Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Snort difficulties

    Scheduled Pinned Locked Moved pfSense Packages
    13 Posts 8 Posters 18.1k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • M
      morbus
      last edited by

      The problem is that in the latest snort rules someone has added flow tracking to rules for udp etc which can't be done by this snort version

      eg

      alert udp $EXTERNAL_NET any -> $HOME_NET 10080:10081 (msg:"SCAN Amanda client version request"; flow:to_client; content:"Amanda"; nocase; classtype:attempted-recon; sid:634; rev:3;)
      

      Note the flow:to_client; bit

      To fix it you need to find the offending line and remove the flow:to_client; bit

      You are right the bit in brackets in the error is the line in the rules file with the offending rule on it eg (41). This is not rule num 41 as there is loads of licence junk on the top of the file.

      To fix it I open the console then goto
      #cd /usr/local/etc/snort/rules/

      then open it in the bsd ee editor eg for scan.rules
      ee scan.rules
      Thie ee editor gives you the line num you are on near the top like this

      L: 41 C: 1 ====================================================================

      you could use the WebGUI edit file section but you will have to count the lines

      1 Reply Last reply Reply Quote 0
      • P
        plat0nic
        last edited by

        So how does this affect Snort as a whole for us?
        I'm guessing the rules with this new (currently unsupported) parameter will simply go unparsed after it whines about it in logs.

        1 Reply Last reply Reply Quote 0
        • M
          morbus
          last edited by

          Nope if snort gets one of these rules it c**ps is self and dies on startup and won't go until you fix or remove the rule

          1 Reply Last reply Reply Quote 0
          • P
            plat0nic
            last edited by

            Well shit.
            Time for an update =\

            1 Reply Last reply Reply Quote 0
            • N
              n1ko
              last edited by

              Anyway to avoid this? Maybe someone has an older / fixed ruleset uploaded somewhere we could use?

              Just re-installed (after an hdd failure) pfsense and I am now getting this too

              1 Reply Last reply Reply Quote 0
              • H
                Hilozer
                last edited by

                I believe I have found the problem. The snort package is attempting to use the rules for the current version of snort. However, the packaged version is 2.6. There are compatible rule files for the older versions of snort (http://www.snort.org/pub-bin/downloads.cgi). I made the following changes and it seems to have corrected the problems with the rules.

                Change /usr/local/www/snort_download_rules.php lines 182 and 183.

                $snort_filename = "snortrules-snapshot-CURRENT{$premium_subscriber}.tar.gz";
                $snort_filename_md5 = "snortrules-snapshot-CURRENT.tar.gz.md5";

                To

                $snort_filename = "snortrules-snapshot-2.6{$premium_subscriber}.tar.gz";
                $snort_filename_md5 = "snortrules-snapshot-2.6.tar.gz.md5";

                The best fix would probably be to update the snort package with the latest version of snort. However, this seems to allow the current version to work properly.

                Jim L.

                1 Reply Last reply Reply Quote 0
                • AhnHELA
                  AhnHEL
                  last edited by

                  Definitely fixed it Hilozer, many thanks.

                  A Snort Package Update would be fantastic.

                  AhnHEL (Angel)

                  1 Reply Last reply Reply Quote 0
                  • N
                    n1ko
                    last edited by

                    Fixed for me too, thanks a lot mate for the effort!

                    EDIT: weird thing here, now with a fresh install (on the same hdd/connection) snort uses more than 2x more cpu. Actually its hogging the hole machine. With the same settings (meaning ac-bnfa with the same rules) it didnt do this before. Wonder if its related to this ruleset or some other kind of bug.

                    My specs:

                    10mb/2.5mb dsl bridged to pfsense
                    PIII 866mhz
                    512mb sdram
                    3com 905 + rt8139
                    I know the rt8139 sucks, but it has been working fine for me since now.
                    I have an spare 905 card i could swap if it makes any difference

                    Any toughts?

                    …altough this is giving me an good excuse to upgrade this machine. pIII 866/512mb isnt that fast anyway.

                    1 Reply Last reply Reply Quote 0
                    • AhnHELA
                      AhnHEL
                      last edited by

                      I'm not seeing a problem with the latest ruleset.  Snort was blocking 4 IPs at the time of this screenshot.

                      top.jpg
                      top.jpg_thumb

                      AhnHEL (Angel)

                      1 Reply Last reply Reply Quote 0
                      • D
                        dpankros
                        last edited by

                        @Hilozer:

                        Change /usr/local/www/snort_download_rules.php lines 182 and 183.

                        $snort_filename = "snortrules-snapshot-CURRENT{$premium_subscriber}.tar.gz";
                        $snort_filename_md5 = "snortrules-snapshot-CURRENT.tar.gz.md5";

                        To

                        $snort_filename = "snortrules-snapshot-2.6{$premium_subscriber}.tar.gz";
                        $snort_filename_md5 = "snortrules-snapshot-2.6.tar.gz.md5";

                        The best fix would probably be to update the snort package with the latest version of snort. However, this seems to allow the current version to work properly.

                        It would be shame to fix it for manual updates only to have it replaced on the next auto-update.  Therefore, there is another place to change as well:
                        /usr/local/pkg/snort_check_for_rule_updates.php

                        The change is completely analogous to the quoted change and shouldn't need additional explanation.

                        Dave

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.