Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Suricata 6.0.4_1 blocking Dropbox IPs even in the pass list (SOLVED)

    Scheduled Pinned Locked Moved IDS/IPS
    25 Posts 3 Posters 2.2k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • S
      SteveITS Galactic Empire @zgtc
      last edited by

      @zgtc Depending on timing the IP may still be in the blocked table? Suricata puts the IP in the table and then later removes it. pf blocks the IP because of the (hidden/internal) rule using that table. So ensure the Blocks tab is empty.

      or possibly https://docs.netgate.com/pfsense/en/latest/troubleshooting/log-filter-blocked.html

      Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
      When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
      Upvote 👍 helpful posts!

      Z 1 Reply Last reply Reply Quote 1
      • bmeeksB
        bmeeks
        last edited by bmeeks

        Suricata blocks in Legacy Mode by adding IP addresses to a special hidden pf table called snort2c. Any IP address placed in that table is blocked by the firewall. The IP remains in the table until one of three things happen:

        1. the admin manually deletes the block using the option next to the IP on the BLOCKS tab;
        2. the periodic cron task (if enabled) removes the IP from the table after a set period of no further activity from that IP;
        3. or the firewall is rebooted. This clears the table because it is a RAM construct.

        You need to use the BLOCKS tab to see what IPs are currently in the table and thus are being blocked. You can clear the entire table, or remove specific IP addresses using the icons and buttons on that tab.

        Stopping or restarting the Suricat daemon has zero impact on the content of the snort2c table, thus it will not remove an existing block.

        1 Reply Last reply Reply Quote 1
        • Z
          zgtc @SteveITS
          last edited by zgtc

          @steveits said in Suricata 6.0.4_1 blocking Dropbox IPs even in the pass list:

          @zgtc Depending on timing the IP may still be in the blocked table? Suricata puts the IP in the table and then later removes it. pf blocks the IP because of the (hidden/internal) rule using that table. So ensure the Blocks tab is empty.

          @bmeeks said in Suricata 6.0.4_1 blocking Dropbox IPs even in the pass list:

          Suricata blocks in Legacy Mode by adding IP addresses to a special hidden pf table called snort2c. Any IP address placed in that table is blocked by the firewall. The IP remains in the table until one of three things happen:

          1. the admin manually deletes the block using the option next to the IP on the BLOCKS tab;
          2. the periodic cron task (if enabled) removes the IP from the table after a set period of no further activity from that IP;
          3. or the firewall is rebooted. This clears the table because it is a RAM construct.

          You need to use the BLOCKS tab to see what IPs are currently in the table and thus are being blocked. You can clear the entire table, or remove specific IP addresses using the icons and buttons on that tab.

          Stopping or restarting the Suricat daemon has zero impact on the content of the snort2c table, thus it will not remove an existing block.

          OK, NOW it started sync'ing! Thank you so much both of you. Man I am so stupid, the Blocks list was always there, I simply didn't think about removing the items. That's in part why I was asking how to make the Pass list more relevant to the Blocks list.

          In any case, next question. I disabled all Dropbox related items from the ET Policy file, then removed the items from the block list:

          Screenshot 2022-02-22 at 00.22.39.png

          Then restarted the service in the LAN interface... And the Offsite File Backup in use still gets added again to the Blocks list.

          Screenshot 2022-02-22 at 00.25.47.png

          And of course blocked by the Firewall

          Screenshot 2022-02-22 at 00.25.20.png

          I don't get it.

          1 Reply Last reply Reply Quote 0
          • bmeeksB
            bmeeks
            last edited by

            One other possibility is that you have a duplicate Suricata process running on the same interface. If so, that instance would not honor any Pass List changes.

            Run this command from a shell prompt on the firewall:

            ps -ax | grep suricata
            

            See if it shows any duplicate interfaces. If so, go to the GUI and stop all Suricata instances. Then return to the shell prompt, run the command above again, and if any Suricata processes remain kill them with this command:

            kill -9 <pid>
            

            where <pid> is the Process ID of the remaining Suricata process.

            You also need to validate that Suricata has actually loaded your Pass List. Go to the LOGS VIEW tab and choose the suricata.log file for the interface. Look through that log and be sure it shows your Dropbox IP networks being added during startup.

            Z 1 Reply Last reply Reply Quote 1
            • Z
              zgtc @bmeeks
              last edited by

              @bmeeks said in Suricata 6.0.4_1 blocking Dropbox IPs even in the pass list:

              One other possibility is that you have a duplicate Suricata process running on the same interface.

              YOU NAILED IT! I would have never guessed by myself, thank you so much!

              You also need to validate that Suricata has actually loaded your Pass List. Go to the LOGS VIEW tab and choose the suricata.log file for the interface. Look through that log and be sure it shows your Dropbox IP networks being added during startup.

              That part was OK, but thank you again

              Z 1 Reply Last reply Reply Quote 0
              • Z
                zgtc @zgtc
                last edited by

                Is there a way to edit the title and mark the thread as SOLVED?

                bmeeksB 1 Reply Last reply Reply Quote 0
                • bmeeksB
                  bmeeks @zgtc
                  last edited by

                  @zgtc said in Suricata 6.0.4_1 blocking Dropbox IPs even in the pass list:

                  Is there a way to edit the title and mark the thread as SOLVED?

                  I believe as the creator of the topic you can do that. Go back to your original first post in this thread and click the little 3-dot vertical ellipsis icon on the bottom right corner (next to the thumbs-up icon). When the edit window for the post opens, I think you can edit the title then.

                  Z 1 Reply Last reply Reply Quote 0
                  • Z
                    zgtc @bmeeks
                    last edited by

                    @bmeeks mmm I think there's a time limit for this

                    Screenshot 2022-02-22 at 02.02.51.png

                    bmeeksB 1 Reply Last reply Reply Quote 0
                    • bmeeksB
                      bmeeks @zgtc
                      last edited by bmeeks

                      @zgtc said in Suricata 6.0.4_1 blocking Dropbox IPs even in the pass list:

                      @bmeeks mmm I think there's a time limit for this

                      Screenshot 2022-02-22 at 02.02.51.png

                      Oh...did not realize that. I've edited some of my own titles in the past, but guess I just happened to be within the time window.

                      But, I tried as the moderator of this sub-forum and it let me change it for you! Did not realize I had that power (or at least have never tried it out).

                      Z 1 Reply Last reply Reply Quote 1
                      • Z
                        zgtc @bmeeks
                        last edited by

                        @bmeeks thank you! I wanted to have Solved in the title because my original problem will probably happen to more people.

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.