Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    23.01RC - Suricata stops working after Wireguard installed

    Scheduled Pinned Locked Moved Plus 23.01 Development Snapshots (Retired)
    60 Posts 6 Posters 15.0k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • G
      Gblenn @bmeeks
      last edited by Gblenn

      @bmeeks Although Suricata is not running because I prioritize Wireguard, I made a test doing a force update now. First without abuse.ch selected. It ran through as expected in less than a minute according to the System log which shows [Suricata] The Rules update has finished..

      However, there is an issue with the popup window which never auto-closes.

      Did force update with abuse.ch selected and the system log shows that it starts to download and update and within seconds it gets to Feodo (next being ABUSE) and then nothing...
      Left it like that for 8 minutes and then deselected abuse.ch and saved in Global Settings.
      System log now shows
      [Suricata] Hide Deprecated Rules is enabled. Removing obsoleted rules [Suricata] The Rules update has finished.
      Selecting abuse.ch again, and it shows up as updated within the same time frame as the other rule sets...?!

      bmeeksB 1 Reply Last reply Reply Quote 0
      • bmeeksB
        bmeeks @Gblenn
        last edited by bmeeks

        @gblenn:
        My current guess is something is weird about the returned md5 file contents when curl attempts the download. It's like it fails to recognize the end of file and thus does not know the download is completed.

        The PHP code uses the built-in PHP curl function to download the rules files. The exact same PHP code in the Suricata package is used for every downloaded rules file. The fact only certain ones fail points to an issue with how that particular site is doing something (that curl is not liking or not interpreting properly). But I have been unable to pin it down.

        The only thing I have determined is that it's the download of the md5 checksum file that "hangs", but only for certain URLs.

        G 1 Reply Last reply Reply Quote 0
        • G
          Gblenn @bmeeks
          last edited by

          @bmeeks Makes sense, so are there ways to "catch" this if it happens? A time out and then continue in this case since Suricata does not "depend" on it. At least not to the point that it doesn't work as long as other rule sets are installed or the previous one is still in place.

          bmeeksB 1 Reply Last reply Reply Quote 0
          • bmeeksB
            bmeeks @Gblenn
            last edited by bmeeks

            @gblenn said in 23.01RC - Suricata stops working after Wireguard installed:

            @bmeeks Makes sense, so are there ways to "catch" this if it happens? A time out and then continue in this case since Suricata does not "depend" on it. At least not to the point that it doesn't work as long as other rule sets are installed or the previous one is still in place.

            There is a timeout in place in the PHP code. That's where my 10-minute value came from. Specifically these lines in the code:

            curl_setopt($ch, CURLOPT_TIMEOUT, 0);
            curl_setopt($ch, CURLOPT_CONNECTTIMEOUT, 10);
            curl_setopt($ch, CURLOPT_TCP_KEEPALIVE, 1);
            

            I am digging into it. It is something with the new PHP 8.1 or perhaps an updated curl library. This issue does not exist in the current pfSense RELEASE branch and the Suricata PHP code here is pretty much identical to that code. The only change is how the code reads some parameters from config.xml with the new PHP 8.1 rules, but none of that is part of the code area that is acting up.

            G 1 Reply Last reply Reply Quote 0
            • G
              Gblenn @bmeeks
              last edited by

              @bmeeks I can't remember what version of Suricata I had in 22.05, but since things were was working there, would it be possible to downgrade somehow?

              bmeeksB 1 Reply Last reply Reply Quote 0
              • bmeeksB
                bmeeks @Gblenn
                last edited by

                @gblenn said in 23.01RC - Suricata stops working after Wireguard installed:

                @bmeeks I can't remember what version of Suricata I had in 22.05, but since things were was working there, would it be possible to downgrade somehow?

                No, you can't downgrade Suricata because the PHP code is radically changed to work with the new PHP 8.1 that is part of 23.01 and 2.7.0 CE. Older Suricata PHP code will not work at all in the upcoming pfSense release due the new 8.1 PHP environment.

                I have found the problem with the "hang" during installation when installing certain rules files. It is related to an update in some shared libraries and has to do with HTTP2 support in cURL. I've tested my fix in a virtual machine, and the stalling is fixed. Will be submitting that pull request later this evening for the Netgate team to review and merge.

                As for the other problem with Wireguard, I need help from the Netgate wirequard guru. He said he will investigate, but may not get to it until next week. So that bug may linger for a bit longer.

                G 1 Reply Last reply Reply Quote 1
                • stephenw10S
                  stephenw10 Netgate Administrator @Bob.Dig
                  last edited by

                  @bob-dig said in 23.01RC - Suricata stops working after Wireguard installed:

                  I think, an Upgrade should never depend on some third party lists hosted somewhere, lists etc should be updated after the whole upgrade procedure.

                  As always, the safest way to perform a pfSense upgrade is to uninstall packages, upgrade, then reinstall packages. Settings are retained.

                  Not convenient but...

                  Bob.DigB 1 Reply Last reply Reply Quote 0
                  • G
                    Gblenn @bmeeks
                    last edited by Gblenn

                    @bmeeks Ah yes php was changed, well I just changed to the 22.05 version and let the 23.01 sit and wait for a while.

                    BTW, on the Wireguard issue, the passlist itself is complete as far as I can see.
                    /usr/local/etc/suricata/suricata_28603_igb1/passlist

                    That's how I knew the two WG IP's were next to be processed, looking at the error reported. After that I have 127.0.0.1/32 and then my LAN and VLAN subnets.
                    The only thing in that list which makes the WG IP's different, is that they start with 10 and have a /31 mask, where it's /32 and /24 for the others.

                    1 Reply Last reply Reply Quote 1
                    • Bob.DigB
                      Bob.Dig LAYER 8 @stephenw10
                      last edited by Bob.Dig

                      @stephenw10 said in 23.01RC - Suricata stops working after Wireguard installed:

                      Not convenient but...

                      True.
                      But Netgate could enforce a different behavior on the package maintainers (or maybe not). As a prosumer I say it is more of a standard to upgrade just the app and load "definitions" later. But most of the people probably don't have a hostile ISP. And pfSense is special in so may ways.

                      M P 2 Replies Last reply Reply Quote 0
                      • M
                        mrsunfire @Bob.Dig
                        last edited by

                        I'm having the same issue and suricata service won't start.

                        3/2/2023 -- 09:45:45 - <Error> -- [ERRCODE: SC_ERR_FATAL(171)] - prefix or user NULL
                        
                        

                        Netgate 6100 MAX

                        G 1 Reply Last reply Reply Quote 0
                        • G
                          Gblenn @mrsunfire
                          last edited by

                          @mrsunfire And do you also have the WG tunnel IP's directly after that error?
                          If you go into /usr/local/etc/suricata/suricata_some_directory_name/
                          Check the passlist in that folder, do you see the IP's and can identify your WG IP's?

                          1 Reply Last reply Reply Quote 0
                          • M
                            mrsunfire
                            last edited by

                            @gblenn Yes the WG IP are in that list. If I uncheck the passlist (set to none) the service is starting.

                            Until I set it back to normal passlist I get this:

                            3/2/2023 -- 10:15:24 - <Info> -- alert-pf -> Loading and parsing Pass List from: /usr/local/etc/suricata/suricata_29846_pppoe1/passlist.
                            3/2/2023 -- 10:15:24 - <Info> -- alert-pf -> Added IPv4 address 1.0.0.1 from assigned Pass List.
                            3/2/2023 -- 10:15:24 - <Info> -- alert-pf -> Added IPv4 address 1.1.1.1 from assigned Pass List.
                            3/2/2023 -- 10:15:24 - <Info> -- alert-pf -> Added IPv4 address 8.8.4.4 from assigned Pass List.
                            3/2/2023 -- 10:15:24 - <Info> -- alert-pf -> Added IPv4 address 8.8.8.8 from assigned Pass List.
                            3/2/2023 -- 10:15:24 - <Info> -- alert-pf -> Added IPv4 address 8.8.8.8/32 from assigned Pass List.
                            3/2/2023 -- 10:15:24 - <Info> -- alert-pf -> Added IPv4 address 9.9.9.9 from assigned Pass List.
                            3/2/2023 -- 10:15:24 - <Info> -- alert-pf -> Added IPv4 address 10.0.0.0/24 from assigned Pass List.
                            3/2/2023 -- 10:15:24 - <Info> -- alert-pf -> Added IPv4 address 10.0.1.0/24 from assigned Pass List.
                            3/2/2023 -- 10:15:24 - <Info> -- alert-pf -> Added IPv4 address 10.0.2.0/24 from assigned Pass List.
                            3/2/2023 -- 10:15:24 - <Info> -- alert-pf -> Added IPv4 address 10.0.40.0/24 from assigned Pass List.
                            3/2/2023 -- 10:15:24 - <Error> -- [ERRCODE: SC_ERR_FATAL(171)] - prefix or user NULL
                            3/2/2023 -- 10:15:25 - <Info> -- (RX#01-pppoe1) Packets 0, bytes 0
                            3/2/2023 -- 10:15:25 - <Info> -- (RX#01-pppoe1) Pcap Total:67 Recv:67 Drop:0 (0.0%).
                            3/2/2023 -- 10:15:25 - <Info> -- alert-pf output inserted 0 IP address blocks
                            3/2/2023 -- 10:15:25 - <Info> -- alert-pf output processed 0 alerts
                            3/2/2023 -- 10:15:25 - <Info> -- alert-pf output inserted 0 IP address blocks
                            3/2/2023 -- 10:15:25 - <Info> -- alert-pf output processed 0 alerts
                            3/2/2023 -- 10:15:25 - <Info> -- alert-pf output inserted 0 IP address blocks
                            3/2/2023 -- 10:15:25 - <Info> -- alert-pf output processed 0 alerts
                            3/2/2023 -- 10:15:25 - <Info> -- alert-pf output inserted 0 IP address blocks
                            3/2/2023 -- 10:15:25 - <Info> -- alert-pf output processed 0 alerts
                            3/2/2023 -- 10:15:25 - <Info> -- cleaning up signature grouping structure... complete
                            3/2/2023 -- 10:15:25 - <Notice> -- Stats for 'pppoe1':  pkts: 0, drop: 0 (nan%), invalid chksum: 0
                            
                            

                            Right after 10.0.40.0/24 is the WG ip in the passlist file.

                            Netgate 6100 MAX

                            G 1 Reply Last reply Reply Quote 0
                            • G
                              Gblenn @mrsunfire
                              last edited by Gblenn

                              @mrsunfire said in 23.01RC - Suricata stops working after Wireguard installed:

                              Yes the WG IP are in that list. If I uncheck the passlist (set to none) the service is starting.

                              Ah, good point, why didn't I think of that... But I suppose you really want the passlist, else you get into all sorts of trouble.

                              Now I'm back on 22.05 so I can't test right now. If you start Suricata without passlist, and then go back and select your passlist and click save, does that stop Suricata? Suppose it does since you'd get that error again, when it works it's way through the list...

                              M 1 Reply Last reply Reply Quote 0
                              • M
                                mrsunfire @Gblenn
                                last edited by

                                @gblenn Exactly that happens. Did try this as workaround.

                                Netgate 6100 MAX

                                1 Reply Last reply Reply Quote 0
                                • jimpJ jimp moved this topic from General pfSense Questions on
                                • bmeeksB
                                  bmeeks
                                  last edited by

                                  The most likely cause of the Wireguard Pass List problem is the pfSense system function returning an invalid final address entry. In the Suricata package code, the call to the pfSense function is the very last step of a larger function that is grabbing all of the VPN-related IP addresses. Here is the code:

                                  /* WireGuard */
                                  if (function_exists('wg_get_tunnel_networks')) {
                                  	foreach (wg_get_tunnel_networks() as $wgn) {
                                  		$vpns_arr[] = $wgn;
                                  	}
                                  }
                                  

                                  The code is calling the pfSense function wg_get_tunnel_networks() and then walking the returned array adding each element to the local VPNs array variable. My suspicion is the last returned element from the pfSense function is the problem.

                                  I don't have a Wireguard setup to test with, and I'm not familiar with the new Wireguard functionality in pfSense either. That's why I asked the Netgate Wireguard developer to lend a hand troubleshooting this one. This VPN gathering sub-function in Suricata was added sometime back by a Netgate developer who has since left the company.

                                  G 1 Reply Last reply Reply Quote 0
                                  • G
                                    Gblenn @bmeeks
                                    last edited by

                                    @bmeeks Yes I saw that you highlighted that in Redmine.
                                    I did however go in to check and that same code block is present in the version I have on 22.05. And there things are are working fine...

                                    Not sure you need a full working Wireguard setup to be able to test it.
                                    I'm guessing all you need is to create a tunnel and add one peer (where the tunnel IP will be listed).
                                    Whether or not the tunnel is actually up shouldn't impact the passlist?

                                    bmeeksB 2 Replies Last reply Reply Quote 0
                                    • bmeeksB
                                      bmeeks @Gblenn
                                      last edited by bmeeks

                                      @gblenn said in 23.01RC - Suricata stops working after Wireguard installed:

                                      I did however go in to check and that same code block is present in the version I have on 22.05. And there things are are working fine...

                                      It will almost certainly be related to the new PHP 8.1 that comes with the latest pfSense snapshots. A lot of the old ways of doing things in PHP code (especially with arrays) got force-deprecated with the bump from PHP 7.x to 8.1. PHP 7.x and earlier would sort of hold your hand and fix things gracefully in the background in some cases. PHP 8.1 no longer does that. It enforces some hard and fast rules about arrays and strings in particular.

                                      That's why I made my earlier comment about being unable to rollback Suricata but stay current in pfSense DEVEL. The PHP code is incompatible, and PHP is what all of the GUI is written with.

                                      1 Reply Last reply Reply Quote 0
                                      • bmeeksB
                                        bmeeks @Gblenn
                                        last edited by bmeeks

                                        @gblenn:
                                        Would you be willing to test the fix below? It requires a small edit to the /usr/local/pkg/suricata/suricata.inc PHP source file. I'm having trouble reproducing the issue in my test system, but it is likely because I do not have Wireguard configured properly yet. But in reviewing the Wireguard package code, I think I see a place where a problem could occur.

                                        Below is the new code. The change is on line 4299 of the file (so almost at the very bottom of that file).

                                        /* WireGuard */
                                        if (function_exists('wg_get_tunnel_networks')) {
                                        	foreach (wg_get_tunnel_networks() as $wgn) {
                                        		$vpns_arr[] = $wgn['network'] . '/' . $wgn['mask'];
                                        	}
                                        }
                                        

                                        If you can perform this test, please report back the results here. Thanks!

                                        Edit: or alternatively, you could copy and paste the following PHP code into an empty file and then execute it on the firewall. It will print out the Wireguard tunnel networks.

                                        <?php
                                        require_once('wireguard/includes/wg.inc');
                                        
                                        global $g;
                                        $vpns_arr = array();
                                        
                                        /* WireGuard */
                                        if (function_exists('wg_get_tunnel_networks')) {
                                        	foreach (wg_get_tunnel_networks() as $wgn) {
                                        		print_r($wgn, false);
                                        		$vpns_arr[] = $wgn;
                                        	}
                                        	print PHP_EOL . "\$vpns_arr[] contents = " . PHP_EOL;
                                        	print_r($vpns_arr, false);
                                        } else {
                                        	print "Failed to find the wg_get_tunnel_networks() function";
                                        }
                                        ?>
                                        

                                        So, for example, paste the code above into /tmp/test.php and then at a shell prompt on the firewall execute the code with this command:

                                        php -f /tmp/test.php
                                        

                                        Posting what the above code outputs will help me understand the problem better. If you do not want to divulge the IP addresses on the public forum, then PM me and I can supply my email address.

                                        G 1 Reply Last reply Reply Quote 0
                                        • G
                                          Gblenn @bmeeks
                                          last edited by

                                          @bmeeks Ok, not sure this was a conclusive test, as I ran this on a VM where I was using vtnet instead of igb. Had to mess around with interface settings a bit to get it up and running.

                                          So php -f /tmp/test.php gave this:

                                          Array
                                          (
                                          [network] => 10.6.250.0
                                          [mask] => 31
                                          [tun] => tun_wg1
                                          [descr] => One_VPN
                                          )

                                          $vpns_arr[] contents =
                                          Array
                                          (
                                          [0] => Array
                                          (
                                          [network] => 10.6.250.0
                                          [mask] => 31
                                          [tun] => tun_wg1
                                          [descr] => One_VPN
                                          )

                                          )

                                          That only shows one of the tunnels though... Also, after fixing the interface assignments, I also changed the names of the WG interfaces, but that was not reflected in the output.
                                          The output looks exactly the same on 22.05 btw...

                                          Editing suricata.inc to look like this:

                                          /* WireGuard */
                                          if (function_exists('wg_get_tunnel_networks')) {
                                          	foreach (wg_get_tunnel_networks() as $wgn) {
                                          		$vpns_arr[] = $wgn['network'] . '/' . $wgn['mask'];
                                          	}
                                          

                                          Gave the following error (twice, because of two interfaces?):

                                          PHP ERROR: Type: 1, File: /usr/local/pkg/suricata/suricata.inc, Line: 4310, Message: Uncaught TypeError: Cannot access offset of type string on string in /usr/local/pkg/suricata/suricata.inc:4310
                                          Stack trace:
                                          #0 /usr/local/pkg/suricata/suricata.inc(599): suricata_get_vpns_list()
                                          #1 /usr/local/pkg/suricata/suricata_generate_yaml.php(46): suricata_build_list(Array, 'default')
                                          #2 /usr/local/pkg/suricata/suricata.inc(3800): include('/usr/local/pkg/...')
                                          #3 /usr/local/pkg/suricata/suricata.inc(933): suricata_generate_yaml(Array)
                                          #4 /tmp/suricata_vtnet128603_startcmd.php(8): sync_suricata_package_config()
                                          #5 {main}

                                          bmeeksB 1 Reply Last reply Reply Quote 0
                                          • bmeeksB
                                            bmeeks @Gblenn
                                            last edited by

                                            @gblenn said in 23.01RC - Suricata stops working after Wireguard installed:

                                            @bmeeks Ok, not sure this was a conclusive test, as I ran this on a VM where I was using vtnet instead of igb. Had to mess around with interface settings a bit to get it up and running.

                                            So php -f /tmp/test.php gave this:

                                            Array
                                            (
                                            [network] => 10.6.250.0
                                            [mask] => 31
                                            [tun] => tun_wg1
                                            [descr] => One_VPN
                                            )

                                            $vpns_arr[] contents =
                                            Array
                                            (
                                            [0] => Array
                                            (
                                            [network] => 10.6.250.0
                                            [mask] => 31
                                            [tun] => tun_wg1
                                            [descr] => One_VPN
                                            )

                                            )

                                            That only shows one of the tunnels though... Also, after fixing the interface assignments, I also changed the names of the WG interfaces, but that was not reflected in the output.
                                            The output looks exactly the same on 22.05 btw...

                                            Editing suricata.inc to look like this:

                                            /* WireGuard */
                                            if (function_exists('wg_get_tunnel_networks')) {
                                            foreach (wg_get_tunnel_networks() as $wgn) {
                                            $vpns_arr[] = $wgn['network'] . '/' . $wgn['mask'];
                                            }

                                            Gave the following error (twice, because of two interfaces?):

                                            PHP ERROR: Type: 1, File: /usr/local/pkg/suricata/suricata.inc, Line: 4310, Message: Uncaught TypeError: Cannot access offset of type string on string in /usr/local/pkg/suricata/suricata.inc:4310
                                            Stack trace:
                                            #0 /usr/local/pkg/suricata/suricata.inc(599): suricata_get_vpns_list()
                                            #1 /usr/local/pkg/suricata/suricata_generate_yaml.php(46): suricata_build_list(Array, 'default')
                                            #2 /usr/local/pkg/suricata/suricata.inc(3800): include('/usr/local/pkg/...')
                                            #3 /usr/local/pkg/suricata/suricata.inc(933): suricata_generate_yaml(Array)
                                            #4 /tmp/suricata_vtnet128603_startcmd.php(8): sync_suricata_package_config()
                                            #5 {main}

                                            Thanks for testing. I think the actual error is somewhere else, but this code exposes it. The string offset error error you get when you modify the suricata.inc file like I suggested is a PHP 8.1 thing. That error will not usually happen in earlier PHP versions, so that's why the same setup works for in 22.05. Earlier pfSense versions use PHP 7.4.

                                            I will keep digging into this.

                                            1 Reply Last reply Reply Quote 1
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.