• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

Is Suricata package updates blocked by an internal decision?

Scheduled Pinned Locked Moved IDS/IPS
15 Posts 4 Posters 1.6k Views
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • N
    NRgia @bmeeks
    last edited by May 24, 2023, 1:40 PM

    @bmeeks Thank you for the clarification. I thought as much, as I also stated on reddit, but the information came from a moderator, so image that got some people scared a little.

    With your permission @bmeeks can I link your response to that reddit thread, to settle this down?

    Thank you

    B 1 Reply Last reply May 24, 2023, 1:44 PM Reply Quote 0
    • B
      bmeeks @NRgia
      last edited by May 24, 2023, 1:44 PM

      @NRgia said in Is Suricata package updates blocked by an internal decision?:

      With your permission @bmeeks can I link your response to that reddit thread, to settle this down?

      Sure. What I stated is my understanding and is how things have historically worked. I am not aware of any recent changes to the process.

      I've sent an email to Netgate asking them to migrate the latest 6.0.11 Suricata package over to the 23.05 RELEASE branch.

      1 Reply Last reply Reply Quote 1
      • B
        bmeeks
        last edited by May 25, 2023, 2:58 PM

        I have pending Pull Requests with the Netgate team to update Suricata to the latest 6.0.12 version from upstream.

        This should happen in the next day or two. I've asked for the update to be deployed to both the 2.7 CE and 23.09 Plus DEVEL Snapshot branches and the pfSense Plus 23.05 RELEASE branch.

        The Pull Requests are here:
        https://github.com/pfsense/FreeBSD-ports/pull/1264
        https://github.com/pfsense/FreeBSD-ports/pull/1265

        Unfortunately the new Suricata package requires PHP 8.1 or higher and is thus not compatible with the 2.6.0 CE branch.

        N D 3 Replies Last reply May 25, 2023, 3:02 PM Reply Quote 2
        • N
          NRgia @bmeeks
          last edited by May 25, 2023, 3:02 PM

          @bmeeks Thank you Bill

          1 Reply Last reply Reply Quote 0
          • B
            bmeeks
            last edited by May 25, 2023, 3:16 PM

            The Pull Requests I mentioned and linked in an earlier post above have been merged. Look for new package builds to appear after the next package build cycle.

            I think those are now done perhaps once per day ???

            1 Reply Last reply Reply Quote 0
            • N
              NRgia @bmeeks
              last edited by May 25, 2023, 8:03 PM

              @bmeeks said in Is Suricata package updates blocked by an internal decision?:

              I have pending Pull Requests with the Netgate team to update Suricata to the latest 6.0.12 version from upstream.

              This should happen in the next day or two. I've asked for the update to be deployed to both the 2.7 CE and 23.09 Plus DEVEL Snapshot branches and the pfSense Plus 23.05 RELEASE branch.

              The Pull Requests are here:
              https://github.com/pfsense/FreeBSD-ports/pull/1264
              https://github.com/pfsense/FreeBSD-ports/pull/1265

              Unfortunately the new Suricata package requires PHP 8.1 or higher and is thus not compatible with the 2.6.0 CE branch.

              Just installed them on 23.05, no issues. Thank you again

              1 Reply Last reply Reply Quote 0
              • D
                DefenderLLC @bmeeks
                last edited by DefenderLLC May 31, 2023, 8:19 PM May 31, 2023, 8:13 PM

                @bmeeks Question regarding the use of the Snort paid subscriber rules. This is an older image I just downloaded, but is there a way for Suricata to always use the current snapshot filename rather than having to enter the filename manually after Cisco/Talos updates it?

                One thing I like about the Snort package is that you don't have to keep up with this. Thanks.

                a2d55b93-0a0a-48a4-a64c-3f759b0a0495-image.png

                B 1 Reply Last reply May 31, 2023, 8:28 PM Reply Quote 0
                • B
                  bmeeks @DefenderLLC
                  last edited by May 31, 2023, 8:28 PM

                  @DefenderLLC said in Is Suricata package updates blocked by an internal decision?:

                  @bmeeks Question regarding the use of the Snort paid subscriber rules. This is an older image I just downloaded, but is there a way for Suricata to always use the current snapshot filename rather than having to enter the filename manually after Cisco/Talos updates it?

                  One thing I like about the Snort package is that you don't have to keep up with this. Thanks.

                  No, how would Suricata know what the current Snort snapshot version is?

                  The Snort binary is locked to the rules version. You can't use a Snort rules snapshot file that has a different version than the Snort binary with Snort. So, Snort simply downloads the file that matches its internal binary version. That's how it always uses the most recent snapshot.

                  Suricata can't do that because it has no way to know what the current Snort snapshot version might be.

                  D 1 Reply Last reply May 31, 2023, 8:32 PM Reply Quote 1
                  • D
                    DefenderLLC @bmeeks
                    last edited by DefenderLLC May 31, 2023, 8:44 PM May 31, 2023, 8:32 PM

                    @bmeeks said in Is Suricata package updates blocked by an internal decision?:

                    @DefenderLLC said in Is Suricata package updates blocked by an internal decision?:

                    @bmeeks Question regarding the use of the Snort paid subscriber rules. This is an older image I just downloaded, but is there a way for Suricata to always use the current snapshot filename rather than having to enter the filename manually after Cisco/Talos updates it?

                    One thing I like about the Snort package is that you don't have to keep up with this. Thanks.

                    No, how would Suricata know what the current Snort snapshot version is?

                    The Snort binary is locked to the rules version. You can't use a Snort rules snapshot file that has a different version than the Snort binary with Snort. So, Snort simply downloads the file that matches its internal binary version. That's how it always uses the most recent snapshot.

                    Suricata can't do that because it has no way to know what the current Snort snapshot version might be.

                    Makes sense. Thanks for the quick response. I never made the connection of the snapshot version being tied to the binary version. I was thinking those were the daily/weekly updates. (facepalm).

                    I never really paid much attention to this when I briefly used Suricata before. I might just keep using Snort until they officially stop developing 2.9 like you mentioned yesterday. Thanks again.

                    B 1 Reply Last reply May 31, 2023, 9:43 PM Reply Quote 0
                    • B
                      bmeeks @DefenderLLC
                      last edited by bmeeks Jun 1, 2023, 1:00 AM May 31, 2023, 9:43 PM

                      @DefenderLLC said in Is Suricata package updates blocked by an internal decision?:

                      @bmeeks said in Is Suricata package updates blocked by an internal decision?:

                      @DefenderLLC said in Is Suricata package updates blocked by an internal decision?:

                      @bmeeks Question regarding the use of the Snort paid subscriber rules. This is an older image I just downloaded, but is there a way for Suricata to always use the current snapshot filename rather than having to enter the filename manually after Cisco/Talos updates it?

                      One thing I like about the Snort package is that you don't have to keep up with this. Thanks.

                      No, how would Suricata know what the current Snort snapshot version is?

                      The Snort binary is locked to the rules version. You can't use a Snort rules snapshot file that has a different version than the Snort binary with Snort. So, Snort simply downloads the file that matches its internal binary version. That's how it always uses the most recent snapshot.

                      Suricata can't do that because it has no way to know what the current Snort snapshot version might be.

                      Makes sense. Thanks for the quick response. I never made the connection of the snapshot version being tied to the binary version. I was thinking those were the daily/weekly updates. (facepalm).

                      I never really paid much attention to this when I briefly used Suricata before. I might just keep using Snort until they officially stop developing 2.9 like you mentioned yesterday. Thanks again.

                      It's pretty simple to keep the most current Snort rules with Suricata. Simply visit https://snort.org, log in with your account credentials, and check what the most recent 2.9.x snapshot file version is. It will only change when there is a major change to the Snort binary. For the 2.9.x branch, changes are down to maybe one per year (if that).

                      Here is a Sticky Post link I created sometime back describing the process: https://forum.netgate.com/topic/110325/using-snort-vrt-rules-with-suricata-and-keeping-them-updated.

                      But note that when using Snort rules with Suricata it is normal for several of them to cause syntax errors and fail to load. Several hundred of the Snort VRT rules are incompatible with Suricata. But Suricata will simply print an error when loading those rules and skip them.

                      D 1 Reply Last reply May 31, 2023, 10:41 PM Reply Quote 1
                      • D
                        DefenderLLC @bmeeks
                        last edited by May 31, 2023, 10:41 PM

                        @bmeeks Thank you, Mr. Meeks.

                        1 Reply Last reply Reply Quote 0
                        14 out of 15
                        • First post
                          14/15
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
                          This community forum collects and processes your personal information.
                          consent.not_received