Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Snort 2.9.2.3 pkg v. 2.4.2 Issues

    Scheduled Pinned Locked Moved pfSense Packages
    116 Posts 19 Posters 33.5k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • S
      sekular
      last edited by

      I just removed it completely and reinstalled and it is working ok now.

      1 Reply Last reply Reply Quote 0
      • J
        judex
        last edited by

        Just reinstalled and it seems to work so far.
        On rule update I noticed following Warning:

        Warning: unlink(/usr/local/etc/snort/tmp/so_rules): Operation not permitted in /usr/local/pkg/snort/snort_check_for_rule_updates.php on line 200

        2.1-RELEASE (amd64)
        built on Wed Sep 11 18:17:48 EDT 2013
        FreeBSD 8.3-RELEASE-p11

        1 Reply Last reply Reply Quote 0
        • M
          mschiek01
          last edited by

          @ermal:

          Please reinstall again in 30 minutes.
          You need a new binary again.

          I think i fixed the alert_pf issues with the ioctl.

          Ermal do have a fix for this:

          snort.sh start
          pgrep: Pidfile /var/run/snort_em064038.pid' is empty /libexec/ld-elf.so.1: /usr/local/lib/libpcre.so.1: unsupported file layout pgrep: Pidfile /var/run/snort_em124899.pid' is empty
          /libexec/ld-elf.so.1: /usr/local/lib/libpcre.so.1: unsupported file layout

          1 Reply Last reply Reply Quote 0
          • E
            eri--
            last edited by

            @mschiek01:

            @ermal:

            Please reinstall again in 30 minutes.
            You need a new binary again.

            I think i fixed the alert_pf issues with the ioctl.

            Ermal do have a fix for this:

            snort.sh start
            pgrep: Pidfile /var/run/snort_em064038.pid' is empty /libexec/ld-elf.so.1: /usr/local/lib/libpcre.so.1: unsupported file layout pgrep: Pidfile /var/run/snort_em124899.pid' is empty
            /libexec/ld-elf.so.1: /usr/local/lib/libpcre.so.1: unsupported file layout

            The first is not an error its ok to be there.

            For the other 2 i am unsure why you get them?

            What pfSense version are you?
            Does the installation of pacakges go well?

            1 Reply Last reply Reply Quote 0
            • E
              eri--
              last edited by

              @judex:

              Just reinstalled and it seems to work so far.
              On rule update I noticed following Warning:

              Warning: unlink(/usr/local/etc/snort/tmp/so_rules): Operation not permitted in /usr/local/pkg/snort/snort_check_for_rule_updates.php on line 200

              Should be fixed in about 30 minutes.

              1 Reply Last reply Reply Quote 0
              • M
                miles267
                last edited by

                Alert descriptions on the snort Blocked tab are once again N/A in the latest build.  Please correct this in the next snort build.  Thanks!

                1 Reply Last reply Reply Quote 0
                • J
                  judex
                  last edited by

                  The new (?) "add to suppress list" feature ist great.
                  But could you please revert back the sorting on alerts page? It is not great to scroll down all alerts to see the last one.

                  Thx for your efforts ermal!

                  EDIT: If you modify the number of log entries on the alerts page, they get cut off showing for example only the oldest 50, not the newest 50 due to the new sort order.

                  2.1-RELEASE (amd64)
                  built on Wed Sep 11 18:17:48 EDT 2013
                  FreeBSD 8.3-RELEASE-p11

                  1 Reply Last reply Reply Quote 0
                  • D
                    dwood
                    last edited by

                    latest 2.4.2 is working.  Love the + add to suppress list on Alerts page :-)

                    Descriptions under blocking though read N/A.

                    Cheers,
                    Dennis.

                    1 Reply Last reply Reply Quote 0
                    • M
                      mdima
                      last edited by

                      Hi Ermal, Hello everybody,
                          just woke up and updated snort, everything looks working great! Thanks a lot!!

                      I will keep an eye on it for the next couple of days, if I notice something strange I will report it!

                      Thanks again,
                      Michele

                      1 Reply Last reply Reply Quote 0
                      • J
                        judex
                        last edited by

                        On the interfaces rules page we still have the problem, that not all categories show up.

                        EDIT: Sorry for that - just realized that only activated categories show up which is ok. Problem left is you can not preview the rules of a category, if you do not activate it first.

                        2.1-RELEASE (amd64)
                        built on Wed Sep 11 18:17:48 EDT 2013
                        FreeBSD 8.3-RELEASE-p11

                        1 Reply Last reply Reply Quote 0
                        • F
                          Fesoj
                          last edited by

                          Updating worked && the categories show up for each interface.

                          My current problems are:
                          (1) Blocking does not work (on ET rules)
                          (2) Snort seems to be active only on the first interface (no alert messages for the 2nd one), independent on whether blocking is enabled or not.

                          1 Reply Last reply Reply Quote 0
                          • J
                            judex
                            last edited by

                            @Fesoj: strange - on my 2.0.1 amd64 system the ET rules trigger blocking also…

                            2.1-RELEASE (amd64)
                            built on Wed Sep 11 18:17:48 EDT 2013
                            FreeBSD 8.3-RELEASE-p11

                            1 Reply Last reply Reply Quote 0
                            • C
                              Cino
                              last edited by

                              @ermal Great work!!! So far so good.. Its alerting and blocking.

                              Issues I've noticed
                              1: Have the alert description show up on the block page. I noticed you did some tweaks for the snort binary.. Hopefully when its built, it will resolve this.

                              2: On the alert page, Priority Column is grabbing data from the date time-stamp with seconds. Noticed the time-stamp is in the alert file a couple of times.. I don't see Priority in the new alert file format. Not sure if its used/or how by other users. I do miss the classification column tho

                              
                              New Alert Format
                              07/15-08:07:58.167280 ,1,2402001,2666,"ET DROP Dshield Block Listed Source",UDP,69.175.126.170,33137,x.x.x.x,1900,0,07/15-08:07:58.167280 ,07/15-08:07:58.167280 ,
                              
                              Old Alert Format
                              [**] [1:2402000:2650] ET DROP Dshield Block Listed Source [**]
                              [Classification: Misc Attack] [Priority: 2] 
                              07/01-11:04:.200:16189 -> x.x.x.x:22
                              TCP TTL:117 TOS:0x0 ID:10183 IpLen:20 DgmLen:48
                              ******S* Seq: 0x3932295A  Ack: 0x661A02CF  Win: 0xFFFF  TcpLen: 28
                              TCP Options (4) => MSS: 1460 NOP NOP SackOK 
                              [Xref => http://feeds.dshield.org/block.txt]
                              
                              

                              Hoping the new binary will resolve this issue too

                              3: Not sure if this is needed but I noticed the Default HOME_NET doesn't include the LAN subnet. Only the LAN IP of pfSense..

                              4: Clear Alert log only works for first interface, doesn't clear them for 2nd one

                              A couple of little things to tweak I think
                              1: Someone else brought this up, enable sorting within the alert page.. And IMHO i would have default sorting as last alert, not first alert

                              2: IMHO I think SRC/DST Ports should be put back into separate columns. The log format would be cleaner and allow sorting

                              3: Use the same font/size that used for the whitelist edit page for the suppress edit page

                              4: Folders/file names are not consistent,should follow this as an example: snort_60770_em3

                              
                              Folders:
                              /var/log/snort/snort_em360770
                              Files:
                              /var/run/snort_em360770.pid
                              
                              

                              Future add-on
                              This would be really nice but I know its not in-scope right now
                              http://forum.pfsense.org/index.php/topic,42994.0.html

                              PS.  Its able to detect and block IPv6 addresses, still tweaking my NETLIST for it tho.. I've notice IPv6 address show up in the block list, which is really good! No more looking at the snort2c table.

                              1 Reply Last reply Reply Quote 0
                              • F
                                Fesoj
                                last edited by

                                @Fesoj: strange - on my 2.0.1 amd64 system the ET rules trigger blocking also…

                                judex: does blocking work on your system, or does it not work?

                                1 Reply Last reply Reply Quote 0
                                • J
                                  judex
                                  last edited by

                                  On my system it works.

                                  2.1-RELEASE (amd64)
                                  built on Wed Sep 11 18:17:48 EDT 2013
                                  FreeBSD 8.3-RELEASE-p11

                                  1 Reply Last reply Reply Quote 0
                                  • F
                                    Fesoj
                                    last edited by

                                    On the 2nd interface (LAN side) I found the following error message:

                                    Jul 15 14:53:56 snort[62849]: FATAL ERROR: Unable to load pf args: No such file or directory

                                    I think I'll reinstall the package.

                                    1 Reply Last reply Reply Quote 0
                                    • B
                                      breusshe
                                      last edited by

                                      @ermal:

                                      @breusshe:

                                      @ermal:

                                      Can you put the alert file here and tell me if its full alert style logging or fast?

                                      There is no more alert type.  There was until I removed the package and reinstalled to see if that would fix the issues I'm seeing, but since then, no more alert type.  Tried uninstall and reinstall again (without saving snort xml configuration each time) with same results.  No alert type available.  I can also confirm other's findings that a good deal of the snort rules are not showing up any longer.  I also have a new one, I think.  I have snort configured twice on my WAN interface.  One for block only rules, one for alert only rules.  This worked fine until the v2.4.2 upgrade.  Now I can only have one instance of Snort per interface, so I can either have blocking rules or alert only rules, but not both.

                                      I do not understand the both instances and blocking vs alerting one?

                                      There are somethings on my interface that I know I want to block, so I block them.  However, other things I'm not so sure about so I just pop alerts so I can track frequency.  If they become too much of a problem, I move them to the blocking instance and tweak as needed to avoid issues with valid traffic no longer making through the interface.  Since the v.2.4.2 update, I could not save changes to either of my instances because they both used my WAN interface.  Two attempts at uninstalling and reinstalling Snort (without retaining my settings) did not fix this.  So, at this point, I only have one instance that blocks traffic on the WAN interface.  I'd like to get my alert interface back, as well.

                                      Does this help clear up what I'm doing and why?

                                      P.S. I reinstalled this morning and all of the Snort rules are showing up, so at least I can select all the ones that I wanted to block.

                                      1 Reply Last reply Reply Quote 0
                                      • C
                                        Cino
                                        last edited by

                                        there a couple of rules that are missing but I figured out what happen to them. They are preprocessors.. I would prefer sensitive data be an option that we can turn on or off.. At first I commented it out in snort.inc but because its rule file loads, snort failed to start.. I guess we could suppress them but wouldn't that mean memory would be wasted?

                                        @breusshe I thought of doing that a while ago…If it gets fix, let me know how it works for you.. I will have to try it.

                                        1 Reply Last reply Reply Quote 0
                                        • F
                                          Fesoj
                                          last edited by

                                          The fatal error

                                          Jul 15 14:53:56  snort[62849]: FATAL ERROR: Unable to load pf args: No such file or directory

                                          seems to occur randomly, but a manual restart of the interface works.

                                          So far I was not successful to make the snort p2p rules work.

                                          The ET p2p rules work on the WAN interface. Even blocking is working. On the LAN interface nothing is working: no alerts and blocking a fortiori. Maybe this is due to a different behavior of the latest snort version. It could be that the HOME_NET is always considered "white" such that no alerts occur, but this would mean that company policy violations can not be tracked (on the WAN side you would typically see only the gateway). Can somebody confirm this?

                                          1 Reply Last reply Reply Quote 0
                                          • D
                                            dwood
                                            last edited by

                                            Fesoj, saw the same error :```
                                            Jul 15 14:53:56  snort[62849]: FATAL ERROR: Unable to load pf args: No such file or directory

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.