Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Suricata process dying due to hyperscan problem

    Scheduled Pinned Locked Moved IDS/IPS
    295 Posts 25 Posters 94.3k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • A
      asdjklfjkdslfdsaklj @bmeeks
      last edited by

      @bmeeks said in Suricata process dying due to hyperscan problem:

      @asdjklfjkdslfdsaklj said in Suricata process dying due to hyperscan problem:

      @bmeeks anecdotally, yes. ~8hrs after disabling blocking mode and both LAN PHY Suricata instances are still up.

      1. I need to know if you have any VLAN configured on either LAN interface.

      2. Try enabling Blocking Mode on just one of the LAN interfaces and see what happens then.

      To help me troubleshoot this, I desparately need you folks having the issue to give me some explicit details when responding. For example, answer question #1 above and also try troubleshooting suggestion #2 above. Then follow up back here with detailed results for each.

      I will repeat again for clarity: I am trying to determine if VLANs configured on the crashing interface are related or not. So, tell me if you have VLANs on the interface, and if you do, how many. Then tell me if you can relate the crash to blocking enabled or not.

      1. No VLANs.

      2. Enabled blocking mode on LAN 1, disabled bon LAN 2.

      Both ran for a few hours, and eventually LAN 1 died (same hyperscan error), while LAN 2 remains up.

      bmeeksB 1 Reply Last reply Reply Quote 0
      • tylereversT
        tylerevers @bmeeks
        last edited by

        @bmeeks

        Reconfirm Hyperscan Still Crashes

        Block Offenders = On
        Signature Group Header MPM Context = Auto
        Pattern Matcher Algorithm = Auto

        Interface failed with error:

        [101378 - W#07] 2023-11-29 12:54:32 Error: spm-hs: Hyperscan returned fatal error -1.
        

        Test with Block Offenders Off
        Block Offenders = Off
        Signature Group Header MPM Context = Auto
        Pattern Matcher Algorithm = Auto

        It has been three hours without a crash.

        bmeeksB 1 Reply Last reply Reply Quote 0
        • bmeeksB
          bmeeks @asdjklfjkdslfdsaklj
          last edited by

          @asdjklfjkdslfdsaklj said in Suricata process dying due to hyperscan problem:

          Both ran for a few hours, and eventually LAN 1 died (same hyperscan error), while LAN 2 remains up.

          Okay, now swap the blocking mode around. Disable blocking on LAN 1 and Enable blocking on LAN 2. Let's see if the hyperscan error moves over to LAN 2 and it now crashes while LAN 1 remains stable.

          If the problem does not move to LAN 1, then that would tend to take blocking mode out of the picture unless it takes that in combination with something else to trigger the hyperscan crash.

          A 1 Reply Last reply Reply Quote 0
          • bmeeksB
            bmeeks @tylerevers
            last edited by

            @tylerevers said in Suricata process dying due to hyperscan problem:

            @bmeeks

            Reconfirm Hyperscan Still Crashes

            Block Offenders = On
            Signature Group Header MPM Context = Auto
            Pattern Matcher Algorithm = Auto

            Interface failed with error:

            [101378 - W#07] 2023-11-29 12:54:32 Error: spm-hs: Hyperscan returned fatal error -1.
            

            Test with Block Offenders Off
            Block Offenders = Off
            Signature Group Header MPM Context = Auto
            Pattern Matcher Algorithm = Auto

            It has been three hours without a crash.

            How long does it typically take to crash? Is three hours of runtime quite a bit longer than you were getting with blocking enabled?

            tylereversT 1 Reply Last reply Reply Quote 0
            • tylereversT
              tylerevers @bmeeks
              last edited by

              @bmeeks said in Suricata process dying due to hyperscan problem:

              @tylerevers said in Suricata process dying due to hyperscan problem:

              @bmeeks

              Reconfirm Hyperscan Still Crashes

              Block Offenders = On
              Signature Group Header MPM Context = Auto
              Pattern Matcher Algorithm = Auto

              Interface failed with error:

              [101378 - W#07] 2023-11-29 12:54:32 Error: spm-hs: Hyperscan returned fatal error -1.
              

              Test with Block Offenders Off
              Block Offenders = Off
              Signature Group Header MPM Context = Auto
              Pattern Matcher Algorithm = Auto

              It has been three hours without a crash.

              How long does it typically take to crash? Is three hours of runtime quite a bit longer than you were getting with blocking enabled?

              Yes, three hours is in the realm of 3-8x longer (and it still hasn't crashed yet ~9 hours total).

              bmeeksB 1 Reply Last reply Reply Quote 0
              • bmeeksB
                bmeeks @tylerevers
                last edited by

                @tylerevers said in Suricata process dying due to hyperscan problem:

                @bmeeks said in Suricata process dying due to hyperscan problem:

                @tylerevers said in Suricata process dying due to hyperscan problem:

                @bmeeks

                Reconfirm Hyperscan Still Crashes

                Block Offenders = On
                Signature Group Header MPM Context = Auto
                Pattern Matcher Algorithm = Auto

                Interface failed with error:

                [101378 - W#07] 2023-11-29 12:54:32 Error: spm-hs: Hyperscan returned fatal error -1.
                

                Test with Block Offenders Off
                Block Offenders = Off
                Signature Group Header MPM Context = Auto
                Pattern Matcher Algorithm = Auto

                It has been three hours without a crash.

                How long does it typically take to crash? Is three hours of runtime quite a bit longer than you were getting with blocking enabled?

                Yes, three hours is in the realm of 3-8x longer (and it still hasn't crashed yet ~9 hours total).

                Well, now I need to figure out how in the world the custom blocking module code could possibly interact with the Hyperscan library 😕.

                It makes no sense as they are not even remotely related.

                C 1 Reply Last reply Reply Quote 1
                • C
                  chrysmon @bmeeks
                  last edited by

                  @bmeeks Can confirm that in IDS mode (no blocking) suricata has no crashes. In IPS mode it crashes. Hyperscan, no VLANS.

                  1 Reply Last reply Reply Quote 1
                  • bmeeksB bmeeks referenced this topic on
                  • A
                    asdjklfjkdslfdsaklj @bmeeks
                    last edited by

                    @bmeeks swapped, same result. Instance on interface w/blocking disabled remains up, other died.

                    bmeeksB 1 Reply Last reply Reply Quote 0
                    • bmeeksB
                      bmeeks @asdjklfjkdslfdsaklj
                      last edited by

                      @asdjklfjkdslfdsaklj said in Suricata process dying due to hyperscan problem:

                      @bmeeks swapped, same result. Instance on interface w/blocking disabled remains up, other died.

                      Thank you. This is very helpful. It tells me that somehow the custom blocking module is part of the issue.

                      I will need to dig into the code and see if something pops out. It will be a few days, though, before I can generate debug versions of the package because the ESXi host that contained all my pfSense package builders and private testing repo crashed and burned last Sunday morning due to a power blip and my UPS failing at the same time. Something is weird with the UPS. It shows the battery as good, but if power blips it drops the load. I will need to get a new one. I've started the process of rebuilding my test environment on that host, but it's going to take a few days. Also have some other non-related obligations over the next 4 days that interfere with the effort.

                      tylereversT S 2 Replies Last reply Reply Quote 1
                      • tylereversT
                        tylerevers @bmeeks
                        last edited by

                        @bmeeks said in Suricata process dying due to hyperscan problem:

                        @asdjklfjkdslfdsaklj said in Suricata process dying due to hyperscan problem:

                        @bmeeks swapped, same result. Instance on interface w/blocking disabled remains up, other died.

                        Thank you. This is very helpful. It tells me that somehow the custom blocking module is part of the issue.

                        I will need to dig into the code and see if something pops out. It will be a few days, though, before I can generate debug versions of the package because the ESXi host that contained all my pfSense package builders and private testing repo crashed and burned last Sunday morning due to a power blip and my UPS failing at the same time. Something is weird with the UPS. It shows the battery as good, but if power blips it drops the load. I will need to get a new one. I've started the process of rebuilding my test environment on that host, but it's going to take a few days. Also have some other non-related obligations over the next 4 days that interfere with the effort.

                        Godspeed to you, sir. Best wishes in all things.

                        1 Reply Last reply Reply Quote 0
                        • S
                          SteveITS Galactic Empire @bmeeks
                          last edited by

                          @bmeeks said in Suricata process dying due to hyperscan problem:

                          battery as good, but if power blips it drops the load

                          FWIW we see that a lot on older batteries, or I suppose defective ones. In our experience the UPS "self test" works to proactively alert the majority of the time but a decent amount the self test will trigger a power failure because the battery can't handle the load for the 2 seconds. :( And by "older" I mean over 4-5 years.

                          Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                          When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
                          Upvote 👍 helpful posts!

                          bmeeksB 1 Reply Last reply Reply Quote 0
                          • bmeeksB
                            bmeeks @SteveITS
                            last edited by

                            @SteveITS said in Suricata process dying due to hyperscan problem:

                            @bmeeks said in Suricata process dying due to hyperscan problem:

                            battery as good, but if power blips it drops the load

                            FWIW we see that a lot on older batteries, or I suppose defective ones. In our experience the UPS "self test" works to proactively alert the majority of the time but a decent amount the self test will trigger a power failure because the battery can't handle the load for the 2 seconds. :( And by "older" I mean over 4-5 years.

                            I suspect a defective battery at some level. It is a Tripp-Lite. My favorite is APC, and I think that's what I will go back with.

                            1 Reply Last reply Reply Quote 0
                            • C
                              chrysmon
                              last edited by

                              Again I want to mention that suricata works fine (on my system at least) in IPS mode with AC-BS Pattern Match instead the default (Hyperscan). This may help the developers to find the bug and the users to stay protected.

                              A 1 Reply Last reply Reply Quote 0
                              • A
                                ajohnson353 @chrysmon
                                last edited by

                                @chrysmon I am seeing the same thing in AC mode. It has yet to die since making the switch.

                                C 1 Reply Last reply Reply Quote 0
                                • C
                                  chrysmon @ajohnson353
                                  last edited by

                                  @ajohnson353 said in Suricata process dying due to hyperscan problem:

                                  @chrysmon I am seeing the same thing in AC mode. It has yet to die since making the switch.

                                  If I remember well, mine was not working in AC mode. Let it run for longer time to be sure.

                                  1 Reply Last reply Reply Quote 0
                                  • bmeeksB
                                    bmeeks
                                    last edited by bmeeks

                                    Wonder if this might be the source of the mysterious Hyperscan bug we are seeing in Suricata?

                                    https://www.freebsd.org/security/advisories/FreeBSD-EN-23:15.sanitizer.asc

                                    If so, that would explain a lot of the weirdness. I will keep tabs on this. Thanks to @RobbieTT for the link in another thread unreleated to Suricata.

                                    M S 2 Replies Last reply Reply Quote 1
                                    • M
                                      masons @bmeeks
                                      last edited by

                                      @bmeeks said in Suricata process dying due to hyperscan problem:

                                      Wonder if this might be the source of the mysterious Hyperscan bug we are seeing in Suricata?

                                      https://www.freebsd.org/security/advisories/FreeBSD-EN-23:15.sanitizer.asc

                                      @bmeeks,

                                      The two machines I posted about earlier, are both running with the default hyperscan enabled and with legacy blocking mode enabled. Both machines have not experienced a Suricata core dump since I disabled ASLR for the Suricata binary. Thus it seems increasingly plausible that the root of the issue is linked to ASLR and the link above about the LLVM sanitizer could certainly explain why this has suddenly happened.

                                      kiokomanK 1 Reply Last reply Reply Quote 0
                                      • kiokomanK
                                        kiokoman LAYER 8 @masons
                                        last edited by

                                        @bmeeks
                                        proccontrol -m aslr -s disable /usr/local/bin/suricata -i vmx2 -D -c /usr/local/etc/suricata/suricata_28559_vmx2/suricata.yaml --pidfile /var/run/suricata_vmx228559.pid

                                        [1022863 - RX#01-vmx2] 2023-12-03 20:36:32 Info: pcap: vmx2: snaplen set to 1518
                                        [600532 - Suricata-Main] 2023-12-03 20:36:32 Notice: threads: Threads created -> RX: 1 W: 8 FM: 1 FR: 1 Engine started.
                                        [1022863 - RX#01-vmx2] 2023-12-03 20:36:35 Info: checksum: No packets with invalid checksum, assuming checksum offloading is NOT used
                                        [1022865 - W#02] 2023-12-03 20:36:41 Error: spm-hs: Hyperscan returned fatal error -1.
                                        [1022866 - W#03] 2023-12-03 20:36:41 Error: spm-hs: Hyperscan returned fatal error -1.

                                        no luck for me

                                        ̿' ̿'\̵͇̿̿\з=(◕_◕)=ε/̵͇̿̿/'̿'̿ ̿
                                        Please do not use chat/PM to ask for help
                                        we must focus on silencing this @guest character. we must make up lies and alter the copyrights !
                                        Don't forget to Upvote with the 👍 button for any post you find to be helpful.

                                        1 Reply Last reply Reply Quote 0
                                        • S
                                          sgnoc
                                          last edited by

                                          I tried to disable the ASLR on my system to test, but it caused the whole system to become unresponsive and I had to do a forced power cycle and revert back. Not sure what happened, since the logs only show suricata coming back online on the interfaces and then no logs until the reboot. I shut down the suricata processes before running "elfctl -e +noaslr /usr/local/bin/suricata" and then restarted the suricata interfaces. So no luck on my end testing with disabled ASLR.

                                          1 Reply Last reply Reply Quote 0
                                          • S
                                            SteveITS Galactic Empire @bmeeks
                                            last edited by

                                            @bmeeks I noticed this in another thread:

                                            @jimp said in Major DNS Bug 23.01 with Quad9 on SSL:

                                            While we are likely to include the patch from that EN in future builds it isn't relevant to Unbound.

                                            They only use those sanitizers for debug/test builds and not for normal/production builds.

                                            Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                                            When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
                                            Upvote 👍 helpful posts!

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.