Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    (RESOLVED!!!) WARNING!! Emerging Threats Dshield rule set is now empty inside Snort and on Emerging Threats official website

    Scheduled Pinned Locked Moved IDS/IPS
    41 Posts 5 Posters 3.9k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • S
      SteveITS Galactic Empire @JonathanLee
      last edited by

      @jonathanlee Did you already email support@emergingthreats.net from the feed file?

      Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
      When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
      Upvote 👍 helpful posts!

      JonathanLeeJ 2 Replies Last reply Reply Quote 1
      • JonathanLeeJ
        JonathanLee @bmeeks
        last edited by

        @bmeeks I wonder if Snort has a URL option that you can use inside of the custom area.

        Make sure to upvote

        bmeeksB 1 Reply Last reply Reply Quote 0
        • bmeeksB
          bmeeks @JonathanLee
          last edited by

          @jonathanlee said in WARNING!! Emerging Threats Dshield rule set is now empty inside Snort and on Emerging Threats official website:

          @bmeeks I wonder if Snort has a URL option that you can use inside of the custom area.

          No, Snort does not currently have a custom URL option like Suricata.

          1 Reply Last reply Reply Quote 0
          • JonathanLeeJ
            JonathanLee @SteveITS
            last edited by JonathanLee

            @steveits Yes I emailed the yesterday, they may have disabled that ruleset for some unknown reason. If not, I did email them that it is blank, they might have moved it to pro.

            f5371a69-ab93-4f75-b8e9-107a745683b9-image.png

            Make sure to upvote

            1 Reply Last reply Reply Quote 0
            • JonathanLeeJ
              JonathanLee @SteveITS
              last edited by

              @steveits

              They have just replied, they are looking into the issue,

              dc85ccd6-3ddf-4e83-a0fd-c975b5c9cca4-image.png

              I guess it was not the intention to disable that feed. I am glad they are looking into it. I wonder what happened? Some rulesets have been blank for some time now I started wondering about it when the alarms stopped coming in.

              Make sure to upvote

              1 Reply Last reply Reply Quote 0
              • JonathanLeeJ
                JonathanLee @JonathanLee
                last edited by

                @jonathanlee

                This is officially resolved per Emerging Threats Support ETA next release

                Screenshot 2022-12-30 at 10.45.38 AM.png

                Make sure to upvote

                M 1 Reply Last reply Reply Quote 1
                • M
                  michmoor LAYER 8 Rebel Alliance @JonathanLee
                  last edited by

                  @jonathanlee Nice !
                  Curious, why not use pfblocker for the IP blocking you need?

                  Firewall: NetGate,Palo Alto-VM,Juniper SRX
                  Routing: Juniper, Arista, Cisco
                  Switching: Juniper, Arista, Cisco
                  Wireless: Unifi, Aruba IAP
                  JNCIP,CCNP Enterprise

                  JonathanLeeJ 1 Reply Last reply Reply Quote 0
                  • JonathanLeeJ
                    JonathanLee @michmoor
                    last edited by JonathanLee

                    @michmoor I like Snort's IDS (Intrusion Detection System) and IPS (Intrusion Prevention System) software. I had snort software as a kid when it was a wireless scanner software much like Wireshark, it has much improved over the days of the late 90s early 2000s. It use to be called AirSnort!!

                    Screenshot 2022-12-30 at 11.39.02 AM.png

                    Anyway fast forward to today. I like that it will scan and use emerging threats and has auto updated rule sets. I use Squid Proxy it just works well, it even stops Nmap scans cold in their tracks. I have never used pfblocker, with HTTPS over 443 DoH all over the place total reliance on a DNS based version kind of worries me. With use of Squid it uses HTTP headers so you can see if something is port jumping to a new DoH server. Plus I have it working with HTTPS for SSL so Clam Av works for HTTP and HTTPS on it. It did take me some time to get to working with the configuration, however it blocks and protects now. I can see in the logs huge lists of items blocked or viruses stopped over the proxy.

                    I have never used pfBlocker why do you like that one? Got any screen shots?

                    Screenshot 2022-12-30 at 11.45.19 AM.png

                    (Image: 50 items over the last 1 hour blocked)

                    Screenshot 2022-12-30 at 11.46.12 AM.png

                    (Image: Caches UDP scans even)

                    Screenshot 2022-12-30 at 11.47.28 AM.png

                    Screenshot 2022-12-30 at 11.50.15 AM.png

                    (Image: ClamAV viruses caught last couple days over HTTPS)

                    Yes they have some false positives, again that means it is working. The fine tuning takes some time. I have never seen pfBlocking yet, I should check it out.

                    Make sure to upvote

                    S 1 Reply Last reply Reply Quote 0
                    • bmeeksB
                      bmeeks
                      last edited by bmeeks

                      For just plain IP blocking, a package such as pfBlockerNG-devel is more efficient than Snort or Suricata. For content inspection, you must use an IDS/IPS package. But remember that end-to-end encryption can severely cripple an IDS/IPS. That being said, some features of IDS/IPS are still useable to some degree -- for example, the OpenAppID feature of Snort.

                      And if you do MITM SSL termination, then an IDS/IPS can be very useful for payload inspection. But there is quite a bit of extra work involved with MITM setup.

                      I will say, that for IP-only rules, Suricata can also be quite efficient. That's because when it identifies and sorts rules based on that criteria, there is very limited packet inspection. It simply checks the IP address and makes a quick decision. So, for IP-only rules, Suricata will be nearly as efficient as the firewall itself. An IP-only rule is one where there is no payload content matching specified in the rule.

                      JonathanLeeJ M 2 Replies Last reply Reply Quote 1
                      • JonathanLeeJ
                        JonathanLee @bmeeks
                        last edited by

                        @bmeeks I agree the MITM setup took me some time to get it to work with all the certificates.

                        Make sure to upvote

                        1 Reply Last reply Reply Quote 0
                        • S
                          SteveITS Galactic Empire @JonathanLee
                          last edited by SteveITS

                          @jonathanlee I'd say pfBlocker has three main elements:

                          1a) IPv4 and IPv6 feeds
                          1b) geoIP lists by country
                          2) DNS block lists

                          841c29b5-ee04-43e6-9318-82ebe2511755-image.png

                          IP lists that are enabled have options:
                          6142b8e9-ec61-445a-b513-cc5054b6a8e8-image.png

                          geo:
                          9ab0b98f-120e-4ebd-be71-ed42a9304351-image.png

                          Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                          When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
                          Upvote 👍 helpful posts!

                          JonathanLeeJ 2 Replies Last reply Reply Quote 1
                          • JonathanLeeJ
                            JonathanLee @SteveITS
                            last edited by

                            @steveits thanks for sharing that looks like amazing software. I have never seen that package installed or screenshots of it until today. Again I hear about it in the discussion posts all the time. Thanks for sharing.

                            Make sure to upvote

                            1 Reply Last reply Reply Quote 0
                            • JonathanLeeJ
                              JonathanLee @SteveITS
                              last edited by

                              @steveits Palo Alto does country blocks also.

                              Make sure to upvote

                              1 Reply Last reply Reply Quote 0
                              • bmeeksB
                                bmeeks
                                last edited by bmeeks

                                Suricata offers GeoIP rules support. It can download and use the GeoLite2 geo-location database from MaxMind (the same DB used by pfBlockerNG-devel).

                                However, in Suricata, you must create your own GeoIP rules unless you happen to find a packaged set online someplace. I've never seen one, though. But Suricata does have full support for GeoIP. Here is a link to the documentation: https://suricata.readthedocs.io/en/suricata-6.0.0/rules/header-keywords.html#geoip.

                                Snort does not have a GeoIP option.

                                1 Reply Last reply Reply Quote 0
                                • M
                                  michmoor LAYER 8 Rebel Alliance @bmeeks
                                  last edited by

                                  @bmeeks said in (RESOLVED NEXT RELEASE) WARNING!! Emerging Threats Dshield rule set is now empty inside Snort and on Emerging Threats official website:

                                  And if you do MITM SSL termination, then an IDS/IPS can be very useful for payload inspection. But there is quite a bit of extra work involved with MITM setup.

                                  I have a MITM configureation in play right now. Just confused as to which point the IPS engine(suricata in my case) can see the payload. What i mean is this, when i perform a pcap on pfsense itself in the GUI, i still see traffic with TLS encryption. So clearly the pcap engine happens before the TLS decryption process. But does Suricata see the decrypted payload?

                                  Firewall: NetGate,Palo Alto-VM,Juniper SRX
                                  Routing: Juniper, Arista, Cisco
                                  Switching: Juniper, Arista, Cisco
                                  Wireless: Unifi, Aruba IAP
                                  JNCIP,CCNP Enterprise

                                  bmeeksB 1 Reply Last reply Reply Quote 0
                                  • bmeeksB
                                    bmeeks @michmoor
                                    last edited by

                                    @michmoor said in (RESOLVED NEXT RELEASE) WARNING!! Emerging Threats Dshield rule set is now empty inside Snort and on Emerging Threats official website:

                                    @bmeeks said in (RESOLVED NEXT RELEASE) WARNING!! Emerging Threats Dshield rule set is now empty inside Snort and on Emerging Threats official website:

                                    And if you do MITM SSL termination, then an IDS/IPS can be very useful for payload inspection. But there is quite a bit of extra work involved with MITM setup.

                                    I have a MITM configureation in play right now. Just confused as to which point the IPS engine(suricata in my case) can see the payload. What i mean is this, when i perform a pcap on pfsense itself in the GUI, i still see traffic with TLS encryption. So clearly the pcap engine happens before the TLS decryption process. But does Suricata see the decrypted payload?

                                    No, the default network plumbing of FreeBSD and pfSense puts Suricata immediately after the NIC driver. So, that means it sees the traffic before the MITM interception occurs. Same as you see with PCAP. Using Suricata with MITM on pfSense requires you to do special custom network routing/plumbing on the host. It is not something that is available out of the box for now.

                                    M 2 Replies Last reply Reply Quote 0
                                    • M
                                      michmoor LAYER 8 Rebel Alliance @bmeeks
                                      last edited by

                                      @bmeeks Gotcha. Thanks for that tidbit as one of the primary reasons i went down the MITM track was to test the IPS functionality.
                                      I would assume this is probably the case for other packages like ntopng where it can do app identification but most likely not involving Squid or Suricata in the mix so for apps it cant identify..it cant identify.

                                      Firewall: NetGate,Palo Alto-VM,Juniper SRX
                                      Routing: Juniper, Arista, Cisco
                                      Switching: Juniper, Arista, Cisco
                                      Wireless: Unifi, Aruba IAP
                                      JNCIP,CCNP Enterprise

                                      JonathanLeeJ 2 Replies Last reply Reply Quote 0
                                      • JonathanLeeJ
                                        JonathanLee @michmoor
                                        last edited by JonathanLee

                                        @michmoor I am running an ARM processor on a 2100 MAX I have always wondered about it's usage of multithreading within its DNA. If your using SSL intercept the firewall itself runs the certificates, again you can also issue the SSL certs from inside of the Squid software and import them back into the Pfsense software. To my understanding Snort uses only one thread inside of the Pfsense software package; however Snort has multithreading functionality within some versions. Anyway Snort has appID options like Palo Alto does and they function but it eats memory. I can only "speculate" APP ID uses the certificates stored on the firewall.

                                        Screenshot 2022-12-30 at 2.34.49 PM.png

                                        Screenshot 2022-12-30 at 2.40.20 PM.png

                                        it's stateful inspection too.

                                        Make sure to upvote

                                        1 Reply Last reply Reply Quote 0
                                        • JonathanLeeJ
                                          JonathanLee @michmoor
                                          last edited by

                                          @michmoor Snort is not even listed within the sockets when it runs.

                                          Make sure to upvote

                                          M 1 Reply Last reply Reply Quote 0
                                          • M
                                            michmoor LAYER 8 Rebel Alliance @JonathanLee
                                            last edited by

                                            @jonathanlee I would caution that OpenAppID is not really like PaloAlto so don’t assume you’re getting those feature like quality for free.

                                            Firewall: NetGate,Palo Alto-VM,Juniper SRX
                                            Routing: Juniper, Arista, Cisco
                                            Switching: Juniper, Arista, Cisco
                                            Wireless: Unifi, Aruba IAP
                                            JNCIP,CCNP Enterprise

                                            JonathanLeeJ 1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.