Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Suricata 6.0.10_1 Update for pfSense Plus 23.01 - Release Notes

    Scheduled Pinned Locked Moved IDS/IPS
    45 Posts 8 Posters 13.1k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • N
      NRgia @bmeeks
      last edited by

      @bmeeks Both interfaces were down before the update request. The WAN configuration was duplicated to a duplicated WAN, and the configuration for the LAN was not displayed in the Settings menu. And yes in the settings menu it shows 2x WANs both as naming and the configuration.

      I will try with a reboot after a few hours and let you know, I'm using the connection for the moment.

      bmeeksB 1 Reply Last reply Reply Quote 0
      • bmeeksB
        bmeeks @NRgia
        last edited by bmeeks

        @nrgia said in Suricata 6.0.10_1 Update for pfSense Plus 23.01 - Release Notes:

        @bmeeks Both interfaces were down before the update request. The WAN configuration was duplicated to a duplicated WAN, and the configuration for the LAN was not displayed in the Settings menu. And yes in the settings menu it shows 2x WANs both as naming and the configuration.

        I will try with a reboot after a few hours and let you know, I'm using the connection for the moment.

        Why were the interfaces down? How did the firewall connect to Netgate servers to pull down the update? Just trying to figure out the scenario for reproducing the problem.

        And if it is working okay now, how did you fix it? Or do you mean it's running without Suricata on the interfaces?

        P.S. -- you might also try simply removing the Suricata package and then reinstalling it. Now that I think more about it, that may be what the user did that had the problem during the DEVEL snapshot testing.

        N 1 Reply Last reply Reply Quote 0
        • N
          NRgia @bmeeks
          last edited by NRgia

          @bmeeks Sorry, I meant I disabled Suricata on both interfaces before starting the update process.

          Also i removed Suricata package and reinstalled it.

          bmeeksB 2 Replies Last reply Reply Quote 0
          • bmeeksB
            bmeeks @NRgia
            last edited by

            @nrgia said in Suricata 6.0.10_1 Update for pfSense Plus 23.01 - Release Notes:

            @bmeeks Sorry, I meant I disabled Suricata on both interfaces before starting the update process.

            Also i removed Suricata package and reinstalled it.

            Okay... that makes more sense 😊. I was confused there for a moment. This issue has not affected everyone (at least so far as I know), and I have not seen it during my development snapshot tests. Is pfSense (and FreeBSD itself) reporting the physical NIC interfaces with exactly the same name as before?

            N 1 Reply Last reply Reply Quote 0
            • bmeeksB
              bmeeks @NRgia
              last edited by bmeeks

              @nrgia:
              Suricata uses the interface names as the "keys" when storing interface configuration. So if you examine the Suricata section of config.xml you should see sections under the <rules> element for <wan> and <lan> with each section containing all the configuration settings for that interface.

              Do you see that in config.xml, or do you see two <wan> sections? You can view the file under DIAGNOSTICS > EDIT FILE, then browse to /conf/ and open config.xml.

              I am struggling to come up with a theory that describes what happened. Since it has apparently occurred twice to two different users, but not all users, something unique in a setup would seem to be the trigger.

              As an example, here is part of the config.xml file from my test virtual machine showing the <rule> sections for WAN and LAN. Scroll down towards the bottom of the config.xml file and find the <suricata> section like this one:

              <suricata>
              	<config>
              

              ... then continue scrolling down until you find the first <rule> tag like this one:

                  <rule>
              	<interface>wan</interface>
              	<enable>on</enable>
              	<uuid>14777</uuid>
              	<descr><![CDATA[WAN]]></descr>
              

              and then farther down ...

                  <rule>
              	<interface>lan</interface>
              	<enable>on</enable>
              	<uuid>22480</uuid>
              	<descr><![CDATA[LAN]]></descr>
              

              I am curious what shows in these sections of your config.xml file. That might help me troubleshoot if you can share it. Just these subparts. Don't post the entire file as some potentially sensitive info is also stored in the file.

              N 1 Reply Last reply Reply Quote 0
              • G
                greenflash @NRgia
                last edited by greenflash

                @nrgia I do have a very similar issue.

                On version 6.0.8_7 I have the following interfaces configured:
                77982d60-e9a7-4996-a528-769203285b09-image.png

                But after upgrading to 6.0.8_8 or 6.0.10_1 my WAN configuration (including its custom rules) have got deleted and I have duplicate LAN1 configurations, see:
                Screenshot_20230221_155854.png

                For me there is no obvious way to get my WAN configuration back, besides rolling back to the previous version via boot environments.

                EDIT:
                I have already unsuccessfully tried the following:

                • Rebooting the firewall
                • Removing suricata package and reinstalling version 6.0.10_1
                • Restoring a backup of the config.xml file
                N 1 Reply Last reply Reply Quote 0
                • N
                  NRgia @greenflash
                  last edited by NRgia

                  @greenflash said in Suricata 6.0.10_1 Update for pfSense Plus 23.01 - Release Notes:

                  For me there is no obvious way to get my WAN configuration back, besides rolling back to the previous version via boot environments.

                  For me it was easier, because before the update, I disabled Suricata on both interfaces, so an entry in the Configuration history was added. I just clicked on revert to that point, and I have both of the interfaces again. Sure if I reinstall the package the same happens, doubled interfaces.

                  Maybe you can find something in Diagnostics>Backup & RestoreConfig> History

                  Screenshot_20230222_182724.png

                  1 Reply Last reply Reply Quote 0
                  • N
                    NRgia @bmeeks
                    last edited by NRgia

                    @bmeeks pfSense or other menus like Interface assignments reports the correct interface mappings. So only in Suricata I have issues. I will reinstall again, in order to trigger the problem again, and will respond to the rest of the questions shortly.

                    1 Reply Last reply Reply Quote 0
                    • N
                      NRgia @bmeeks
                      last edited by NRgia

                      @bmeeks said in Suricata 6.0.10_1 Update for pfSense Plus 23.01 - Release Notes:

                      @nrgia:
                      Suricata uses the interface names as the "keys" when storing interface configuration. So if you examine the Suricata section of config.xml you should see sections under the <rules> element for <wan> and <lan> with each section containing all the configuration settings for that interface.

                      Do you see that in config.xml, or do you see two <wan> sections? You can view the file under DIAGNOSTICS > EDIT FILE, then browse to /conf/ and open config.xml.

                      I am struggling to come up with a theory that describes what happened. Since it has apparently occurred twice to two different users, but not all users, something unique in a setup would seem to be the trigger.

                      As an example, here is part of the config.xml file from my test virtual machine showing the <rule> sections for WAN and LAN. Scroll down towards the bottom of the config.xml file and find the <suricata> section like this one:

                      <suricata>
                      	<config>
                      

                      ... then continue scrolling down until you find the first <rule> tag like this one:

                          <rule>
                      	<interface>wan</interface>
                      	<enable>on</enable>
                      	<uuid>14777</uuid>
                      	<descr><![CDATA[WAN]]></descr>
                      

                      and then farther down ...

                          <rule>
                      	<interface>lan</interface>
                      	<enable>on</enable>
                      	<uuid>22480</uuid>
                      	<descr><![CDATA[LAN]]></descr>
                      

                      I am curious what shows in these sections of your config.xml file. That might help me troubleshoot if you can share it. Just these subparts. Don't post the entire file as some potentially sensitive info is also stored in the file.

                      This is what I see in the config.xml :

                      <rule>
                      				<interface>wan</interface>
                      				<enable>off</enable>
                      				<uuid>27404</uuid>
                      				<descr><![CDATA[WAN]]></descr>
                      

                      and

                      <rule>
                      				<interface>wan</interface>
                      				<enable>off</enable>
                      				<uuid>27404</uuid>
                      				<descr><![CDATA[WAN]]></descr>
                      

                      Also the configuration is 100 % for both interfaces, rules, etc.

                      If I enable Suricata on both WANs from the GUI only one instance of Suricata will start:

                      Suricata 2 interfaces.png

                      Also this is from the config.xml previous to updating:

                      <rule>
                      				<interface>wan</interface>
                      				<enable>on</enable>
                      				<uuid>27404</uuid>
                      				<descr><![CDATA[WAN]]></descr>
                      

                      and

                      
                      <rule>
                      				<interface>lan</interface>
                      				<enable>on</enable>
                      				<uuid>42440</uuid>
                      				<descr><![CDATA[LAN]]></descr>
                      

                      I have both configs saved now, if you need more sections of them, I'm glad to help.

                      bmeeksB 1 Reply Last reply Reply Quote 0
                      • bmeeksB
                        bmeeks @NRgia
                        last edited by

                        @NRgia:
                        Yeah, that first capture from your config.xml is definitely not correct. The entire interface appears duplicated. Notice the UUID also is the same.

                        Not sure what is happening there. I will need to do some experimentation and hack up a config on my test VM to see if I can replicate your issue.

                        Your second screenshot from the previous configuration looks correct, so the revert to previous configuration works.

                        N 1 Reply Last reply Reply Quote 0
                        • N
                          NRgia @bmeeks
                          last edited by NRgia

                          @bmeeks said in Suricata 6.0.10_1 Update for pfSense Plus 23.01 - Release Notes:

                          @NRgia:
                          Yeah, that first capture from your config.xml is definitely not correct. The entire interface appears duplicated. Notice the UUID also is the same.

                          Not sure what is happening there. I will need to do some experimentation and hack up a config on my test VM to see if I can replicate your issue.

                          Your second screenshot from the previous configuration looks correct, so the revert to previous configuration works.

                          Correct, if I revert to a previous config the issue is not present. It's doing something in the conversion step I think, during the update/install. Sorry to bring this up, in this thread.

                          bmeeksB 1 Reply Last reply Reply Quote 0
                          • bmeeksB
                            bmeeks @NRgia
                            last edited by bmeeks

                            @nrgia said in Suricata 6.0.10_1 Update for pfSense Plus 23.01 - Release Notes:

                            Correct, if I revert to a previous config the issue is not present. It's doing something in the conversion step I think, during the update/install. Sorry to bring this up, in this thread.

                            No problem with the thread topic: this is as good a place as any to figure it out. Thank you for letting me know.

                            Your guess matches mine that something happens in the "migrate existing configuration" part of the install steps. Give me a bit to run some scenarios around in my head, and then test them. There were many PHP changes required in the package in order to become compatible with the new PHP 8.1 included in 23.01 pfSense Plus and the upcoming 2.7 CE. One of those changes could have easily broken something my testing failed to uncover.

                            You have a workaround by reverting to the older config section, so that gets you running. Anything I find will have to go into a new package update.

                            N 1 Reply Last reply Reply Quote 0
                            • N
                              NRgia @bmeeks
                              last edited by

                              @bmeeks said in Suricata 6.0.10_1 Update for pfSense Plus 23.01 - Release Notes:

                              @nrgia said in Suricata 6.0.10_1 Update for pfSense Plus 23.01 - Release Notes:

                              Correct, if I revert to a previous config the issue is not present. It's doing something in the conversion step I think, during the update/install. Sorry to bring this up, in this thread.

                              No problem with the thread topic: this is as good a place as any to figure it out. Thank you for letting me know.

                              Your guess matches mine that something happens in the "migrate existing configuration" part of the install steps. Give me a bit to run some scenarios around in my head, and then test them. There were many PHP changes required in the package in order to become compatible with the new PHP 8.1 included in 23.01 pfSense Plus and the upcoming 2.7 CE.

                              You have a workaround by reverting to the older config section, so that gets you running. Anything I find will have to go into a new package update.

                              Sure Bill take your time, it's not a blocker for me.

                              R 1 Reply Last reply Reply Quote 0
                              • R
                                returntrip @NRgia
                                last edited by returntrip

                                I have a similar issue. My WAN interfaces is duplicated, (the LAN interface disappeared) and are showing as stopped in the Suricata overview page. However, I can see the alerts tab being populated for both WAN interfaces.

                                Would it be sufficient for me to change one of the interfaces back to LAN to fix this or should I be wary of something?

                                bmeeksB S 2 Replies Last reply Reply Quote 0
                                • bmeeksB
                                  bmeeks @returntrip
                                  last edited by

                                  @returntrip said in Suricata 6.0.10_1 Update for pfSense Plus 23.01 - Release Notes:

                                  I have a similar issue. My WAN interfaces is duplicated, (the LAN interface disappeared) and are showing as stopped in the Suricata overview page. However, I can see the alerts tab being populated for both WAN interfaces.

                                  Would it be sufficient for me to change one of the interfaces back to LAN to fix this or should I be wary of something?

                                  Thanks for the report. It's apparent something is wrong in the config migration code that runs when an updated package is installed. I never saw this in my virtual machine testing, but it could simply be because I never hit the right conditions. I have a theory on what may be happening, but I would like to reproduce it so that I can make sure my theory is correct. Will work on that today. I am pretty sure it's a PHP 8.1 thing. The move to 8.1 brought a lot of required changes in existing PHP code with it.

                                  Anything I find will have to go into the next package update, and if my theory is correct, those of you impacted will need to either selectively restore/edit your config.xml from prior to the Suricata upgrade, or else recreate the missing interface from scratch. I suspect it has been permanently overwritten in your current config.xml.

                                  N 1 Reply Last reply Reply Quote 1
                                  • S
                                    SteveITS Galactic Empire @returntrip
                                    last edited by

                                    @returntrip said in Suricata 6.0.10_1 Update for pfSense Plus 23.01 - Release Notes:

                                    are showing as stopped in the Suricata overview page. However, I can see the alerts tab being populated for both WAN interfaces.

                                    You probably have a zombie process. Killing all the Suricata processes, or rebooting, should clear it.

                                    Why have it on WAN and LAN? On WAN it will scan all packets before hitting the firewall so will waste time processing packets that will drop.

                                    Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                                    When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
                                    Upvote 👍 helpful posts!

                                    R 1 Reply Last reply Reply Quote 0
                                    • N
                                      NRgia @bmeeks
                                      last edited by NRgia

                                      @bmeeks You can try another scenario. Install pfSense CE 2.6.0, install Suricata, and then upgrade until you reach 23.01. You have more config migrations with this approach. I have my config created a few versions back.

                                      bmeeksB 1 Reply Last reply Reply Quote 0
                                      • bmeeksB
                                        bmeeks @NRgia
                                        last edited by

                                        @nrgia said in Suricata 6.0.10_1 Update for pfSense Plus 23.01 - Release Notes:

                                        @bmeeks You can try another scenario. Install pfSense CE 2.6.0, install Suricata, and then upgrade until you reach 23.01. You have more config migrations with this approach.

                                        That's sort of what I'm doing, but using just the config.xml file and importing/restoring an older one. I don't actually have any pfSense Plus testing VMs. I'm using 2.7.0 for that now as 23.01 and 2.7.0 are pretty much the same at the moment.

                                        I do so much destroying and recreating the test VMs that having to upgrade each one to Plus each time would be a hassle.

                                        N 1 Reply Last reply Reply Quote 0
                                        • N
                                          NRgia @bmeeks
                                          last edited by

                                          @bmeeks said in Suricata 6.0.10_1 Update for pfSense Plus 23.01 - Release Notes:

                                          @nrgia said in Suricata 6.0.10_1 Update for pfSense Plus 23.01 - Release Notes:

                                          @bmeeks You can try another scenario. Install pfSense CE 2.6.0, install Suricata, and then upgrade until you reach 23.01. You have more config migrations with this approach.

                                          That's sort of what I'm doing, but using just the config.xml file and importing/restoring an older one. I don't actually have any pfSense Plus testing VMs. I'm using 2.7.0 for that now as 23.01 and 2.7.0 are pretty much the same at the moment.

                                          I do so much destroying and recreating the test VMs that having to upgrade each one to Plus each time would be a hassle.

                                          I feel you, we, the users with whiteboxes tend to test less due to this cumbersome upgrade path, instead of simple installer images.

                                          1 Reply Last reply Reply Quote 0
                                          • R
                                            returntrip @SteveITS
                                            last edited by

                                            @steveits If am reading your reply correctly, the best practice is to run suricata only on the LAN interface then?

                                            S bmeeksB 2 Replies Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.