Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Snort 2.9.2.3 pkg v. 2.4.2 Issues

    Scheduled Pinned Locked Moved pfSense Packages
    116 Posts 19 Posters 33.5k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • C
      Cino
      last edited by

      Added some more suggestions/issues to post http://forum.pfsense.org/index.php/topic,51387.msg275159.html#msg275159

      @breusshe

      If you dont mind changing commenting out some php code, you can get your 2nd WAN interface back:

      lines 82 and 83 in /usr/local/www/snort/snort_interfaces_edit.php

      make them look like this:

      
      #		if ($natent['interface'] == $_POST['interface'])
      #			$input_errors[] = "This interface is already configured for another instance";
      
      

      This allowed me to create another WAN interface, and it has a different ID:

      
       ps -aux | grep snort
      root   61341 23.7    ??  Ss    1:56PM   0:01.29 /usr/pbi/snort-i386/bin/snort -R 36745 -D -q -l /var/log/snort/snort_em336745 --pid-path /var/run --nolock-pidfile -G 36745 -c /usr/
      root   59209  0.2    ??  Ss    1:54PM   0:01.13 /usr/pbi/snort-i386/bin/snort -R 60770 -D -q -l /var/log/snort/snort_em360770 --pid-path /var/run --nolock-pidfile -G 60770 -c /usr/
      root    3143  0.0  0.3 13048  8384  ??  Ss    1:54PM   0:00.06 /usr/local/bin/barnyard2 -r 60770 -f snort_60770_em3.u2 --pid-path /var/run --nolock-pidfile -c /usr/local/etc/snort/snort_60770_em3
      root   35410  0.0  0.0  3536  1256   0  S+    1:56PM   0:00.01 grep snort
      
      
      1 Reply Last reply Reply Quote 0
      • F
        Fesoj
        last edited by

        simby:

        have you tried deactivating all rules (such that only the preprocessors are active)?

        The message

        Jul 15 19:35:03    snort[40704]: FATAL ERROR: Unable to load pf args: Interrupted system call

        has been observed by myself and others, but, after manually restarting the interface, snort remains stable (on my machine).

        1 Reply Last reply Reply Quote 0
        • E
          eri--
          last edited by

          @Fesoj:

          simby:

          have you tried deactivating all rules (such that only the preprocessors are active)?

          The message

          Jul 15 19:35:03    snort[40704]: FATAL ERROR: Unable to load pf args: Interrupted system call

          has been observed by myself and others, but, after manually restarting the interface, snort remains stable (on my machine).

          Please reinstall the new binary this has been fixed.

          1 Reply Last reply Reply Quote 0
          • E
            eri--
            last edited by

            @Cino:

            Added some more suggestions/issues to post http://forum.pfsense.org/index.php/topic,51387.msg275159.html#msg275159

            @breusshe

            If you dont mind changing commenting out some php code, you can get your 2nd WAN interface back:

            lines 82 and 83 in /usr/local/www/snort/snort_interfaces_edit.php

            make them look like this:

            
            #		if ($natent['interface'] == $_POST['interface'])
            #			$input_errors[] = "This interface is already configured for another instance";
            
            

            This allowed me to create another WAN interface, and it has a different ID:

            
             ps -aux | grep snort
            root   61341 23.7    ??  Ss    1:56PM   0:01.29 /usr/pbi/snort-i386/bin/snort -R 36745 -D -q -l /var/log/snort/snort_em336745 --pid-path /var/run --nolock-pidfile -G 36745 -c /usr/
            root   59209  0.2    ??  Ss    1:54PM   0:01.13 /usr/pbi/snort-i386/bin/snort -R 60770 -D -q -l /var/log/snort/snort_em360770 --pid-path /var/run --nolock-pidfile -G 60770 -c /usr/
            root    3143  0.0  0.3 13048  8384  ??  Ss    1:54PM   0:00.06 /usr/local/bin/barnyard2 -r 60770 -f snort_60770_em3.u2 --pid-path /var/run --nolock-pidfile -c /usr/local/etc/snort/snort_60770_em3
            root   35410  0.0  0.0  3536  1256   0  S+    1:56PM   0:00.01 grep snort
            
            

            Use event_filter configurations for this it makes no sense to do this!

            1 Reply Last reply Reply Quote 0
            • E
              eri--
              last edited by

              @Cino:

              @ermal Great work!!! So far so good.. Its alerting and blocking.

              Issues I've noticed
              1: Have the alert description show up on the block page. I noticed you did some tweaks for the snort binary.. Hopefully when its built, it will resolve this.

              Still checking on this

              2: On the alert page, Priority Column is grabbing data from the date time-stamp with seconds. Noticed the time-stamp is in the alert file a couple of times.. I don't see Priority in the new alert file format. Not sure if its used/or how by other users. I do miss the classification column tho

              With new binary this should be ok, if not shout.

              
              New Alert Format
              07/15-08:07:58.167280 ,1,2402001,2666,"ET DROP Dshield Block Listed Source",UDP,69.175.126.170,33137,x.x.x.x,1900,0,07/15-08:07:58.167280 ,07/15-08:07:58.167280 ,
              
              Old Alert Format
              [**] [1:2402000:2650] ET DROP Dshield Block Listed Source [**]
              [Classification: Misc Attack] [Priority: 2] 
              07/01-11:04:.200:16189 -> x.x.x.x:22
              TCP TTL:117 TOS:0x0 ID:10183 IpLen:20 DgmLen:48
              ******S* Seq: 0x3932295A  Ack: 0x661A02CF  Win: 0xFFFF  TcpLen: 28
              TCP Options (4) => MSS: 1460 NOP NOP SackOK 
              [Xref => http://feeds.dshield.org/block.txt]
              
              

              Hoping the new binary will resolve this issue too

              3: Not sure if this is needed but I noticed the Default HOME_NET doesn't include the LAN subnet. Only the LAN IP of pfSense..

              That is how i think it should be.
              There is no reason to trust your lan is there?
              From my side its there just because old code put the ips of all interfaces, it should only put the ip of the interface its listening on!
              Though i just still thinking about doing that change.

              4: Clear Alert log only works for first interface, doesn't clear them for 2nd one

              Should be fixed

              A couple of little things to tweak I think
              1: Someone else brought this up, enable sorting within the alert page.. And IMHO i would have default sorting as last alert, not first alert

              Done

              2: IMHO I think SRC/DST Ports should be put back into separate columns. The log format would be cleaner and allow sorting

              done

              3: Use the same font/size that used for the whitelist edit page for the suppress edit page

              Not sure here displays fine!

              4: Folders/file names are not consistent,should follow this as an example: snort_60770_em3

              
              Folders:
              /var/log/snort/snort_em360770
              Files:
              /var/run/snort_em360770.pid
              
              

              I would like to remove the interface from the paths but just want do it.
              And anyway its backend.

              Future add-on
              This would be really nice but I know its not in-scope right now
              http://forum.pfsense.org/index.php/topic,42994.0.html

              Not from me.
              Use barnyard or something else for that. I consider that in depth analysis.

              PS.  Its able to detect and block IPv6 addresses, still tweaking my NETLIST for it tho.. I've notice IPv6 address show up in the block list, which is really good! No more looking at the snort2c table.

              Will add soon.

              1 Reply Last reply Reply Quote 0
              • E
                eri--
                last edited by

                BTW, where are my donations?

                For those who want to donate please go to http://www.pfsense.org/index.php?option=com_content&task=view&id=47&Itemid=77

                1 Reply Last reply Reply Quote 0
                • E
                  eri--
                  last edited by

                  Fixed even blocked page.
                  Just reinstall, with a new binary.

                  1 Reply Last reply Reply Quote 0
                  • C
                    Cino
                    last edited by

                    thanks for the changes. Haven't gone thru all of them yet but snort won't start because of the sensitive-data change. When I disable it in the GUI and click Save, the checkbox is still checked.

                    
                    Jul 15 18:46:23 	snort[38626]: FATAL ERROR: Unable to open rules file "/usr/local/etc/snort/snort_60770_em3//usr/local/etc/snort/preproc_rules/sensitive-data.rules/": No such file or directory.
                    Jul 15 18:46:23 	snort[38626]: FATAL ERROR: Unable to open rules file "/usr/local/etc/snort/snort_60770_em3//usr/local/etc/snort/preproc_rules/sensitive-data.rules/": No such file or directory.
                    
                    

                    after removing the / on line 1280

                    
                    Jul 15 18:50:58 	snort[46423]: FATAL ERROR: /usr/local/etc/snort/preproc_rules/sensitive-data.rules(1) Unknown rule option: 'sd_pattern'.
                    Jul 15 18:50:58 	snort[46423]: FATAL ERROR: /usr/local/etc/snort/preproc_rules/sensitive-data.rules(1) Unknown rule option: 'sd_pattern'.
                    
                    

                    with removing / and enabling sensitive-data, snort starts.

                    going to go over the other changes and report back… thank you again!!

                    Edit: Did some quick testing with the blocking feature... Block Page looking good!! I would probably take out the msec(s) but if it would be a big change, i can live with it ;) A couple of tweaks but needed for the Alert page, see screen shots:

                    snort_alerts.jpg
                    snort_alerts.jpg_thumb
                    snort_blocks.jpg
                    snort_blocks.jpg_thumb

                    1 Reply Last reply Reply Quote 0
                    • C
                      Cino
                      last edited by

                      @ermal:

                      @Cino:

                      @ermal Great work!!! So far so good.. Its alerting and blocking.

                      Issues I've noticed
                      1: Have the alert description show up on the block page. I noticed you did some tweaks for the snort binary.. Hopefully when its built, it will resolve this.

                      Still checking on this

                      Fixed

                      2: On the alert page, Priority Column is grabbing data from the date time-stamp with seconds. Noticed the time-stamp is in the alert file a couple of times.. I don't see Priority in the new alert file format. Not sure if its used/or how by other users. I do miss the classification column tho

                      With new binary this should be ok, if not shout.

                      Fixed

                      
                      New Alert Format
                      07/15-08:07:58.167280 ,1,2402001,2666,"ET DROP Dshield Block Listed Source",UDP,69.175.126.170,33137,x.x.x.x,1900,0,07/15-08:07:58.167280 ,07/15-08:07:58.167280 ,
                      
                      Old Alert Format
                      [**] [1:2402000:2650] ET DROP Dshield Block Listed Source [**]
                      [Classification: Misc Attack] [Priority: 2] 
                      07/01-11:04:.200:16189 -> x.x.x.x:22
                      TCP TTL:117 TOS:0x0 ID:10183 IpLen:20 DgmLen:48
                      ******S* Seq: 0x3932295A  Ack: 0x661A02CF  Win: 0xFFFF  TcpLen: 28
                      TCP Options (4) => MSS: 1460 NOP NOP SackOK 
                      [Xref => http://feeds.dshield.org/block.txt]
                      
                      

                      Hoping the new binary will resolve this issue too

                      3: Not sure if this is needed but I noticed the Default HOME_NET doesn't include the LAN subnet. Only the LAN IP of pfSense..

                      That is how i think it should be.
                      There is no reason to trust your lan is there?
                      From my side its there just because old code put the ips of all interfaces, it should only put the ip of the interface its listening on!
                      Though i just still thinking about doing that change.

                      I'm leaning to agree with you on this one.. Probably no reason for it.

                      4: Clear Alert log only works for first interface, doesn't clear them for 2nd one

                      Should be fixed

                      Haven't tested yet

                      A couple of little things to tweak I think
                      1: Someone else brought this up, enable sorting within the alert page.. And IMHO i would have default sorting as last alert, not first alert

                      Done

                      Thank you!

                      2: IMHO I think SRC/DST Ports should be put back into separate columns. The log format would be cleaner and allow sorting

                      done

                      thank you but needs a couple of tweaks, see above post

                      1 Reply Last reply Reply Quote 0
                      • M
                        miles267
                        last edited by

                        @ermal:

                        Fixed even blocked page.
                        Just reinstall, with a new binary.

                        I can confirm the alert descriptions on the blocked page are back and working.  Thanks Ermal!

                        1 Reply Last reply Reply Quote 0
                        • D
                          dwood
                          last edited by

                          Ermal, on AMD64, 2.0.1 (this time a reinstall of 2.4.2 instead of the usual "clean" install I've been doing):

                          1. Alert descriptions are back visible on blocked IP

                          2.  2nd Interface alerts can now be cleared..and the interface is now staying active when selected.

                          3.  Love the new categories (select all) and add to suppress features.

                          4.  Issue with 2nd interface stopping after reboot is still there.```
                          Jul 15 20:52:03 snort[35121]: FATAL ERROR: Unable to load pf args: Interrupted system call

                          
                          This is going on with two seperate installations, both AMD64, 2.0.1
                          
                          Awesome work sir.  I am sending $$$ your way.
                          
                          Cheers,
                          Dennis.
                          1 Reply Last reply Reply Quote 0
                          • T
                            tester_02
                            last edited by

                            @ermal:

                            BTW, where are my donations?

                            For those who want to donate please go to http://www.pfsense.org/index.php?option=com_content&task=view&id=47&Itemid=77

                            Done..  It's been a while so feeling bad about it.  Best home router ever!

                            Hoping people who use it for business contribute a lot more than me.

                            1 Reply Last reply Reply Quote 0
                            • 1
                              10101000
                              last edited by

                              @ermal:

                              BTW, where are my donations?

                              For those who want to donate please go to http://www.pfsense.org/index.php?option=com_content&task=view&id=47&Itemid=77

                              So far, so good. I've sent a donation your way and look forward to future improvements.

                              Thanks

                              1 Reply Last reply Reply Quote 0
                              • E
                                eri--
                                last edited by

                                Should be fixed the other issues.

                                1 Reply Last reply Reply Quote 0
                                • E
                                  eri--
                                  last edited by

                                  @dwood:

                                  Ermal, on AMD64, 2.0.1 (this time a reinstall of 2.4.2 instead of the usual "clean" install I've been doing):

                                  4.  Issue with 2nd interface stopping after reboot is still there.```
                                  Jul 15 20:52:03 snort[35121]: FATAL ERROR: Unable to load pf args: Interrupted system call

                                  Just make sure you reinstall the snort binary again.
                                  Usually that comes up from snort reloading and that should be fixed on new binary.

                                  This is going on with two seperate installations, both AMD64, 2.0.1

                                  Awesome work sir.  I am sending $$$ your way.

                                  Cheers,
                                  Dennis.

                                  Thank you for the contributions.

                                  1 Reply Last reply Reply Quote 0
                                  • F
                                    fragged
                                    last edited by

                                    Snort won't start if I disable "Sensitive data" preproc

                                    
                                    Jul 16 10:32:22 	snort[3755]: FATAL ERROR: /usr/local/etc/snort/preproc_rules/sensitive-data.rules(1) Unknown rule option: 'sd_pattern'.
                                    Jul 16 10:32:22 	snort[3755]: FATAL ERROR: /usr/local/etc/snort/preproc_rules/sensitive-data.rules(1) Unknown rule option: 'sd_pattern'.
                                    
                                    
                                    1 Reply Last reply Reply Quote 0
                                    • H
                                      HOD
                                      last edited by

                                      @ermal:

                                      @HOD:

                                      I did a complete reinstall of snort (10min ago) and i have the same error of my last post.

                                      snort[23088]: FATAL ERROR: s2c_parse_load_wl() => Invalid data in whitelist file: Invalid argument

                                      @ermal:

                                      For all the others having issues with blocking please whenever you have system log of 'unable to parse', get the file under the /usr/local/etc/snort/snort_$iface*/$whitelistname and post it here.

                                      cat /usr/local/etc/snort/snort_18407_pppoe0/whitlsit
                                      suppress gen_id 119, sig_id 2
                                      suppress gen_id 119, sig_id 31
                                      suppress gen_id 119, sig_id 32
                                      suppress gen_id 120, sig_id 3
                                      suppress gen_id 120, sig_id 6
                                      suppress gen_id 120, sig_id 8
                                      suppress gen_id 120, sig_id 10
                                      suppress gen_id 122, sig_id 26
                                      suppress gen_id 137, sig_id 1

                                      greetz HOD

                                      EDIT: my System 2.0.1-RELEASE (amd64) Snort 2.9.2.3 pkg v. 2.4.2

                                      This should have been fixed also.
                                      HOD can yo uconfirm that you have the same name for the suppress and whitelist selected?

                                      Confirm it was the same name. Thx for fixing this.

                                      @fragged:

                                      Snort won't start if I disable "Sensitive data" preproc

                                      
                                      Jul 16 10:32:22 	snort[3755]: FATAL ERROR: /usr/local/etc/snort/preproc_rules/sensitive-data.rules(1) Unknown rule option: 'sd_pattern'.
                                      Jul 16 10:32:22 	snort[3755]: FATAL ERROR: /usr/local/etc/snort/preproc_rules/sensitive-data.rules(1) Unknown rule option: 'sd_pattern'.
                                      
                                      

                                      I got the same error.

                                      1 Reply Last reply Reply Quote 0
                                      • E
                                        eri--
                                        last edited by

                                        @fragged:

                                        Snort won't start if I disable "Sensitive data" preproc

                                        
                                        Jul 16 10:32:22 	snort[3755]: FATAL ERROR: /usr/local/etc/snort/preproc_rules/sensitive-data.rules(1) Unknown rule option: 'sd_pattern'.
                                        Jul 16 10:32:22 	snort[3755]: FATAL ERROR: /usr/local/etc/snort/preproc_rules/sensitive-data.rules(1) Unknown rule option: 'sd_pattern'.
                                        
                                        

                                        Fixed.

                                        1 Reply Last reply Reply Quote 0
                                        • C
                                          Cino
                                          last edited by

                                          Nice work Ermal! I see IPv6 interface IPs are added and you change the whitelist to use Aliases.. Nice touch!!

                                          Alert page looks really sharp, nanosec are gone :-) oh, and custom rules? That should be interesting… I'll play with that in a couple of weeks.

                                          was about to report the sensitive data issue but you fixed it ;-)

                                          thank you again..

                                          FYI, when I fully uninstall, here is what is left over:

                                          
                                          /tmp/snort.info
                                          /tmp/snort_update.log
                                          /usr/local/lib/snort/dynamicengine
                                          /usr/local/lib/snort/dynamicrules/bad-traffic.so
                                          /usr/local/lib/snort/dynamicrules/web-iis.so
                                          /usr/local/lib/snort/dynamicrules/web-client.so
                                          /usr/local/lib/snort/dynamicrules/web-activex.so
                                          /usr/local/lib/snort/dynamicrules/specific-threats.so
                                          /usr/local/lib/snort/dynamicrules/snmp.so
                                          /usr/local/lib/snort/dynamicrules/smtp.so
                                          /usr/local/lib/snort/dynamicrules/p2p.so
                                          /usr/local/lib/snort/dynamicrules/nntp.so
                                          /usr/local/lib/snort/dynamicrules/netbios.so
                                          /usr/local/lib/snort/dynamicrules/multimedia.so
                                          /usr/local/lib/snort/dynamicrules/misc.so
                                          /usr/local/lib/snort/dynamicrules/imap.so
                                          /usr/local/lib/snort/dynamicrules/icmp.so
                                          /usr/local/lib/snort/dynamicrules/exploit.so
                                          /usr/local/lib/snort/dynamicrules/dos.so
                                          /usr/local/lib/snort/dynamicrules/chat.so
                                          /usr/local/lib/snort/dynamicrules/web-misc.so
                                          /usr/local/lib/snort/dynamicrules
                                          /usr/local/lib/snort/dynamic_preproc
                                          /usr/local/lib/snort/dynamicpreprocessor
                                          /usr/local/lib/snort
                                          rm: /usr/local/lib/snort/dynamicengine: No such file or directory
                                          rm: /usr/local/lib/snort/dynamicrules: No such file or directory
                                          rm: /usr/local/lib/snort/dynamicrules/bad-traffic.so: No such file or directory
                                          rm: /usr/local/lib/snort/dynamicrules/web-iis.so: No such file or directory
                                          rm: /usr/local/lib/snort/dynamicrules/web-client.so: No such file or directory
                                          rm: /usr/local/lib/snort/dynamicrules/web-activex.so: No such file or directory
                                          rm: /usr/local/lib/snort/dynamicrules/specific-threats.so: No such file or directory
                                          rm: /usr/local/lib/snort/dynamicrules/snmp.so: No such file or directory
                                          rm: /usr/local/lib/snort/dynamicrules/smtp.so: No such file or directory
                                          rm: /usr/local/lib/snort/dynamicrules/p2p.so: No such file or directory
                                          rm: /usr/local/lib/snort/dynamicrules/nntp.so: No such file or directory
                                          rm: /usr/local/lib/snort/dynamicrules/netbios.so: No such file or directory
                                          rm: /usr/local/lib/snort/dynamicrules/multimedia.so: No such file or directory
                                          rm: /usr/local/lib/snort/dynamicrules/misc.so: No such file or directory
                                          rm: /usr/local/lib/snort/dynamicrules/imap.so: No such file or directory
                                          rm: /usr/local/lib/snort/dynamicrules/icmp.so: No such file or directory
                                          rm: /usr/local/lib/snort/dynamicrules/exploit.so: No such file or directory
                                          rm: /usr/local/lib/snort/dynamicrules/dos.so: No such file or directory
                                          rm: /usr/local/lib/snort/dynamicrules/chat.so: No such file or directory
                                          rm: /usr/local/lib/snort/dynamicrules/web-misc.so: No such file or directory
                                          rm: /usr/local/lib/snort/dynamic_preproc: No such file or directory
                                          rm: /usr/local/lib/snort/dynamicpreprocessor: No such file or directory
                                          /usr/local/share/examples/snort
                                          /usr/local/share/licenses/snort-2.9.2.3
                                          /usr/local/include/snort/dynamic_preproc
                                          /usr/local/include/snort
                                          rm: /usr/local/include/snort/dynamic_preproc: No such file or directory
                                          /usr/local/src/snort_dynamicsrc
                                          /var/db/pbi/.hashqueue/snort-2.9.2.3-i386
                                          
                                          
                                          1 Reply Last reply Reply Quote 0
                                          • J
                                            judex
                                            last edited by

                                            It is not fixed for my 2.0.1 system. I deleted the package an every file with snort in its name before reinstallation.
                                            Still the same warning in 2.5.0

                                            2.1-RELEASE (amd64)
                                            built on Wed Sep 11 18:17:48 EDT 2013
                                            FreeBSD 8.3-RELEASE-p11

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.