• How to import 3rd party IDS rulesets' URLs into Snort?

    8
    0 Votes
    8 Posts
    2k Views
    bmeeksB

    @rebman77:

    I have to assume they have never tried their ruleset in Snort.

    I would agree …  :)

    Bill

  • New SG-3100 User - Suricata Results scaring me

    6
    0 Votes
    6 Posts
    1k Views
    bmeeksB

    +1 on what other respondents have said.  Running an IDS/IPS on the WAN is generally going to log a bunch of noise, and if you have no public-facing services and block all unsolicited inbound traffic, then you don't gain any security by running an IDS/IPS on the WAN.

    Better in most situations to run the IDS/IPS on the LAN.  Even then, you will want to let it run in non-blocking mode for a while to get a feel for any false positives that show up on your network.  There are generally quite a few centered around HTTP_INSPECT rules in Snort.

    Bill

  • Block USA

    2
    0 Votes
    2 Posts
    432 Views
    jimpJ

    Since those are hosted in the USA, and probably from CDNs with unpredictable address blocks, most likely the answer is 'no'.

  • IDS solution search

    1
    0 Votes
    1 Posts
    348 Views
    No one has replied
  • Suricata wont block VPN interface

    2
    0 Votes
    2 Posts
    804 Views
    stephenw10S

    OpenVPN or IPSec? I assume OpenVPN if pfSense is a client.

    Are you running Surucata in in-line mode?

    Steve

  • Snort on IKEv2 IPsec Interface ( enc0 )

    3
    0 Votes
    3 Posts
    687 Views
    NogBadTheBadN

    Thanks for the prompt reply Bill :)

    I mentioned the enc0 interface as you can do a packet capture and see unencrypted traffic from the VPN client via tcpdump.

    [2.4.3-RELEASE][admin@pfsense.xxxxxxxxxx.net]/root: tcpdump -i enc0 tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on enc0, link-type ENC (OpenBSD encapsulated IP), capture size 262144 bytes 08:38:49.508431 (authentic,confidential): SPI 0xcb4900c7: IP 172.16.9.3.62644 > pfsense.xxxxxxxxxx.net.domain: 62+ A? www.apple.com. (31) 08:38:49.508533 (authentic,confidential): SPI 0xcb4900c7: IP 172.16.9.3.55246 > pfsense.xxxxxxxxxx.net.domain: 48200+ A? apple.com. (27) 08:38:49.508604 (authentic,confidential): SPI 0xcb4900c7: IP 172.16.9.3.61700 > pfsense.xxxxxxxxxx.net.domain: 60069+ A? gateway.icloud.com. (36) 08:38:49.508671 (authentic,confidential): SPI 0xcb4900c7: IP 172.16.9.3.59659 > pfsense.xxxxxxxxxx.net.domain: 32698+ A? www.icloud.com. (32) 08:38:49.508730 (authentic,confidential): SPI 0x0db585ec: IP pfsense.xxxxxxxxxx.net.domain > 172.16.9.3.55246: 48200 3/8/12 A 17.172.224.47, A 17.178.96.59, A 17.142.160.59 (460) 08:38:49.509125 (authentic,confidential): SPI 0x0db585ec: IP pfsense.xxxxxxxxxx.net.domain > 172.16.9.3.61700: 60069 9/4/0 CNAME gateway.fe.apple-dns.net., A 17.248.144.180, A 17.248.144.89, A 17.248.144.49, A 17.248.144.86, A 17.248.144.152, A 17.248.144.85, A 17.248.144.91, A 17.248.144.92 (336) 08:38:49.516628 (authentic,confidential): SPI 0xcb4900c7: IP 172.16.9.3.61275 > pfsense.xxxxxxxxxx.net.domain: 40342+ A? metrics.icloud.com. (36)

    172.16.9.3  = my iPhone

    https://www.freebsd.org/cgi/man.cgi?query=enc&sektion=4&manpath=FreeBSD+7.1-RELEASE

    I just wonder if snort was to enumerate enc0 as a valid interface I'd be able to alert / block IP addresses handed out to my IKEv2 clients.

  • Barnyard2 100% CPU

    30
    0 Votes
    30 Posts
    6k Views
    M

    I may have stumbled across a root cause.

    I enabled the Snort VRT rules, and as soon as I did CPU usage shot up through the roof and stayed there.  Disabling VRT and restarting Snort corrected it.

    I can't remember if the VRT rules are available in Suricata.  If they aren't, that may explain why I wasn't seeing the problem with Barnyard when using that instead of Snort.

    What's different about VRT? Is there something with that ruleset that could cause this?

    I'll keep an eye on things and let you guys know how things progress.

    And as always, thanks bmeeks for your contributions  :D

  • Suricata Inline dropping some HTTPS

    11
    0 Votes
    11 Posts
    3k Views
    NollipfSenseN

    Good info Onyxfire!

  • [Solved] Suricata disablesid.conf

    20
    0 Votes
    20 Posts
    7k Views
    bmeeksB

    @NRgia:

    Nice tutorial so to speak, maybe you could do a sticky post, in order for others to find it more easily in the future?

    Where to read more about rules tips & tricks ? "How to create Snort rules documentation", on their site is ok?

    There is some useful documentation on the Snort.org site.  However, to be honest, I've never found a great all-in-one location for this kind of information.  Bits and pieces are scattered all over.  As with lots of software, especially open-source and other "free" software, the developers spend more time on coding and adding features than creating documentation.  I am guilty of that as well with the Snort and Suricata packages.

    Bill

  • Basic questions on how Suricata operates

    2
    0 Votes
    2 Posts
    435 Views
    bmeeksB

    @mdes:

    First question, is Suricata in pfSense (inline mode) able to drop (or instruct PF to do it) a connection instead of blocking an IP?
    Second question, is Suricata in pfSense (inline mode) able to block destination (WAN) IP:port while it listens on LAN interface?

    Go read this post to answer question #1:  https://forum.pfsense.org/index.php?topic=135331.0.

    The answer to question #2 is "no, it can't do that".  Why would you want to do that anyway?

    Bill

  • General question(s)

    4
    0 Votes
    4 Posts
    753 Views
    bmeeksB

    @JohnSCarter:

    Hello all,

    Recently I've had some time on my hands and I've been thinking about pfSense and have some questions and was hoping that someone could elaborate as I'm not quite getting my head around them.

    Question 1:
    Is there any way to mass-drop rule actions in Suricata / snort just because I don't have time to 100% be active on my network to see the alert telling me that malware has infected my system and also because manually changing the "alert" rules to "drop" (even with a AHK script) takes more time than I have in a day.

    Question 2:
    With IDS/IPS systems (for someone who doesn't have time to sit and monitor their constantly active network 24/7) why aren't most rules set to automatically drop, for example if there was a rule for a packet that's a known malicious packet that compromises a system and that packet triggered a rule but the action was "alert" wouldn't that be pointless? like a fire alarm with a 6 hour delay, wouldn't the damage already be done?

    Question 3:
    Obviously putting all the firewalls, IPS/IDS and additional content filtering systems in place is good however none of it means anything if pfSense itself is compromised, I was just wondering (from somewhat of a "lamens" perspective) what is done to keep pfSense secure, how difficult it would be to compromise and if there's any way to check / know if your pfSense is compromised (perhaps a tool or checklist of sorts?)

    Thanks for your time,

    John.

    Question #1 Answer:
    You don't have to change each rule action to DROP in order to get a block if you simply do these two things:

    (1)  Use Legacy Mode blocking (on the INTERFACE SETTINGS tab) and then;

    (2)  Uncheck the option for "Block on drops only".

    If you do those two things, then every single rule that raises an alert will result in a block.  Just be prepared for some frustration, though, since with all the sloppiness in web programming these days you can expect some rules to trigger that are enforcing various standards.  When those standards are not ahered to, the rules trigger.  You can mitigate this somewhat by being more selective in the rules you enable.

    Question #2 Answer:
    Because most security admins want to be notified of issues, evaluate the alert to weed out false positives, and only then enable blocking.  This is to prevent the "frustration problem" alluded to in answer #1 above.  Put yourself in the shoes of a network security admin in a Fortune 500 corporation who just turns on an IPS with all the rules enabled and all the rules set to drop traffic.  Just imagine how many times his phone would ring from users whose computers stopped working because of all the blocked traffic.  Would it not be better to run with everything in alert, analyze the received alerts, weed out and either disable or suppress false positive rules, and only then enable blocking?

    Question #3 Answer:
    Firewalls are incredibly hard to compromise unless they are horribly administered.  All the stuff you see on TV shows where the "good guy" hacks into the firewall to save the day is just BS.  Doesn't happen.  But if your firewall is compromised, then all bets are off.  If you are really paranoid, you could put Suricata inline between your firewall and your first LAN switch and run it on a separate physical box.  You would also need a NIC that fully supports Netmap and Inline IPS mode.

    Bill

  • Netmap and NIC Support

    1
    0 Votes
    1 Posts
    1k Views
    No one has replied
  • Drilldown on egress alerts

    2
    0 Votes
    2 Posts
    412 Views
    bmeeksB

    The best place to run an IDS/IPS such as Snort or Suricata for home networks is on the LAN interface.  That way host IP addresses in alerts will be shown with their native addresses.  When you run the IDS on the WAN, all alerts will have the WAN IP as the "local host" address since the IDS sees traffic outbound on the WAN only after NAT rules have been applied.

    There are number of posts in this sub-forum by me and others that talk about this.  So move your configuration over to the LAN interface and your problem will be solved.  Internal hosts will show up in the alerts with their own IP address.

    Bill

  • No Alerts using Suricata inline mode.

    23
    0 Votes
    23 Posts
    5k Views
    bmeeksB

    @teamits:

    Never mind, I found the release notes at https://forum.pfsense.org/index.php?topic=145489.0 and even better https://forum.pfsense.org/index.php?topic=145257.msg790339 that discuss pass lists.

    You can use custom PASS rules to create a pass list, but just be careful as I warned in the posts you linked.  It is probably better to watch and either disable the bothersome rules, or use suppress lists and either of the "filter by IP" options that are available when you click the plus sign (+) beside the IP address columns on the ALERTS tab.  Doing it that way allows a rule-by-rule tuning and even limiting that to certain hosts (IP addresses).  Using a pass list is more like using a large hammer when what you really need is a jeweler's screwdriver.  With a PASS rule that filters only on an address, you are potentially exposing the whitelisted host to a lot of malicious stuff.

    Bill

  • Suricata: There were error(s) loading the rules

    3
    0 Votes
    3 Posts
    580 Views
    J

    Thank you for this.

    In this article (https://forum.pfsense.org/index.php?topic=50141.0), the problem is explained. I increased the value of System/Advanced/Firewall & NAT/Firewall Maximum Table Entries to 400000.The default value was 200000.

    The description for this field is: Maximum number of table entries for systems such as aliases, sshlockout, snort, etc, combined.
    Since it mentions snort, I assume using suricata also impacts the number of table entries. It is however a system setting, so Bill's remark is correct.

    The error didn't appear anymore after the value was increased.

  • Change max_client_bytes in SSH preprocessor

    2
    0 Votes
    2 Posts
    296 Views
    bmeeksB

    @alchemyx:

    Hi,

    How to change max_client_bytes in SSH preprocessor? If I put that in Advanced Configuration Pass-Through

    preprocessor ssh:
            max_client_bytes 19600

    Then SNORT won't start up. Probably because I have duplicated preprocessor ssh: with the one provided by pfsense. I tried disabling SSH altogether and putting it again but snort also refuses to come back up.

    pfsense version is 2.4.2-RELEASE-p1 and SNORT is 2.9.9.0

    Thanks!
    Michał

    At the moment that is not a configurable parameter within the GUI.  And using the Advanced Passthrough feature doesn't work with preprocessors because of how the internal GUI code works for now.

    I will add this parameter to the next Snort GUI update.  I'm working on some other Snort updates and hope to get an updated package posted in a couple of weeks or so.

    Bill

  • SNORT keeps blocking FEDEX

    3
    0 Votes
    3 Posts
    1k Views
    M

    Thanks, Bill.  Probably just pushing down ads.

  • [SOLVED] Snort fails after OS update

    Moved
    7
    0 Votes
    7 Posts
    3k Views
    wgstarksW

    Thanks. Worked great.

  • Suricata v4.0.4_1 Release Notes (GUI package update)

    6
    0 Votes
    6 Posts
    722 Views
    N

    No worries, thanks

  • PfSense 2.4.2-RELEASE-p1

    2
    0 Votes
    2 Posts
    515 Views
    bmeeksB

    @zombietek:

    Hi,

    I have upgraded to 2.4.2-RELEASE-p1 and it is nice to have the addition of "Click to force a different action for this rule" option under Alerts on Suricata. Only comment I have so far, I hope they would add in the future that when a GID:SID is set to a specific action on an interface like WAN, there is an option at least that prompts or check boxes whether or not you want to apply it as well to other interfaces on your pfSense box.

    My question is, where could I check in pfSense the GID:SID that I have been setting to DROP through the option above? I used to manually copying GID:SID and pasting it to a dropsid configuration file under SID Mgmt and I don't see anything new that I have been setting lately to DROP.

    Thanks.

    When you "force" different rule actions on the ALERTS or RULES tabs, those changes are saved in a special section of the firewall configuration file, config.xml.  They are not written to any of the SID MGMT configurations.  Go check out this sticky post at the top of the forum:  https://forum.pfsense.org/index.php?topic=145467.0.  User overrides are the last actions processed as the rules are built for an interface.  If you want to see what rules you have user overrides for, go to the RULES tab and view using one of the new categories listed in the drop-down there.  There are categories for each class of applicable user overrides.

    The software version you quoted as upgrading to is for pfSense itself.  That is not the version of Suricata.  Suricata's version is currently 4.0.4.

    Bill

Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.