Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Snort 2.9.2.3 pkg v. 2.4.2 Issues

    Scheduled Pinned Locked Moved pfSense Packages
    116 Posts 19 Posters 33.5k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • S
      simby
      last edited by

      from system log:

      Jul 15 19:35:03 snort[40704]: FATAL ERROR: Unable to load pf args: Interrupted system call
      Jul 15 19:35:03 snort[40704]: FATAL ERROR: Unable to load pf args: Interrupted system call
      Jul 15 19:35:02 snort[40704]: [ Number of null byte prefixed patterns trimmed: 11328 ]
      Jul 15 19:35:02 snort[40704]: [ Number of null byte prefixed patterns trimmed: 11328 ]
      Jul 15 19:35:02 snort[40704]: +–-----------------------------------------------
      Jul 15 19:35:02 snort[40704]: +–-----------------------------------------------

      1 Reply Last reply Reply Quote 0
      • C
        Cino
        last edited by

        Added some more suggestions/issues to post http://forum.pfsense.org/index.php/topic,51387.msg275159.html#msg275159

        @breusshe

        If you dont mind changing commenting out some php code, you can get your 2nd WAN interface back:

        lines 82 and 83 in /usr/local/www/snort/snort_interfaces_edit.php

        make them look like this:

        
        #		if ($natent['interface'] == $_POST['interface'])
        #			$input_errors[] = "This interface is already configured for another instance";
        
        

        This allowed me to create another WAN interface, and it has a different ID:

        
         ps -aux | grep snort
        root   61341 23.7    ??  Ss    1:56PM   0:01.29 /usr/pbi/snort-i386/bin/snort -R 36745 -D -q -l /var/log/snort/snort_em336745 --pid-path /var/run --nolock-pidfile -G 36745 -c /usr/
        root   59209  0.2    ??  Ss    1:54PM   0:01.13 /usr/pbi/snort-i386/bin/snort -R 60770 -D -q -l /var/log/snort/snort_em360770 --pid-path /var/run --nolock-pidfile -G 60770 -c /usr/
        root    3143  0.0  0.3 13048  8384  ??  Ss    1:54PM   0:00.06 /usr/local/bin/barnyard2 -r 60770 -f snort_60770_em3.u2 --pid-path /var/run --nolock-pidfile -c /usr/local/etc/snort/snort_60770_em3
        root   35410  0.0  0.0  3536  1256   0  S+    1:56PM   0:00.01 grep snort
        
        
        1 Reply Last reply Reply Quote 0
        • F
          Fesoj
          last edited by

          simby:

          have you tried deactivating all rules (such that only the preprocessors are active)?

          The message

          Jul 15 19:35:03    snort[40704]: FATAL ERROR: Unable to load pf args: Interrupted system call

          has been observed by myself and others, but, after manually restarting the interface, snort remains stable (on my machine).

          1 Reply Last reply Reply Quote 0
          • E
            eri--
            last edited by

            @Fesoj:

            simby:

            have you tried deactivating all rules (such that only the preprocessors are active)?

            The message

            Jul 15 19:35:03    snort[40704]: FATAL ERROR: Unable to load pf args: Interrupted system call

            has been observed by myself and others, but, after manually restarting the interface, snort remains stable (on my machine).

            Please reinstall the new binary this has been fixed.

            1 Reply Last reply Reply Quote 0
            • E
              eri--
              last edited by

              @Cino:

              Added some more suggestions/issues to post http://forum.pfsense.org/index.php/topic,51387.msg275159.html#msg275159

              @breusshe

              If you dont mind changing commenting out some php code, you can get your 2nd WAN interface back:

              lines 82 and 83 in /usr/local/www/snort/snort_interfaces_edit.php

              make them look like this:

              
              #		if ($natent['interface'] == $_POST['interface'])
              #			$input_errors[] = "This interface is already configured for another instance";
              
              

              This allowed me to create another WAN interface, and it has a different ID:

              
               ps -aux | grep snort
              root   61341 23.7    ??  Ss    1:56PM   0:01.29 /usr/pbi/snort-i386/bin/snort -R 36745 -D -q -l /var/log/snort/snort_em336745 --pid-path /var/run --nolock-pidfile -G 36745 -c /usr/
              root   59209  0.2    ??  Ss    1:54PM   0:01.13 /usr/pbi/snort-i386/bin/snort -R 60770 -D -q -l /var/log/snort/snort_em360770 --pid-path /var/run --nolock-pidfile -G 60770 -c /usr/
              root    3143  0.0  0.3 13048  8384  ??  Ss    1:54PM   0:00.06 /usr/local/bin/barnyard2 -r 60770 -f snort_60770_em3.u2 --pid-path /var/run --nolock-pidfile -c /usr/local/etc/snort/snort_60770_em3
              root   35410  0.0  0.0  3536  1256   0  S+    1:56PM   0:00.01 grep snort
              
              

              Use event_filter configurations for this it makes no sense to do this!

              1 Reply Last reply Reply Quote 0
              • E
                eri--
                last edited by

                @Cino:

                @ermal Great work!!! So far so good.. Its alerting and blocking.

                Issues I've noticed
                1: Have the alert description show up on the block page. I noticed you did some tweaks for the snort binary.. Hopefully when its built, it will resolve this.

                Still checking on this

                2: On the alert page, Priority Column is grabbing data from the date time-stamp with seconds. Noticed the time-stamp is in the alert file a couple of times.. I don't see Priority in the new alert file format. Not sure if its used/or how by other users. I do miss the classification column tho

                With new binary this should be ok, if not shout.

                
                New Alert Format
                07/15-08:07:58.167280 ,1,2402001,2666,"ET DROP Dshield Block Listed Source",UDP,69.175.126.170,33137,x.x.x.x,1900,0,07/15-08:07:58.167280 ,07/15-08:07:58.167280 ,
                
                Old Alert Format
                [**] [1:2402000:2650] ET DROP Dshield Block Listed Source [**]
                [Classification: Misc Attack] [Priority: 2] 
                07/01-11:04:.200:16189 -> x.x.x.x:22
                TCP TTL:117 TOS:0x0 ID:10183 IpLen:20 DgmLen:48
                ******S* Seq: 0x3932295A  Ack: 0x661A02CF  Win: 0xFFFF  TcpLen: 28
                TCP Options (4) => MSS: 1460 NOP NOP SackOK 
                [Xref => http://feeds.dshield.org/block.txt]
                
                

                Hoping the new binary will resolve this issue too

                3: Not sure if this is needed but I noticed the Default HOME_NET doesn't include the LAN subnet. Only the LAN IP of pfSense..

                That is how i think it should be.
                There is no reason to trust your lan is there?
                From my side its there just because old code put the ips of all interfaces, it should only put the ip of the interface its listening on!
                Though i just still thinking about doing that change.

                4: Clear Alert log only works for first interface, doesn't clear them for 2nd one

                Should be fixed

                A couple of little things to tweak I think
                1: Someone else brought this up, enable sorting within the alert page.. And IMHO i would have default sorting as last alert, not first alert

                Done

                2: IMHO I think SRC/DST Ports should be put back into separate columns. The log format would be cleaner and allow sorting

                done

                3: Use the same font/size that used for the whitelist edit page for the suppress edit page

                Not sure here displays fine!

                4: Folders/file names are not consistent,should follow this as an example: snort_60770_em3

                
                Folders:
                /var/log/snort/snort_em360770
                Files:
                /var/run/snort_em360770.pid
                
                

                I would like to remove the interface from the paths but just want do it.
                And anyway its backend.

                Future add-on
                This would be really nice but I know its not in-scope right now
                http://forum.pfsense.org/index.php/topic,42994.0.html

                Not from me.
                Use barnyard or something else for that. I consider that in depth analysis.

                PS.  Its able to detect and block IPv6 addresses, still tweaking my NETLIST for it tho.. I've notice IPv6 address show up in the block list, which is really good! No more looking at the snort2c table.

                Will add soon.

                1 Reply Last reply Reply Quote 0
                • E
                  eri--
                  last edited by

                  BTW, where are my donations?

                  For those who want to donate please go to http://www.pfsense.org/index.php?option=com_content&task=view&id=47&Itemid=77

                  1 Reply Last reply Reply Quote 0
                  • E
                    eri--
                    last edited by

                    Fixed even blocked page.
                    Just reinstall, with a new binary.

                    1 Reply Last reply Reply Quote 0
                    • C
                      Cino
                      last edited by

                      thanks for the changes. Haven't gone thru all of them yet but snort won't start because of the sensitive-data change. When I disable it in the GUI and click Save, the checkbox is still checked.

                      
                      Jul 15 18:46:23 	snort[38626]: FATAL ERROR: Unable to open rules file "/usr/local/etc/snort/snort_60770_em3//usr/local/etc/snort/preproc_rules/sensitive-data.rules/": No such file or directory.
                      Jul 15 18:46:23 	snort[38626]: FATAL ERROR: Unable to open rules file "/usr/local/etc/snort/snort_60770_em3//usr/local/etc/snort/preproc_rules/sensitive-data.rules/": No such file or directory.
                      
                      

                      after removing the / on line 1280

                      
                      Jul 15 18:50:58 	snort[46423]: FATAL ERROR: /usr/local/etc/snort/preproc_rules/sensitive-data.rules(1) Unknown rule option: 'sd_pattern'.
                      Jul 15 18:50:58 	snort[46423]: FATAL ERROR: /usr/local/etc/snort/preproc_rules/sensitive-data.rules(1) Unknown rule option: 'sd_pattern'.
                      
                      

                      with removing / and enabling sensitive-data, snort starts.

                      going to go over the other changes and report back… thank you again!!

                      Edit: Did some quick testing with the blocking feature... Block Page looking good!! I would probably take out the msec(s) but if it would be a big change, i can live with it ;) A couple of tweaks but needed for the Alert page, see screen shots:

                      snort_alerts.jpg
                      snort_alerts.jpg_thumb
                      snort_blocks.jpg
                      snort_blocks.jpg_thumb

                      1 Reply Last reply Reply Quote 0
                      • C
                        Cino
                        last edited by

                        @ermal:

                        @Cino:

                        @ermal Great work!!! So far so good.. Its alerting and blocking.

                        Issues I've noticed
                        1: Have the alert description show up on the block page. I noticed you did some tweaks for the snort binary.. Hopefully when its built, it will resolve this.

                        Still checking on this

                        Fixed

                        2: On the alert page, Priority Column is grabbing data from the date time-stamp with seconds. Noticed the time-stamp is in the alert file a couple of times.. I don't see Priority in the new alert file format. Not sure if its used/or how by other users. I do miss the classification column tho

                        With new binary this should be ok, if not shout.

                        Fixed

                        
                        New Alert Format
                        07/15-08:07:58.167280 ,1,2402001,2666,"ET DROP Dshield Block Listed Source",UDP,69.175.126.170,33137,x.x.x.x,1900,0,07/15-08:07:58.167280 ,07/15-08:07:58.167280 ,
                        
                        Old Alert Format
                        [**] [1:2402000:2650] ET DROP Dshield Block Listed Source [**]
                        [Classification: Misc Attack] [Priority: 2] 
                        07/01-11:04:.200:16189 -> x.x.x.x:22
                        TCP TTL:117 TOS:0x0 ID:10183 IpLen:20 DgmLen:48
                        ******S* Seq: 0x3932295A  Ack: 0x661A02CF  Win: 0xFFFF  TcpLen: 28
                        TCP Options (4) => MSS: 1460 NOP NOP SackOK 
                        [Xref => http://feeds.dshield.org/block.txt]
                        
                        

                        Hoping the new binary will resolve this issue too

                        3: Not sure if this is needed but I noticed the Default HOME_NET doesn't include the LAN subnet. Only the LAN IP of pfSense..

                        That is how i think it should be.
                        There is no reason to trust your lan is there?
                        From my side its there just because old code put the ips of all interfaces, it should only put the ip of the interface its listening on!
                        Though i just still thinking about doing that change.

                        I'm leaning to agree with you on this one.. Probably no reason for it.

                        4: Clear Alert log only works for first interface, doesn't clear them for 2nd one

                        Should be fixed

                        Haven't tested yet

                        A couple of little things to tweak I think
                        1: Someone else brought this up, enable sorting within the alert page.. And IMHO i would have default sorting as last alert, not first alert

                        Done

                        Thank you!

                        2: IMHO I think SRC/DST Ports should be put back into separate columns. The log format would be cleaner and allow sorting

                        done

                        thank you but needs a couple of tweaks, see above post

                        1 Reply Last reply Reply Quote 0
                        • M
                          miles267
                          last edited by

                          @ermal:

                          Fixed even blocked page.
                          Just reinstall, with a new binary.

                          I can confirm the alert descriptions on the blocked page are back and working.  Thanks Ermal!

                          1 Reply Last reply Reply Quote 0
                          • D
                            dwood
                            last edited by

                            Ermal, on AMD64, 2.0.1 (this time a reinstall of 2.4.2 instead of the usual "clean" install I've been doing):

                            1. Alert descriptions are back visible on blocked IP

                            2.  2nd Interface alerts can now be cleared..and the interface is now staying active when selected.

                            3.  Love the new categories (select all) and add to suppress features.

                            4.  Issue with 2nd interface stopping after reboot is still there.```
                            Jul 15 20:52:03 snort[35121]: FATAL ERROR: Unable to load pf args: Interrupted system call

                            
                            This is going on with two seperate installations, both AMD64, 2.0.1
                            
                            Awesome work sir.  I am sending $$$ your way.
                            
                            Cheers,
                            Dennis.
                            1 Reply Last reply Reply Quote 0
                            • T
                              tester_02
                              last edited by

                              @ermal:

                              BTW, where are my donations?

                              For those who want to donate please go to http://www.pfsense.org/index.php?option=com_content&task=view&id=47&Itemid=77

                              Done..  It's been a while so feeling bad about it.  Best home router ever!

                              Hoping people who use it for business contribute a lot more than me.

                              1 Reply Last reply Reply Quote 0
                              • 1
                                10101000
                                last edited by

                                @ermal:

                                BTW, where are my donations?

                                For those who want to donate please go to http://www.pfsense.org/index.php?option=com_content&task=view&id=47&Itemid=77

                                So far, so good. I've sent a donation your way and look forward to future improvements.

                                Thanks

                                1 Reply Last reply Reply Quote 0
                                • E
                                  eri--
                                  last edited by

                                  Should be fixed the other issues.

                                  1 Reply Last reply Reply Quote 0
                                  • E
                                    eri--
                                    last edited by

                                    @dwood:

                                    Ermal, on AMD64, 2.0.1 (this time a reinstall of 2.4.2 instead of the usual "clean" install I've been doing):

                                    4.  Issue with 2nd interface stopping after reboot is still there.```
                                    Jul 15 20:52:03 snort[35121]: FATAL ERROR: Unable to load pf args: Interrupted system call

                                    Just make sure you reinstall the snort binary again.
                                    Usually that comes up from snort reloading and that should be fixed on new binary.

                                    This is going on with two seperate installations, both AMD64, 2.0.1

                                    Awesome work sir.  I am sending $$$ your way.

                                    Cheers,
                                    Dennis.

                                    Thank you for the contributions.

                                    1 Reply Last reply Reply Quote 0
                                    • F
                                      fragged
                                      last edited by

                                      Snort won't start if I disable "Sensitive data" preproc

                                      
                                      Jul 16 10:32:22 	snort[3755]: FATAL ERROR: /usr/local/etc/snort/preproc_rules/sensitive-data.rules(1) Unknown rule option: 'sd_pattern'.
                                      Jul 16 10:32:22 	snort[3755]: FATAL ERROR: /usr/local/etc/snort/preproc_rules/sensitive-data.rules(1) Unknown rule option: 'sd_pattern'.
                                      
                                      
                                      1 Reply Last reply Reply Quote 0
                                      • H
                                        HOD
                                        last edited by

                                        @ermal:

                                        @HOD:

                                        I did a complete reinstall of snort (10min ago) and i have the same error of my last post.

                                        snort[23088]: FATAL ERROR: s2c_parse_load_wl() => Invalid data in whitelist file: Invalid argument

                                        @ermal:

                                        For all the others having issues with blocking please whenever you have system log of 'unable to parse', get the file under the /usr/local/etc/snort/snort_$iface*/$whitelistname and post it here.

                                        cat /usr/local/etc/snort/snort_18407_pppoe0/whitlsit
                                        suppress gen_id 119, sig_id 2
                                        suppress gen_id 119, sig_id 31
                                        suppress gen_id 119, sig_id 32
                                        suppress gen_id 120, sig_id 3
                                        suppress gen_id 120, sig_id 6
                                        suppress gen_id 120, sig_id 8
                                        suppress gen_id 120, sig_id 10
                                        suppress gen_id 122, sig_id 26
                                        suppress gen_id 137, sig_id 1

                                        greetz HOD

                                        EDIT: my System 2.0.1-RELEASE (amd64) Snort 2.9.2.3 pkg v. 2.4.2

                                        This should have been fixed also.
                                        HOD can yo uconfirm that you have the same name for the suppress and whitelist selected?

                                        Confirm it was the same name. Thx for fixing this.

                                        @fragged:

                                        Snort won't start if I disable "Sensitive data" preproc

                                        
                                        Jul 16 10:32:22 	snort[3755]: FATAL ERROR: /usr/local/etc/snort/preproc_rules/sensitive-data.rules(1) Unknown rule option: 'sd_pattern'.
                                        Jul 16 10:32:22 	snort[3755]: FATAL ERROR: /usr/local/etc/snort/preproc_rules/sensitive-data.rules(1) Unknown rule option: 'sd_pattern'.
                                        
                                        

                                        I got the same error.

                                        1 Reply Last reply Reply Quote 0
                                        • E
                                          eri--
                                          last edited by

                                          @fragged:

                                          Snort won't start if I disable "Sensitive data" preproc

                                          
                                          Jul 16 10:32:22 	snort[3755]: FATAL ERROR: /usr/local/etc/snort/preproc_rules/sensitive-data.rules(1) Unknown rule option: 'sd_pattern'.
                                          Jul 16 10:32:22 	snort[3755]: FATAL ERROR: /usr/local/etc/snort/preproc_rules/sensitive-data.rules(1) Unknown rule option: 'sd_pattern'.
                                          
                                          

                                          Fixed.

                                          1 Reply Last reply Reply Quote 0
                                          • C
                                            Cino
                                            last edited by

                                            Nice work Ermal! I see IPv6 interface IPs are added and you change the whitelist to use Aliases.. Nice touch!!

                                            Alert page looks really sharp, nanosec are gone :-) oh, and custom rules? That should be interesting… I'll play with that in a couple of weeks.

                                            was about to report the sensitive data issue but you fixed it ;-)

                                            thank you again..

                                            FYI, when I fully uninstall, here is what is left over:

                                            
                                            /tmp/snort.info
                                            /tmp/snort_update.log
                                            /usr/local/lib/snort/dynamicengine
                                            /usr/local/lib/snort/dynamicrules/bad-traffic.so
                                            /usr/local/lib/snort/dynamicrules/web-iis.so
                                            /usr/local/lib/snort/dynamicrules/web-client.so
                                            /usr/local/lib/snort/dynamicrules/web-activex.so
                                            /usr/local/lib/snort/dynamicrules/specific-threats.so
                                            /usr/local/lib/snort/dynamicrules/snmp.so
                                            /usr/local/lib/snort/dynamicrules/smtp.so
                                            /usr/local/lib/snort/dynamicrules/p2p.so
                                            /usr/local/lib/snort/dynamicrules/nntp.so
                                            /usr/local/lib/snort/dynamicrules/netbios.so
                                            /usr/local/lib/snort/dynamicrules/multimedia.so
                                            /usr/local/lib/snort/dynamicrules/misc.so
                                            /usr/local/lib/snort/dynamicrules/imap.so
                                            /usr/local/lib/snort/dynamicrules/icmp.so
                                            /usr/local/lib/snort/dynamicrules/exploit.so
                                            /usr/local/lib/snort/dynamicrules/dos.so
                                            /usr/local/lib/snort/dynamicrules/chat.so
                                            /usr/local/lib/snort/dynamicrules/web-misc.so
                                            /usr/local/lib/snort/dynamicrules
                                            /usr/local/lib/snort/dynamic_preproc
                                            /usr/local/lib/snort/dynamicpreprocessor
                                            /usr/local/lib/snort
                                            rm: /usr/local/lib/snort/dynamicengine: No such file or directory
                                            rm: /usr/local/lib/snort/dynamicrules: No such file or directory
                                            rm: /usr/local/lib/snort/dynamicrules/bad-traffic.so: No such file or directory
                                            rm: /usr/local/lib/snort/dynamicrules/web-iis.so: No such file or directory
                                            rm: /usr/local/lib/snort/dynamicrules/web-client.so: No such file or directory
                                            rm: /usr/local/lib/snort/dynamicrules/web-activex.so: No such file or directory
                                            rm: /usr/local/lib/snort/dynamicrules/specific-threats.so: No such file or directory
                                            rm: /usr/local/lib/snort/dynamicrules/snmp.so: No such file or directory
                                            rm: /usr/local/lib/snort/dynamicrules/smtp.so: No such file or directory
                                            rm: /usr/local/lib/snort/dynamicrules/p2p.so: No such file or directory
                                            rm: /usr/local/lib/snort/dynamicrules/nntp.so: No such file or directory
                                            rm: /usr/local/lib/snort/dynamicrules/netbios.so: No such file or directory
                                            rm: /usr/local/lib/snort/dynamicrules/multimedia.so: No such file or directory
                                            rm: /usr/local/lib/snort/dynamicrules/misc.so: No such file or directory
                                            rm: /usr/local/lib/snort/dynamicrules/imap.so: No such file or directory
                                            rm: /usr/local/lib/snort/dynamicrules/icmp.so: No such file or directory
                                            rm: /usr/local/lib/snort/dynamicrules/exploit.so: No such file or directory
                                            rm: /usr/local/lib/snort/dynamicrules/dos.so: No such file or directory
                                            rm: /usr/local/lib/snort/dynamicrules/chat.so: No such file or directory
                                            rm: /usr/local/lib/snort/dynamicrules/web-misc.so: No such file or directory
                                            rm: /usr/local/lib/snort/dynamic_preproc: No such file or directory
                                            rm: /usr/local/lib/snort/dynamicpreprocessor: No such file or directory
                                            /usr/local/share/examples/snort
                                            /usr/local/share/licenses/snort-2.9.2.3
                                            /usr/local/include/snort/dynamic_preproc
                                            /usr/local/include/snort
                                            rm: /usr/local/include/snort/dynamic_preproc: No such file or directory
                                            /usr/local/src/snort_dynamicsrc
                                            /var/db/pbi/.hashqueue/snort-2.9.2.3-i386
                                            
                                            
                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.