• Snort + SG-3100 = exited on signal 10

    64
    0 Votes
    64 Posts
    13k Views
    R

    @BMEEKS

    You are amazing THANK YOU!!!!

  • Barnyard2 and Remote Syslog Problems

    8
    0 Votes
    8 Posts
    2k Views
    M

    Well if you decide to test again with Snort let us know!

    Perhaps you were just running multiple interfaces and configured barnyard on the wrong one?

  • Snort VRT Rules Download Failure

    Moved
    2
    0 Votes
    2 Posts
    333 Views
    bmeeksB

    @necs-gungaro:

    Hello All
    I am suddenly have Failed Snort VRT downloads . Looks like the MD5 checksum has an error. So how do I clean that issue up so I get my VRT rules to download? I am using a Lanner router with pfSense 2.2.4

    Thank You for any help in advance.

    What version of the Snort package are you running?  That is quite an old version of pfSense.  If you have not updated Snort since you installed that pfSense version, then the VRT rules for your Snort version may have been discontinued (depends on exactly which Snort version you have).  Snort rules are tied to specific binary versions and the VRT does continually roll older versions of rules out of support as they roll in newer versions.

    Bill

  • IPv6 Suricata IPS Rule

    1
    0 Votes
    1 Posts
    448 Views
    No one has replied
  • Snort Package 3.2.9.6_1 Notes

    5
    0 Votes
    5 Posts
    859 Views
    R

    +1. I too encountered the "manual remove" messages and I never touched the automated installation. I do not recall whether I had the fatal error. Snort seems to work just fine but I may follow the instruction to remove and reinstall for good measure.

  • SNORT Dynamic WAN IP

    Moved
    3
    0 Votes
    3 Posts
    612 Views
    G

    Hi, I found I have the same problem. I wasn't sure but today internet suddenly stopped when I was online and I found PPPoE is down because WAN IP changed. What happened is: Snort detected new IP connected to website IP I was browsing 5 minutes ago as "port sweep"  and effectively blocked my new WAN IP together with all internet taking down VoiP and Internet radio tuner.

    I like to know how to mitigate such problem correctly because next time it can be other false positive or rule trigger same outage.
    Is any rule can be added to whitelist WAN IP as alias?
    Thanks

  • Snort - prevent blocking self

    2
    0 Votes
    2 Posts
    1k Views
    bmeeksB

    @GemeenAapje:

    Hi guys

    I'm trying to configure snort to add some additional security to be web server.

    At the moment I'm running it and monitoring the alerts without blocking.

    My web server is within my home network and I'm running snort on pfSense router on the WAN interface only. Is this correct practice?

    One thing i see, for example, is when I'm using Deezer that I see my own external IP flag up as accessing iTunes, for example "ET POLICY iTunes User Agent"

    Before I enable blocking, I really want to be 2000% sure that my own IP is never going to be added to the banned list, blocking my web server from accessing the outside world.

    Any advice greatly welcome.

    Thanks
    Matt

    For home users I recommend running Snort on the LAN.  This lets you see actual LAN host IP addresses in the alerts.  If you run Snort on the WAN, then you can't see local LAN host IP addresses in any alerts.  Instead, all local host IP addresses will be the WAN IP of the firewall.  This is because Snort on the WAN sees inbound traffic from the web before the NAT rules are applied, so the destination IP for inbound Internet traffic is the external IP of the firewall.  When you run Snort on the LAN, it sees traffic after NAT has been removed, so the actual internal IP addresses of LAN hosts appear in the alerts.

    Snort has built-in safeguards that prevent the actual IP interface addresses on the firewall from being blocked.  If you get alerts from rules that you know are OK in your environment (such as that ET POLICY rule in your example), then you can disable those rules.  Be careful just enabling all the rule categories!  You will get a lot of noise.  For example, that ET POLICY rule set is mainly there for corporate network admins where corporate IT policies are in place that may forbid employees from accessing iTunes at work.  The admins would want an alert if an employee was attempting to access iTunes.  For a home user, this policy rule is likely not useful unless you really hate Apple and use only Google Play  :D.

    Bill

  • Snort http rules not generating alerts

    4
    0 Votes
    4 Posts
    2k Views
    bmeeksB

    @pffan:

    Thanks for the response.

    I am testing from inside the LAN but I figured that because IIS bound traffic is exiting the LAN interface, it is subject to fw rules and thus snort inspection.  Also the preprocessor rules are generating alerts okay.

    The external net variable has been customized.  Not sure where the ipv6 address came from but the others are ips of my pfsense interfaces.

    I think the problem might be due to my custom pass list which I tried to make empty.  The local interface addresses are added automatically.  Can you confirm if traffic originating from an ip in the pass list is still checked?  Or is it just discarded immediately?  I think that might be the problem.

    One other thing I didn't mention is that haproxy is adding x-forward-for headers to http traffic and I was hoping to detect and block those addresses when offensive.  Is that possible or am I going about this the wrong way?

    A pass list entry prevents that IP address from being blocked, but it has no impact on the alert showing up on the ALERTS tab.  So the pass list has no bearing on what alerts you see.  It only determines whether or not the IP itself gets added to the "blocked IPs" snort2c table in the pf firewall.

    In your case, a failure to see alerts would be due to one or both of the following:  (1) the traffic in question is not actually traversing the firewall, or (2) the IP addressess in HOME_NET and EXTERNAL_NET are not correct in terms of the rule's logic, and thus the rule is not triggered.

    Bill

  • Snort - OK to turn off sip preprocessor rules if there's no VOIP?

    4
    0 Votes
    4 Posts
    1k Views
    D

    @bmeeks:

    You can turn if off, but if any of your enabled rules use keywords or rule options specific to the SIP preprocessor, then you will get errors when Snort starts up and it will not start successfully.  I would suggest simply disabling the rues generating the "noise" and leave the default preprocessor set enabled.

    Yes, that's what I meant: disable the individual rules, not the whole rule set.

    Thanks.

  • Block PSiphon Application With snort

    1
    0 Votes
    1 Posts
    784 Views
    No one has replied
  • Snort OpenAppID RULES Detectors fail to download

    14
    0 Votes
    14 Posts
    2k Views
    B

    @bmeeks:

    @bimmerdriver:

    The system that is having the MD5 errors is running version 2.4.2. The system that is working properly is running the latest 2.4.3 snapshot. Is it possible a difference between the respective snort packages is the reason for the difference?

    There was an update to the Snort GUI a month or two back that updated the URL used for downloading the OpenAppID rules package.  Perhaps your older version is trying the older URL?

    The current Snort GUI package version is 3.2.9.6.

    Bill

    I updated the package and the problem is fixed. Thank you very much.

  • Suricata stopped logging on external IFs

    1
    0 Votes
    1 Posts
    298 Views
    No one has replied
  • Snort LAN Alert

    Moved
    18
    0 Votes
    18 Posts
    2k Views
    S

    There are no LAN alerts in snort alert tab. I've just left it as it is, everything is working just fine.

  • Suricata and odd behavior when changing certain rules

    5
    0 Votes
    5 Posts
    584 Views
    D

    @bmeeks:

    @drewsaur:

    THANK YOU! I completely missed that. That key point is hidden via the "i" icon. I think they should leave that information visible by default!

    Yeah, the default state of those "Information" icons is collapsed.  I think that was state was chosen in order to reduce clutter.

    Bill

    May I suggest that the text "Check the box beside an interface to immediately apply new auto-SID management changes and signal Suricata to live-load the new rules for the interface when clicking Save; otherwise only the new file assignments will be saved" be outside of the "info" icon? It seems essential to the UI and is non-obvious.

    The remainder of the text is certainly a candidate for the "i" icon :)

    Cheers!

  • Snort turning itself OFF

    Moved
    4
    0 Votes
    4 Posts
    686 Views
    G

    @bmeeks:

    @gryest:

    Hi
    I noticed Snort turned itself off past few days after rules update. Rules update success but found Snort is stopped???
    Not good at all. I was OK before even if rules update failed, it's never stopped by itself. I ran Snort package update 2 day ago but it still doing that.
    Is anybody have same issue? What might be wrong or changed?
    Thanks.

    PS. i have Snort logs setup on local system (SSD) and checked log size option are limited. Log exceed memory should not be an issue.

    Have you looked back through your firewall's system log to see what, if any, messages might have been logged by Snort as it restarted from the rules update?  The most likely possibility is a rule syntax error of some sort with one of your enabled rules (or even a newly added rule).  Those happen from time to time as the rules are modified by the authors/vendors.

    Bill

    Yes, I did. Rules update happened 00:07. Before that Snort shows some ping IP ("Misc Attacks") Log Alerts. After 00:07 nothing until I restarted snort in the morning. No any records in the system log. I will check logs if it's happen again.
    Thanks.

  • Snort with RAM disk?

    Moved
    7
    0 Votes
    7 Posts
    2k Views
    D

    TL;DR:  "Why Not?"  :)

    A couple reasons, neither important:

    I am running snort for recreational reasons on a small appliance.  Getting it to work on a RAM disk kept me occupied for a few minutes.

    My "day job" is HPC systems at extreme scale.  In that environment most solutions are stateless root for reliability and performance reasons.  Those concerns probably bias how I approach recreational programming.

    I think you're correct about average SSD reliability being more than adequate for pfSense deployments. At large scale it's still something we worry about, and my pfSense box had enough RAM, so "why not".  As long as pfSense has the option, my OCD side says it should work regardless of which packages I select.  It did not, so I fixed it.

    Proper fix would probably be for the pfsense base to copy out all of /var/db rather than just /var/db/rrd.  The additional directories don't add much space.  Or stop providing the RAM disk option.  :)

  • See list of force-disabled rules?

    3
    0 Votes
    3 Posts
    399 Views
    N

    @bmeeks:

    @Nixus:

    Hi everyone,

    Is it possible to get a list of the force-disabled rules from [Force-disable this rule and remove it from current rules set.] in the Alerts tab?

    No, that is currently not an available feature.  It would make a good future enhancement, though.  I will put it on my TODO list for a future update.

    Bill

    Thanks! That would be a really nice feature! :)

  • Snort Package v3.2.9.6 - Release Notes

    5
    0 Votes
    5 Posts
    814 Views
    A

    Thanks, I did try that, and just tried it again as well.  I removed snort, manually removed the cached package, reinstalled.  I then updated the rules, created a LAN interface, and started it.  No other settings were changed and it crashed

  • 0 Votes
    2 Posts
    633 Views
    M

    Removed and reinstalled snort, issue is resolved. Perhaps a simple restart would have done the trick as well.

  • Suricata disablesid file

    1
    0 Votes
    1 Posts
    480 Views
    No one has replied
Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.