Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Snort 2.9.2.3 pkg v. 2.4.2 Issues

    Scheduled Pinned Locked Moved pfSense Packages
    116 Posts 19 Posters 33.5k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • D
      dwood
      last edited by

      Fesoj, saw the same error :```
      Jul 15 14:53:56  snort[62849]: FATAL ERROR: Unable to load pf args: No such file or directory

      1 Reply Last reply Reply Quote 0
      • S
        simby
        last edited by

        fresh install pfsense + snort, and snort wont block any ip or send alert to snort log.

        what is the problem.

        PFsense x64 2.0.1

        1 Reply Last reply Reply Quote 0
        • F
          Fesoj
          last edited by

          simby:

          my current experience is that some rules work and others don't. It seems that I cannot activate a second interface. On the first interface (WAN side), only the emerging threat rules work (alerting & blocking), but not the snort rules. I have tested essentially only the p2p rules.

          What rules are you using?

          1 Reply Last reply Reply Quote 0
          • S
            simby
            last edited by

            ALL rules of snort premium & E.

            My snort is crashing on 2-5 min. from on to off  ???

            On 8GB memory and quad cpu

            1 Reply Last reply Reply Quote 0
            • S
              simby
              last edited by

              from system log:

              Jul 15 19:35:03 snort[40704]: FATAL ERROR: Unable to load pf args: Interrupted system call
              Jul 15 19:35:03 snort[40704]: FATAL ERROR: Unable to load pf args: Interrupted system call
              Jul 15 19:35:02 snort[40704]: [ Number of null byte prefixed patterns trimmed: 11328 ]
              Jul 15 19:35:02 snort[40704]: [ Number of null byte prefixed patterns trimmed: 11328 ]
              Jul 15 19:35:02 snort[40704]: +–-----------------------------------------------
              Jul 15 19:35:02 snort[40704]: +–-----------------------------------------------

              1 Reply Last reply Reply Quote 0
              • C
                Cino
                last edited by

                Added some more suggestions/issues to post http://forum.pfsense.org/index.php/topic,51387.msg275159.html#msg275159

                @breusshe

                If you dont mind changing commenting out some php code, you can get your 2nd WAN interface back:

                lines 82 and 83 in /usr/local/www/snort/snort_interfaces_edit.php

                make them look like this:

                
                #		if ($natent['interface'] == $_POST['interface'])
                #			$input_errors[] = "This interface is already configured for another instance";
                
                

                This allowed me to create another WAN interface, and it has a different ID:

                
                 ps -aux | grep snort
                root   61341 23.7    ??  Ss    1:56PM   0:01.29 /usr/pbi/snort-i386/bin/snort -R 36745 -D -q -l /var/log/snort/snort_em336745 --pid-path /var/run --nolock-pidfile -G 36745 -c /usr/
                root   59209  0.2    ??  Ss    1:54PM   0:01.13 /usr/pbi/snort-i386/bin/snort -R 60770 -D -q -l /var/log/snort/snort_em360770 --pid-path /var/run --nolock-pidfile -G 60770 -c /usr/
                root    3143  0.0  0.3 13048  8384  ??  Ss    1:54PM   0:00.06 /usr/local/bin/barnyard2 -r 60770 -f snort_60770_em3.u2 --pid-path /var/run --nolock-pidfile -c /usr/local/etc/snort/snort_60770_em3
                root   35410  0.0  0.0  3536  1256   0  S+    1:56PM   0:00.01 grep snort
                
                
                1 Reply Last reply Reply Quote 0
                • F
                  Fesoj
                  last edited by

                  simby:

                  have you tried deactivating all rules (such that only the preprocessors are active)?

                  The message

                  Jul 15 19:35:03    snort[40704]: FATAL ERROR: Unable to load pf args: Interrupted system call

                  has been observed by myself and others, but, after manually restarting the interface, snort remains stable (on my machine).

                  1 Reply Last reply Reply Quote 0
                  • E
                    eri--
                    last edited by

                    @Fesoj:

                    simby:

                    have you tried deactivating all rules (such that only the preprocessors are active)?

                    The message

                    Jul 15 19:35:03    snort[40704]: FATAL ERROR: Unable to load pf args: Interrupted system call

                    has been observed by myself and others, but, after manually restarting the interface, snort remains stable (on my machine).

                    Please reinstall the new binary this has been fixed.

                    1 Reply Last reply Reply Quote 0
                    • E
                      eri--
                      last edited by

                      @Cino:

                      Added some more suggestions/issues to post http://forum.pfsense.org/index.php/topic,51387.msg275159.html#msg275159

                      @breusshe

                      If you dont mind changing commenting out some php code, you can get your 2nd WAN interface back:

                      lines 82 and 83 in /usr/local/www/snort/snort_interfaces_edit.php

                      make them look like this:

                      
                      #		if ($natent['interface'] == $_POST['interface'])
                      #			$input_errors[] = "This interface is already configured for another instance";
                      
                      

                      This allowed me to create another WAN interface, and it has a different ID:

                      
                       ps -aux | grep snort
                      root   61341 23.7    ??  Ss    1:56PM   0:01.29 /usr/pbi/snort-i386/bin/snort -R 36745 -D -q -l /var/log/snort/snort_em336745 --pid-path /var/run --nolock-pidfile -G 36745 -c /usr/
                      root   59209  0.2    ??  Ss    1:54PM   0:01.13 /usr/pbi/snort-i386/bin/snort -R 60770 -D -q -l /var/log/snort/snort_em360770 --pid-path /var/run --nolock-pidfile -G 60770 -c /usr/
                      root    3143  0.0  0.3 13048  8384  ??  Ss    1:54PM   0:00.06 /usr/local/bin/barnyard2 -r 60770 -f snort_60770_em3.u2 --pid-path /var/run --nolock-pidfile -c /usr/local/etc/snort/snort_60770_em3
                      root   35410  0.0  0.0  3536  1256   0  S+    1:56PM   0:00.01 grep snort
                      
                      

                      Use event_filter configurations for this it makes no sense to do this!

                      1 Reply Last reply Reply Quote 0
                      • E
                        eri--
                        last edited by

                        @Cino:

                        @ermal Great work!!! So far so good.. Its alerting and blocking.

                        Issues I've noticed
                        1: Have the alert description show up on the block page. I noticed you did some tweaks for the snort binary.. Hopefully when its built, it will resolve this.

                        Still checking on this

                        2: On the alert page, Priority Column is grabbing data from the date time-stamp with seconds. Noticed the time-stamp is in the alert file a couple of times.. I don't see Priority in the new alert file format. Not sure if its used/or how by other users. I do miss the classification column tho

                        With new binary this should be ok, if not shout.

                        
                        New Alert Format
                        07/15-08:07:58.167280 ,1,2402001,2666,"ET DROP Dshield Block Listed Source",UDP,69.175.126.170,33137,x.x.x.x,1900,0,07/15-08:07:58.167280 ,07/15-08:07:58.167280 ,
                        
                        Old Alert Format
                        [**] [1:2402000:2650] ET DROP Dshield Block Listed Source [**]
                        [Classification: Misc Attack] [Priority: 2] 
                        07/01-11:04:.200:16189 -> x.x.x.x:22
                        TCP TTL:117 TOS:0x0 ID:10183 IpLen:20 DgmLen:48
                        ******S* Seq: 0x3932295A  Ack: 0x661A02CF  Win: 0xFFFF  TcpLen: 28
                        TCP Options (4) => MSS: 1460 NOP NOP SackOK 
                        [Xref => http://feeds.dshield.org/block.txt]
                        
                        

                        Hoping the new binary will resolve this issue too

                        3: Not sure if this is needed but I noticed the Default HOME_NET doesn't include the LAN subnet. Only the LAN IP of pfSense..

                        That is how i think it should be.
                        There is no reason to trust your lan is there?
                        From my side its there just because old code put the ips of all interfaces, it should only put the ip of the interface its listening on!
                        Though i just still thinking about doing that change.

                        4: Clear Alert log only works for first interface, doesn't clear them for 2nd one

                        Should be fixed

                        A couple of little things to tweak I think
                        1: Someone else brought this up, enable sorting within the alert page.. And IMHO i would have default sorting as last alert, not first alert

                        Done

                        2: IMHO I think SRC/DST Ports should be put back into separate columns. The log format would be cleaner and allow sorting

                        done

                        3: Use the same font/size that used for the whitelist edit page for the suppress edit page

                        Not sure here displays fine!

                        4: Folders/file names are not consistent,should follow this as an example: snort_60770_em3

                        
                        Folders:
                        /var/log/snort/snort_em360770
                        Files:
                        /var/run/snort_em360770.pid
                        
                        

                        I would like to remove the interface from the paths but just want do it.
                        And anyway its backend.

                        Future add-on
                        This would be really nice but I know its not in-scope right now
                        http://forum.pfsense.org/index.php/topic,42994.0.html

                        Not from me.
                        Use barnyard or something else for that. I consider that in depth analysis.

                        PS.  Its able to detect and block IPv6 addresses, still tweaking my NETLIST for it tho.. I've notice IPv6 address show up in the block list, which is really good! No more looking at the snort2c table.

                        Will add soon.

                        1 Reply Last reply Reply Quote 0
                        • E
                          eri--
                          last edited by

                          BTW, where are my donations?

                          For those who want to donate please go to http://www.pfsense.org/index.php?option=com_content&task=view&id=47&Itemid=77

                          1 Reply Last reply Reply Quote 0
                          • E
                            eri--
                            last edited by

                            Fixed even blocked page.
                            Just reinstall, with a new binary.

                            1 Reply Last reply Reply Quote 0
                            • C
                              Cino
                              last edited by

                              thanks for the changes. Haven't gone thru all of them yet but snort won't start because of the sensitive-data change. When I disable it in the GUI and click Save, the checkbox is still checked.

                              
                              Jul 15 18:46:23 	snort[38626]: FATAL ERROR: Unable to open rules file "/usr/local/etc/snort/snort_60770_em3//usr/local/etc/snort/preproc_rules/sensitive-data.rules/": No such file or directory.
                              Jul 15 18:46:23 	snort[38626]: FATAL ERROR: Unable to open rules file "/usr/local/etc/snort/snort_60770_em3//usr/local/etc/snort/preproc_rules/sensitive-data.rules/": No such file or directory.
                              
                              

                              after removing the / on line 1280

                              
                              Jul 15 18:50:58 	snort[46423]: FATAL ERROR: /usr/local/etc/snort/preproc_rules/sensitive-data.rules(1) Unknown rule option: 'sd_pattern'.
                              Jul 15 18:50:58 	snort[46423]: FATAL ERROR: /usr/local/etc/snort/preproc_rules/sensitive-data.rules(1) Unknown rule option: 'sd_pattern'.
                              
                              

                              with removing / and enabling sensitive-data, snort starts.

                              going to go over the other changes and report back… thank you again!!

                              Edit: Did some quick testing with the blocking feature... Block Page looking good!! I would probably take out the msec(s) but if it would be a big change, i can live with it ;) A couple of tweaks but needed for the Alert page, see screen shots:

                              snort_alerts.jpg
                              snort_alerts.jpg_thumb
                              snort_blocks.jpg
                              snort_blocks.jpg_thumb

                              1 Reply Last reply Reply Quote 0
                              • C
                                Cino
                                last edited by

                                @ermal:

                                @Cino:

                                @ermal Great work!!! So far so good.. Its alerting and blocking.

                                Issues I've noticed
                                1: Have the alert description show up on the block page. I noticed you did some tweaks for the snort binary.. Hopefully when its built, it will resolve this.

                                Still checking on this

                                Fixed

                                2: On the alert page, Priority Column is grabbing data from the date time-stamp with seconds. Noticed the time-stamp is in the alert file a couple of times.. I don't see Priority in the new alert file format. Not sure if its used/or how by other users. I do miss the classification column tho

                                With new binary this should be ok, if not shout.

                                Fixed

                                
                                New Alert Format
                                07/15-08:07:58.167280 ,1,2402001,2666,"ET DROP Dshield Block Listed Source",UDP,69.175.126.170,33137,x.x.x.x,1900,0,07/15-08:07:58.167280 ,07/15-08:07:58.167280 ,
                                
                                Old Alert Format
                                [**] [1:2402000:2650] ET DROP Dshield Block Listed Source [**]
                                [Classification: Misc Attack] [Priority: 2] 
                                07/01-11:04:.200:16189 -> x.x.x.x:22
                                TCP TTL:117 TOS:0x0 ID:10183 IpLen:20 DgmLen:48
                                ******S* Seq: 0x3932295A  Ack: 0x661A02CF  Win: 0xFFFF  TcpLen: 28
                                TCP Options (4) => MSS: 1460 NOP NOP SackOK 
                                [Xref => http://feeds.dshield.org/block.txt]
                                
                                

                                Hoping the new binary will resolve this issue too

                                3: Not sure if this is needed but I noticed the Default HOME_NET doesn't include the LAN subnet. Only the LAN IP of pfSense..

                                That is how i think it should be.
                                There is no reason to trust your lan is there?
                                From my side its there just because old code put the ips of all interfaces, it should only put the ip of the interface its listening on!
                                Though i just still thinking about doing that change.

                                I'm leaning to agree with you on this one.. Probably no reason for it.

                                4: Clear Alert log only works for first interface, doesn't clear them for 2nd one

                                Should be fixed

                                Haven't tested yet

                                A couple of little things to tweak I think
                                1: Someone else brought this up, enable sorting within the alert page.. And IMHO i would have default sorting as last alert, not first alert

                                Done

                                Thank you!

                                2: IMHO I think SRC/DST Ports should be put back into separate columns. The log format would be cleaner and allow sorting

                                done

                                thank you but needs a couple of tweaks, see above post

                                1 Reply Last reply Reply Quote 0
                                • M
                                  miles267
                                  last edited by

                                  @ermal:

                                  Fixed even blocked page.
                                  Just reinstall, with a new binary.

                                  I can confirm the alert descriptions on the blocked page are back and working.  Thanks Ermal!

                                  1 Reply Last reply Reply Quote 0
                                  • D
                                    dwood
                                    last edited by

                                    Ermal, on AMD64, 2.0.1 (this time a reinstall of 2.4.2 instead of the usual "clean" install I've been doing):

                                    1. Alert descriptions are back visible on blocked IP

                                    2.  2nd Interface alerts can now be cleared..and the interface is now staying active when selected.

                                    3.  Love the new categories (select all) and add to suppress features.

                                    4.  Issue with 2nd interface stopping after reboot is still there.```
                                    Jul 15 20:52:03 snort[35121]: FATAL ERROR: Unable to load pf args: Interrupted system call

                                    
                                    This is going on with two seperate installations, both AMD64, 2.0.1
                                    
                                    Awesome work sir.  I am sending $$$ your way.
                                    
                                    Cheers,
                                    Dennis.
                                    1 Reply Last reply Reply Quote 0
                                    • T
                                      tester_02
                                      last edited by

                                      @ermal:

                                      BTW, where are my donations?

                                      For those who want to donate please go to http://www.pfsense.org/index.php?option=com_content&task=view&id=47&Itemid=77

                                      Done..  It's been a while so feeling bad about it.  Best home router ever!

                                      Hoping people who use it for business contribute a lot more than me.

                                      1 Reply Last reply Reply Quote 0
                                      • 1
                                        10101000
                                        last edited by

                                        @ermal:

                                        BTW, where are my donations?

                                        For those who want to donate please go to http://www.pfsense.org/index.php?option=com_content&task=view&id=47&Itemid=77

                                        So far, so good. I've sent a donation your way and look forward to future improvements.

                                        Thanks

                                        1 Reply Last reply Reply Quote 0
                                        • E
                                          eri--
                                          last edited by

                                          Should be fixed the other issues.

                                          1 Reply Last reply Reply Quote 0
                                          • E
                                            eri--
                                            last edited by

                                            @dwood:

                                            Ermal, on AMD64, 2.0.1 (this time a reinstall of 2.4.2 instead of the usual "clean" install I've been doing):

                                            4.  Issue with 2nd interface stopping after reboot is still there.```
                                            Jul 15 20:52:03 snort[35121]: FATAL ERROR: Unable to load pf args: Interrupted system call

                                            Just make sure you reinstall the snort binary again.
                                            Usually that comes up from snort reloading and that should be fixed on new binary.

                                            This is going on with two seperate installations, both AMD64, 2.0.1

                                            Awesome work sir.  I am sending $$$ your way.

                                            Cheers,
                                            Dennis.

                                            Thank you for the contributions.

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.