the year). Maybe by that time you'll have the 4.1.0 update out and we can just roll with that. Thanks!

  • Suricata Alerts Tab Error

    7
    0 Votes
    7 Posts
    1k Views
    bmeeksB

    @teamits
    Yes, log rotation is independent of the Directory Size Limit setting. The Directory Size Limit is a safety valve designed to prevent firewall DOS caused by running the system out of disk space due to growth of IDS/IPS logs. So if the Directory Size Limit value is reached, and the setting is Enabled, then logs are cleaned up until space drops down below the limit.

    Log Rotation is a slightly different animal. When Log Rotation is enabled, every 5 minutes a cron task executes that examines the configured log files to see if they have reached the rotation size limit. If reached, that log file is rotated. At the end of the log rotation script it checkes the ages of rotated logs and removes those older than the configured retention interval.

    So you can enable Directory Size Limit protection and leave Log Rotation and Aging disabled; or you can disable Directory Size Limit protection but enabled Log Rotation and Aging.

  • 0 Votes
    6 Posts
    1k Views
    bmeeksB

    @boobletins said in Enabling etpro-exploit.rules causes rules in other non-active categories to become enabled in Suricata...:

    To confirm this could he check flowbit-required.rules?

    Do you know what happens in the case of rules like 2018959 where the same flowbit is both tested and set?

    flowbits:isnotset,ET.http.binary; --- then later --- flowbits:set,ET.http.binary;

    Is pulled pork (or whatever is being used) smart enough to know that if 2018959 is disabled and not used elsewhere it should stay that way?

    I have not looked at the full text of the rule you mention, but a rule author might use logic like that as a type of "if-then" statement. If not set, then set it; otherwise let it be. Use of flowbits is a totally arbitrary thing for rule authors. You can create as many as you like with whatever names you want, just so long as you don't duplicate the names.

    Pulled Pork is not being used in the Snort or Suricata packages, but the code logic is the same. It will enable rules as necessary to be sure at least one "set" operator exists for any flowbit with a corresponding "isset" operator. Now, if an admin truly wants a rule to always be disabled, flowbits be damned, then when you force a rule state to disabled on the RULES tab (or by clicking the X icon on the ALERTS tab), then that rule is disabled. The user-forced actions are the last operations performed on the set of rules when compiling the list for an interface.

    There is a Sticky Post here on the IDS/IPS sub-forum about how that works. You can also follow the program code in the file /usr/local/pkg/suricata/suricata.inc. Look for the function suricata_prepare_rule_files().

    Edit: here is the Sticky Post I mentioned describing the rules building logic.

  • Suricata Update 4.0.13_9 PHP Warnings

    28
    0 Votes
    28 Posts
    4k Views
    bmeeksB

    @veldkornet said in Suricata Update 4.0.13_9 PHP Warnings:

    Thanks, I recreated the interface and that fixed it indeed!

    Glad it is fixed for you. Thank you for the feedback.

  • Deleting log files through boot concole

    5
    0 Votes
    5 Posts
    855 Views
    P

    Will test this later today. Your help is highly appreciated!

  • Suricata inline with Netgate SG-2440 -- high cpu utilization

    19
    1 Votes
    19 Posts
    3k Views
    B

    Some notes on lb:

    lb doesn't currently ship with FreeBSD or pfSense. It's possible to build it from the source repo, but if you do that it's not the same version of netmap.

    Building the new version of netmap + lb from source on FreeBSD 11.2 yields driver build errors and it's downhill from there.

    This package: https://github.com/bro/packet-bricks is more promising (don't let the "bro" dissuade you).

    If I knew how I would try to put together a pfSense package for packet-bricks. It would help in some cases with Suricata processing because it would allow for better load balancing across CPUs in combination with Suricata's CPU affinity settings.

    packet-bricks is run by the ICSI lab at Berkeley. It's a version of lb (also requires netmap) with creature comforts and additional capabilities.

    If I'm reading the commits correctly the lb tool from the creator of netmap was recently added to FreeBSD as well, but I can't tell when it will be available...

  • Suricata inline mode - trunk interface

    9
    0 Votes
    9 Posts
    1k Views
    R

    @boobletins said in Suricata inline mode - trunk interface:

    ou can see that on FreeBSD the bge driver is not supported.
    The em driver should work with netmap natively assuming there's no incompatibility in the VM.
    If you need inline mode with bge then you will need to run netmap in emulated mode as described in the link above:

    Emulation is also available for devices with native netmap support, whichcan be used for testing or performance comparison. The sysctl variable dev.netmap.admode globally controls how netmap mode is implemented.

    But you should know that if you put netmap in emulated mode to make it work on bge, then it will also be running in emulated mode for the em card.
    Also: what version of FreeBSD/pfSense are you running?

    Pfsense 2.4.4_p1

    I will try intel nic.

    thank's

  • Suricata InLine with igb NICs

    Moved
    77
    1 Votes
    77 Posts
    11k Views
    B

    You can certainly do that -- mine is higher than default, but it won't help with any "bad pkt" errors if that's what you're trying to solve.

    Really what you would be doing there is buying yourself a larger buffer if Suricata starts falling behind -- you've set aside more RAM in case of a backlog of packets.

  • Snort doesn't know about SRC-DST pairs thus unable to whitelist anything

    20
    0 Votes
    20 Posts
    2k Views
    M

    @bbcan177 said in Snort doesn't know about SRC-DST pairs thus unable to whitelist anything:

    To overcome those certificate errors, create a new DNSBL Alias and add those domains to the customlist at the bottom. Then select the "Disable Logging" and set the Group Order to Primary. Then run a Force Update... This assuming that you are on pfBlockerNG-devel. This will nxdomain those domains and also disable the logging of those domains.

    I did this already, thanks, I'm following your subsection on this forum also reddit... It worked, but then again it's not very much elegant solution... Especially that you can't add ALL possible sites there obviously and this list is getting bigger and bigger every day -it's a manual only process.. So yeah, not elegant at all..

  • Snort missing under services?

    29
    0 Votes
    29 Posts
    7k Views
    bmeeksB

    @dolomite792 said in Snort missing under services?:

    The real fix is to increase /tmp RAM Disk Size large enough to handle all of the installation data. None of the fixes shown above worked until I increased the size. I reinstalled it and it actually installed faster and worked this time.

    +1 on this! I have advised Snort and Suricata users to not use RAM disks. Or at least if you insist on using them, make them at least 200 MB (or maybe larger) in size. You need enough space to hold all of the downloaded packages required for installation. This includes quite a few dependency packages in the case of Snort and Suricata. That's why it takes so much room. If you do not have enough free space, the package install will fail. And when that happens you are left with an incomplete installation and likely the Snort entry missing from the Services menu.

    Same thing happens with downloading and updating rules archives. Those files are copied down to /tmp and then unpacked into separate sub-directories for manipulation and eventual copying to the system volume. This also takes a lot of space if you use Snort, Emerging Threats and Snort Community rules all together. Not having enough free space will result in rules updates failing in strange ways.

  • netmap issue with Intel 82574L Network adapter

    7
    0 Votes
    7 Posts
    2k Views
    B

    @srijannandi said in netmap issue with Intel 82574L Network adapter:

    Has anyone got this working in 2.4.4...

    Yes.

    Could you review /var/log/system.log and /var/log/suricata/suricata_[specific-to-your-interface]/suricata.log for netmap errors and report your findings?

    eg cat /var/log/system.log | grep netmap

Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.