Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Suricata process dying due to hyperscan problem

    Scheduled Pinned Locked Moved IDS/IPS
    295 Posts 25 Posters 111.4k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • bmeeksB
      bmeeks @tylerevers
      last edited by

      @tylerevers said in Suricata process dying due to hyperscan problem:

      @bmeeks

      Reconfirm Hyperscan Still Crashes

      Block Offenders = On
      Signature Group Header MPM Context = Auto
      Pattern Matcher Algorithm = Auto

      Interface failed with error:

      [101378 - W#07] 2023-11-29 12:54:32 Error: spm-hs: Hyperscan returned fatal error -1.
      

      Test with Block Offenders Off
      Block Offenders = Off
      Signature Group Header MPM Context = Auto
      Pattern Matcher Algorithm = Auto

      It has been three hours without a crash.

      How long does it typically take to crash? Is three hours of runtime quite a bit longer than you were getting with blocking enabled?

      tylereversT 1 Reply Last reply Reply Quote 0
      • tylereversT
        tylerevers @bmeeks
        last edited by

        @bmeeks said in Suricata process dying due to hyperscan problem:

        @tylerevers said in Suricata process dying due to hyperscan problem:

        @bmeeks

        Reconfirm Hyperscan Still Crashes

        Block Offenders = On
        Signature Group Header MPM Context = Auto
        Pattern Matcher Algorithm = Auto

        Interface failed with error:

        [101378 - W#07] 2023-11-29 12:54:32 Error: spm-hs: Hyperscan returned fatal error -1.
        

        Test with Block Offenders Off
        Block Offenders = Off
        Signature Group Header MPM Context = Auto
        Pattern Matcher Algorithm = Auto

        It has been three hours without a crash.

        How long does it typically take to crash? Is three hours of runtime quite a bit longer than you were getting with blocking enabled?

        Yes, three hours is in the realm of 3-8x longer (and it still hasn't crashed yet ~9 hours total).

        bmeeksB 1 Reply Last reply Reply Quote 0
        • bmeeksB
          bmeeks @tylerevers
          last edited by

          @tylerevers said in Suricata process dying due to hyperscan problem:

          @bmeeks said in Suricata process dying due to hyperscan problem:

          @tylerevers said in Suricata process dying due to hyperscan problem:

          @bmeeks

          Reconfirm Hyperscan Still Crashes

          Block Offenders = On
          Signature Group Header MPM Context = Auto
          Pattern Matcher Algorithm = Auto

          Interface failed with error:

          [101378 - W#07] 2023-11-29 12:54:32 Error: spm-hs: Hyperscan returned fatal error -1.
          

          Test with Block Offenders Off
          Block Offenders = Off
          Signature Group Header MPM Context = Auto
          Pattern Matcher Algorithm = Auto

          It has been three hours without a crash.

          How long does it typically take to crash? Is three hours of runtime quite a bit longer than you were getting with blocking enabled?

          Yes, three hours is in the realm of 3-8x longer (and it still hasn't crashed yet ~9 hours total).

          Well, now I need to figure out how in the world the custom blocking module code could possibly interact with the Hyperscan library 😕.

          It makes no sense as they are not even remotely related.

          C 1 Reply Last reply Reply Quote 1
          • C
            chrysmon @bmeeks
            last edited by

            @bmeeks Can confirm that in IDS mode (no blocking) suricata has no crashes. In IPS mode it crashes. Hyperscan, no VLANS.

            1 Reply Last reply Reply Quote 1
            • bmeeksB bmeeks referenced this topic on
            • A
              asdjklfjkdslfdsaklj @bmeeks
              last edited by

              @bmeeks swapped, same result. Instance on interface w/blocking disabled remains up, other died.

              bmeeksB 1 Reply Last reply Reply Quote 0
              • bmeeksB
                bmeeks @asdjklfjkdslfdsaklj
                last edited by

                @asdjklfjkdslfdsaklj said in Suricata process dying due to hyperscan problem:

                @bmeeks swapped, same result. Instance on interface w/blocking disabled remains up, other died.

                Thank you. This is very helpful. It tells me that somehow the custom blocking module is part of the issue.

                I will need to dig into the code and see if something pops out. It will be a few days, though, before I can generate debug versions of the package because the ESXi host that contained all my pfSense package builders and private testing repo crashed and burned last Sunday morning due to a power blip and my UPS failing at the same time. Something is weird with the UPS. It shows the battery as good, but if power blips it drops the load. I will need to get a new one. I've started the process of rebuilding my test environment on that host, but it's going to take a few days. Also have some other non-related obligations over the next 4 days that interfere with the effort.

                tylereversT S 2 Replies Last reply Reply Quote 1
                • tylereversT
                  tylerevers @bmeeks
                  last edited by

                  @bmeeks said in Suricata process dying due to hyperscan problem:

                  @asdjklfjkdslfdsaklj said in Suricata process dying due to hyperscan problem:

                  @bmeeks swapped, same result. Instance on interface w/blocking disabled remains up, other died.

                  Thank you. This is very helpful. It tells me that somehow the custom blocking module is part of the issue.

                  I will need to dig into the code and see if something pops out. It will be a few days, though, before I can generate debug versions of the package because the ESXi host that contained all my pfSense package builders and private testing repo crashed and burned last Sunday morning due to a power blip and my UPS failing at the same time. Something is weird with the UPS. It shows the battery as good, but if power blips it drops the load. I will need to get a new one. I've started the process of rebuilding my test environment on that host, but it's going to take a few days. Also have some other non-related obligations over the next 4 days that interfere with the effort.

                  Godspeed to you, sir. Best wishes in all things.

                  1 Reply Last reply Reply Quote 0
                  • S
                    SteveITS Galactic Empire @bmeeks
                    last edited by

                    @bmeeks said in Suricata process dying due to hyperscan problem:

                    battery as good, but if power blips it drops the load

                    FWIW we see that a lot on older batteries, or I suppose defective ones. In our experience the UPS "self test" works to proactively alert the majority of the time but a decent amount the self test will trigger a power failure because the battery can't handle the load for the 2 seconds. :( And by "older" I mean over 4-5 years.

                    Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                    When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
                    Upvote 👍 helpful posts!

                    bmeeksB 1 Reply Last reply Reply Quote 0
                    • bmeeksB
                      bmeeks @SteveITS
                      last edited by

                      @SteveITS said in Suricata process dying due to hyperscan problem:

                      @bmeeks said in Suricata process dying due to hyperscan problem:

                      battery as good, but if power blips it drops the load

                      FWIW we see that a lot on older batteries, or I suppose defective ones. In our experience the UPS "self test" works to proactively alert the majority of the time but a decent amount the self test will trigger a power failure because the battery can't handle the load for the 2 seconds. :( And by "older" I mean over 4-5 years.

                      I suspect a defective battery at some level. It is a Tripp-Lite. My favorite is APC, and I think that's what I will go back with.

                      1 Reply Last reply Reply Quote 0
                      • C
                        chrysmon
                        last edited by

                        Again I want to mention that suricata works fine (on my system at least) in IPS mode with AC-BS Pattern Match instead the default (Hyperscan). This may help the developers to find the bug and the users to stay protected.

                        A 1 Reply Last reply Reply Quote 0
                        • A
                          ajohnson353 @chrysmon
                          last edited by

                          @chrysmon I am seeing the same thing in AC mode. It has yet to die since making the switch.

                          C 1 Reply Last reply Reply Quote 0
                          • C
                            chrysmon @ajohnson353
                            last edited by

                            @ajohnson353 said in Suricata process dying due to hyperscan problem:

                            @chrysmon I am seeing the same thing in AC mode. It has yet to die since making the switch.

                            If I remember well, mine was not working in AC mode. Let it run for longer time to be sure.

                            1 Reply Last reply Reply Quote 0
                            • bmeeksB
                              bmeeks
                              last edited by bmeeks

                              Wonder if this might be the source of the mysterious Hyperscan bug we are seeing in Suricata?

                              https://www.freebsd.org/security/advisories/FreeBSD-EN-23:15.sanitizer.asc

                              If so, that would explain a lot of the weirdness. I will keep tabs on this. Thanks to @RobbieTT for the link in another thread unreleated to Suricata.

                              M S 2 Replies Last reply Reply Quote 1
                              • M
                                masons @bmeeks
                                last edited by

                                @bmeeks said in Suricata process dying due to hyperscan problem:

                                Wonder if this might be the source of the mysterious Hyperscan bug we are seeing in Suricata?

                                https://www.freebsd.org/security/advisories/FreeBSD-EN-23:15.sanitizer.asc

                                @bmeeks,

                                The two machines I posted about earlier, are both running with the default hyperscan enabled and with legacy blocking mode enabled. Both machines have not experienced a Suricata core dump since I disabled ASLR for the Suricata binary. Thus it seems increasingly plausible that the root of the issue is linked to ASLR and the link above about the LLVM sanitizer could certainly explain why this has suddenly happened.

                                kiokomanK 1 Reply Last reply Reply Quote 0
                                • kiokomanK
                                  kiokoman LAYER 8 @masons
                                  last edited by

                                  @bmeeks
                                  proccontrol -m aslr -s disable /usr/local/bin/suricata -i vmx2 -D -c /usr/local/etc/suricata/suricata_28559_vmx2/suricata.yaml --pidfile /var/run/suricata_vmx228559.pid

                                  [1022863 - RX#01-vmx2] 2023-12-03 20:36:32 Info: pcap: vmx2: snaplen set to 1518
                                  [600532 - Suricata-Main] 2023-12-03 20:36:32 Notice: threads: Threads created -> RX: 1 W: 8 FM: 1 FR: 1 Engine started.
                                  [1022863 - RX#01-vmx2] 2023-12-03 20:36:35 Info: checksum: No packets with invalid checksum, assuming checksum offloading is NOT used
                                  [1022865 - W#02] 2023-12-03 20:36:41 Error: spm-hs: Hyperscan returned fatal error -1.
                                  [1022866 - W#03] 2023-12-03 20:36:41 Error: spm-hs: Hyperscan returned fatal error -1.

                                  no luck for me

                                  ̿' ̿'\̵͇̿̿\з=(◕_◕)=ε/̵͇̿̿/'̿'̿ ̿
                                  Please do not use chat/PM to ask for help
                                  we must focus on silencing this @guest character. we must make up lies and alter the copyrights !
                                  Don't forget to Upvote with the 👍 button for any post you find to be helpful.

                                  1 Reply Last reply Reply Quote 0
                                  • S
                                    sgnoc
                                    last edited by

                                    I tried to disable the ASLR on my system to test, but it caused the whole system to become unresponsive and I had to do a forced power cycle and revert back. Not sure what happened, since the logs only show suricata coming back online on the interfaces and then no logs until the reboot. I shut down the suricata processes before running "elfctl -e +noaslr /usr/local/bin/suricata" and then restarted the suricata interfaces. So no luck on my end testing with disabled ASLR.

                                    1 Reply Last reply Reply Quote 0
                                    • S
                                      SteveITS Galactic Empire @bmeeks
                                      last edited by

                                      @bmeeks I noticed this in another thread:

                                      @jimp said in Major DNS Bug 23.01 with Quad9 on SSL:

                                      While we are likely to include the patch from that EN in future builds it isn't relevant to Unbound.

                                      They only use those sanitizers for debug/test builds and not for normal/production builds.

                                      Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                                      When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
                                      Upvote 👍 helpful posts!

                                      1 Reply Last reply Reply Quote 0
                                      • JonathanLeeJ
                                        JonathanLee
                                        last edited by JonathanLee

                                        Hello fellow Netgate community members,

                                        I recently learned that Snort and Suricata's maintainer does all this work you what you see here unpaid. I opened a ticket to have a Wikipedia type donate to maintainer button on all 3rd party packages. I personally want to send some money to maintainers. If you also feel the same way please respond to this Redmine.

                                        https://redmine.pfsense.org/issues/15056

                                        Happy Holidays.

                                        Make sure to upvote

                                        1 Reply Last reply Reply Quote 1
                                        • P
                                          paulp
                                          last edited by

                                          Hello, I also have the same problem, I tried all the recommendations proposed on this topic, but without success.
                                          However, I noticed that the problem only occurs on the network interfaces with higher traffic and not on the interfaces with low traffic.

                                          I have a Pfsense 23.09 installed on a Hyper-V machine, so no VLANS.
                                          There are 6 network cards (without VLANS).

                                          Initially Suricata was active only on the WAN and it deactivates after an interval between 1 hour and 7-8 hours.
                                          For testing I enabled Suricata on all interfaces. And I noticed that now it stops only on the WAN interface and the LAN interface on which the network traffic is higher. Suricata never stops on the interfaces where the traffic is very low.

                                          1 Reply Last reply Reply Quote 0
                                          • tgm-itsT
                                            tgm-its
                                            last edited by tgm-its

                                            Hi all.
                                            It seems I get the same bugger of an error and Suricata stopes running on (yes you guessed it) one interface.
                                            I've read through most of the post here without finding a solution.
                                            Is there a solution? Or?

                                            So what is next? A patch? Or an Update?

                                            I'm on pFSense 2.7.1 and Suricata 7.0.2_1.

                                            And yes, is there a way to turn off e Hyperscan system so that Suricata runs without it?

                                            Paal B.

                                            kiokomanK bmeeksB 2 Replies Last reply Reply Quote 1
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.