Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    [Solved] Snort GPLv2 Community Rules - Unable to download checksum file

    Scheduled Pinned Locked Moved IDS/IPS
    41 Posts 9 Posters 7.4k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • fireodoF
      fireodo @bmeeks
      last edited by fireodo

      @bmeeks

      Thank you very much, Bill, I bookmarked your explanation! (for the future when it becomes necessary - because I doubt that someone will do the work for Snort 3.0)

      Kettop Mi4300YL CPU: i5-4300Y @ 1.60GHz RAM: 8GB Ethernet Ports: 4
      SSD: SanDisk pSSD-S2 16GB (ZFS) WiFi: WLE200NX
      pfsense 2.7.2 CE
      Packages: Apcupsd Cron Iftop Iperf LCDproc Nmap pfBlockerNG RRD_Summary Shellcmd Snort Speedtest System_Patches.

      1 Reply Last reply Reply Quote 0
      • fireodoF
        fireodo @bmeeks
        last edited by fireodo

        @bmeeks said in [Solved] Snort GPLv2 Community Rules - Unable to download checksum file:

        @DefenderLLC said in [Solved] Snort GPLv2 Community Rules - Unable to download checksum file:

        The good news is that your suppression lists should also work too since they seem to use the same format.

        Correct. The format is exactly the same and you can simply copy and paste the text from your Snort lists into Suricata.

        Is there somewhere a file (maybe) where all the "User Forced Disabled Rules" reside? (Not the suppression list)

        Kettop Mi4300YL CPU: i5-4300Y @ 1.60GHz RAM: 8GB Ethernet Ports: 4
        SSD: SanDisk pSSD-S2 16GB (ZFS) WiFi: WLE200NX
        pfsense 2.7.2 CE
        Packages: Apcupsd Cron Iftop Iperf LCDproc Nmap pfBlockerNG RRD_Summary Shellcmd Snort Speedtest System_Patches.

        bmeeksB 1 Reply Last reply Reply Quote 0
        • bmeeksB
          bmeeks @fireodo
          last edited by

          @fireodo said in [Solved] Snort GPLv2 Community Rules - Unable to download checksum file:

          Is there somewhere a file (maybe) where all the "User Forced Disabled Rules" reside? (Not the suppression list)

          No, those live as encoded strings within the config.xml file of pfSense in the <packages><snort> section. And even the Suppress List resides there, but it does get written out as plaintext each time Snort is started. And it is visible as plaintext on the Suppress List edit tab, so it can easily be copied.

          Suricata stores its information the same way. So, if you are handy with recognizing how the XML configuration file of pfSense works, you can do a manual port of those settings.

          fireodoF 1 Reply Last reply Reply Quote 0
          • fireodoF
            fireodo @bmeeks
            last edited by fireodo

            @bmeeks said in [Solved] Snort GPLv2 Community Rules - Unable to download checksum file:

            @fireodo said in [Solved] Snort GPLv2 Community Rules - Unable to download checksum file:

            Is there somewhere a file (maybe) where all the "User Forced Disabled Rules" reside? (Not the suppression list)

            No, those live as encoded strings within the config.xml file of pfSense in the <packages><snort> section. And even the Suppress List resides there, but it does get written out as plaintext each time Snort is started. And it is visible as plaintext on the Suppress List edit tab, so it can easily be copied.

            Suricata stores its information the same way. So, if you are handy with recognizing how the XML configuration file of pfSense works, you can do a manual port of those settings.

            Aha, OK Thanks - I guess others are also interested in these Informations!

            I found in the config.xml at the coresponding interface:
            <rule_sid_off>{lots of sids}</rule_sid_off>
            I guess thats the place.

            Kettop Mi4300YL CPU: i5-4300Y @ 1.60GHz RAM: 8GB Ethernet Ports: 4
            SSD: SanDisk pSSD-S2 16GB (ZFS) WiFi: WLE200NX
            pfsense 2.7.2 CE
            Packages: Apcupsd Cron Iftop Iperf LCDproc Nmap pfBlockerNG RRD_Summary Shellcmd Snort Speedtest System_Patches.

            1 Reply Last reply Reply Quote 0
            • S
              slu @bmeeks
              last edited by

              @bmeeks said in [Solved] Snort GPLv2 Community Rules - Unable to download checksum file:

              At that point Suricata will be the IDS/IPS package on pfSense unless someone else steps up to provide a Snort3 package.

              The problem with Suricata was the missing OpenAppID function, or I'm not up-to-date and there is a solution?

              pfSense Gold subscription

              DefenderLLCD bmeeksB 2 Replies Last reply Reply Quote 0
              • DefenderLLCD
                DefenderLLC @slu
                last edited by DefenderLLC

                @slu said in [Solved] Snort GPLv2 Community Rules - Unable to download checksum file:

                @bmeeks said in [Solved] Snort GPLv2 Community Rules - Unable to download checksum file:

                At that point Suricata will be the IDS/IPS package on pfSense unless someone else steps up to provide a Snort3 package.

                The problem with Suricata was the missing OpenAppID function, or I'm not up-to-date and there is a solution?

                Suricata does not have layer 7 capabilities. You will lose OpenAppID functionality if you move away from Snort. This is the only reason I use Snort. I have Snort IPS configured with the "Security" role on the WAN and IDS on the LAN just to see the app flow. The OpenAppID rules don't really get updated all that often, so it's not going to be aware of newer app patterns. I'll keep using Snort until they stop developing subscriber rules for v2.9.

                1 Reply Last reply Reply Quote 0
                • bmeeksB
                  bmeeks @slu
                  last edited by bmeeks

                  @slu said in [Solved] Snort GPLv2 Community Rules - Unable to download checksum file:

                  The problem with Suricata was the missing OpenAppID function, or I'm not up-to-date and there is a solution?

                  Suricata does not have an exact analog of OpenAppID. However, there are several rule options in Suricata that could potentially help you duplicate some of the OpenAppID functionality. These rule options (keywords and modifiers) are not present in Snort.

                  The headache with Snort3 is that everything in it has changed from the ground up. It is written in a different programming language, and the internal APIs are all different. That would mean totally rewriting from the ground up the custom blocking module used for Legacy Mode operation on pfSense. The configuration parameters are also quite a bit different now as everything moved to LUA and there is no seamless "transition path" to easily migrate pfSense legacy Snort package settings over to the new Snort3 binary. Not saying it's impossible, but doing so is a ton of work. Most likely a Snort3 package for pfSense would require you to do a green field install without migrating any existing Snort 2.9.x settings.

                  After wrestling with all of the above, I realized that the ONLY thing Snort3 had that Suricata did not was OpenAppID. But in Suricata's favor it offers detailed TLS signature detection, extensive logging, visibility into DNS transactions, and much more. At the end of the day it made more sense to me to continue support for Suricata and not move forward with Snort3.

                  S 1 Reply Last reply Reply Quote 1
                  • S
                    slu @bmeeks
                    last edited by

                    @bmeeks said in [Solved] Snort GPLv2 Community Rules - Unable to download checksum file:

                    However, there are several rule options in Suricata that could potentially help you duplicate some of the OpenAppID functionality. These rule options (keywords and modifiers) are not present in Snort.

                    Is it possible to post one example?

                    @bmeeks said in [Solved] Snort GPLv2 Community Rules - Unable to download checksum file:

                    At the end of the day it made more sense to me to continue support for Suricata and not move forward with Snort3.

                    In this case it make sense to me moving forward to Suricata.

                    pfSense Gold subscription

                    bmeeksB 1 Reply Last reply Reply Quote 0
                    • bmeeksB
                      bmeeks @slu
                      last edited by bmeeks

                      @slu:
                      Here are some links I found on Google that describe using the SSL/TLS keywords:

                      https://forum.suricata.io/t/understanding-tls-sni-rules/1323

                      https://docs.suricata.io/en/suricata-6.0.13/rules/tls-keywords.html

                      You can basically create your own rules (or perhaps find someone offering a downloadable archive) that examine the SNI header for insight into the site the traffic is originating from or destined for. This is fundamentally what the OpenAppID feature in Snort does.

                      1 Reply Last reply Reply Quote 1
                      • DefenderLLCD
                        DefenderLLC
                        last edited by DefenderLLC

                        The community rules are back: https://www.snort.org/downloads#rules

                        8605de56-d4d6-4bcf-96c9-7f5c69e34db9-image.png

                        69f04bea-f17a-43e5-806d-659d0ca1d198-image.png

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.