Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Snort 2.9.2.3 pkg v. 2.5.0 Issues

    Scheduled Pinned Locked Moved pfSense Packages
    331 Posts 38 Posters 228.3k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • F
      Fesoj
      last edited by

      Hi ermal,

      good job. For my purposes, snort is running smoothly now.

      I have also solved my problem of the 2nd interface on the LAN side that apparently did not work at all, where I was using the ET p2p rules. These rules worked on the WAN side, but not on the LAN side.

      There's no need to go int details here, but I'd like to say that it is (probably always was) necessary to look at the definition of the rules and how your environment is defined. If a rule is based on the HOME_NET, the local machines that are being monitored should also be part of the HOME_NET or the rule is essentially not active. In my case I had to augment the default HOME_NET by the client subnet to get the behavior I wanted.

      1 Reply Last reply Reply Quote 0
      • E
        eri--
        last edited by

        Fesoj,

        re-added sub-nets to the HOME_NET list, i had mistaken it with something else.
        Just re-install and should be good.

        1 Reply Last reply Reply Quote 0
        • J
          judex
          last edited by

          Hm, but now we have the WAN subnet back as 24 CIDR in HOME_NET

          2.1-RELEASE (amd64)
          built on Wed Sep 11 18:17:48 EDT 2013
          FreeBSD 8.3-RELEASE-p11

          1 Reply Last reply Reply Quote 0
          • E
            eri--
            last edited by

            Yeah its ok judex.

            1 Reply Last reply Reply Quote 0
            • B
              breusshe
              last edited by

              @ermal:

              @Cino:

              Added some more suggestions/issues to post http://forum.pfsense.org/index.php/topic,51387.msg275159.html#msg275159

              @breusshe

              If you dont mind changing commenting out some php code, you can get your 2nd WAN interface back:

              lines 82 and 83 in /usr/local/www/snort/snort_interfaces_edit.php

              make them look like this:

              
              #		if ($natent['interface'] == $_POST['interface'])
              #			$input_errors[] = "This interface is already configured for another instance";
              
              

              This allowed me to create another WAN interface, and it has a different ID:

              
               ps -aux | grep snort
              root   61341 23.7    ??  Ss    1:56PM   0:01.29 /usr/pbi/snort-i386/bin/snort -R 36745 -D -q -l /var/log/snort/snort_em336745 --pid-path /var/run --nolock-pidfile -G 36745 -c /usr/
              root   59209  0.2    ??  Ss    1:54PM   0:01.13 /usr/pbi/snort-i386/bin/snort -R 60770 -D -q -l /var/log/snort/snort_em360770 --pid-path /var/run --nolock-pidfile -G 60770 -c /usr/
              root    3143  0.0  0.3 13048  8384  ??  Ss    1:54PM   0:00.06 /usr/local/bin/barnyard2 -r 60770 -f snort_60770_em3.u2 --pid-path /var/run --nolock-pidfile -c /usr/local/etc/snort/snort_60770_em3
              root   35410  0.0  0.0  3536  1256   0  S+    1:56PM   0:00.01 grep snort
              
              

              Use event_filter configurations for this it makes no sense to do this!

              The above quotes are from the v2.4.2 issues posting, but I see the issue still applies, so I'm bringing the discussion here.

              @Ermal:  event_filter does not do what I want.  There are categories of rules that I wish to log, but don't want to block if they are seen.  I simply wish to monitor how prolific the event is.  Since there is no way to block some categories/rules while also only alerting for other categories without using two instances of snort on the same interface, it seems necessary to have this feature.

              Now, let's assume I'm mistaken and there is a way to have only one instance where some things are blocked while some are only noted in the snort logs using some filter command.  I would have to activate all of the categories/rules I want running on my interface and then manually identify all of those gen_id and sig_id numbers that I only wanted alerted, but not blocked.  Since those rule files contain multiple gen_id's I can't so something like "gen_id=xxx, sig_id=0" to change how a whole category is handled.  What you are asking us do to is an administrative nightmare.  Also, having all of this running through one instance means all snort matching will occur on one CPU core (since, last I checked, Snort wasn't very multi-core friendly) while how I run Snort allows multiple cores to be used, thus helping to prevent snort from getting swamped with requests.

              So, I ask you, even though you don't see the sense in it, please implement the edit that Cino suggests so multiple instances of Snort will run on one interface.  If nothing else, it makes management of Snort easier.

              1 Reply Last reply Reply Quote 0
              • B
                breusshe
                last edited by

                I have two other questions.

                1.)  Why is it that I can only save snort alerts to the system logs now?  Used to be we could choose between unified2 format, tcpdump, or system logs.  What was the reason for the change?

                2.)  What happened to "Define SSL_IGNORE"?  It's not on the preprocessors page nor does it seem to be anywhere else.

                1 Reply Last reply Reply Quote 0
                • E
                  eri--
                  last edited by

                  Reinstall you will be able to configure 2 ifaces.

                  The logtype was removed because:
                  barnyard logging will be enabled when you enable barnyard
                  alerts tab uses alert_csv format

                  syslog exporting remains the other thing you want to enable disable.

                  1 Reply Last reply Reply Quote 0
                  • B
                    breusshe
                    last edited by

                    @ermal:

                    Reinstall you will be able to configure 2 ifaces.

                    The logtype was removed because:
                    barnyard logging will be enabled when you enable barnyard
                    alerts tab uses alert_csv format

                    syslog exporting remains the other thing you want to enable disable.

                    Thank you, Ermal.  Is it still true with barnyard2 that the sql server is not installed on pfsense?  I'm a home user, myself, so I don't have extra servers just lying around simply for a sql database.  I know it isn't "recommended" to have sql server running on an Internet facing system, but if it is locked down to only the localhost interface, the risks are acceptable for a home user.  Hmmm.  I wonder if a "mySQL for Barnyard2" package could be built?  You obviously build packages, Ermal.  Do you mind pointing me to the documentation on how one adds a package to the pfSense Package Manager?

                    1 Reply Last reply Reply Quote 0
                    • B
                      breusshe
                      last edited by

                      @ermal:

                      Reinstall you will be able to configure 2 ifaces.

                      The logtype was removed because:
                      barnyard logging will be enabled when you enable barnyard
                      alerts tab uses alert_csv format

                      syslog exporting remains the other thing you want to enable disable.

                      Just did the reinstall.  I get this error:

                      FATAL ERROR: Failed to load /usr/local/lib/snort/dynamicrules/bad-traffic.so: /usr/local/lib/snort/dynamicrules/bad-traffic.so: Undefined symbol "freeRuleData"

                      The funny part is I'm not even using bad-traffic.so.  Not sure why it is even loading.

                      1 Reply Last reply Reply Quote 0
                      • E
                        eri--
                        last edited by

                        breusshe because snort is just going to dump/exit if i put only enabled so rules and libs.

                        1 Reply Last reply Reply Quote 0
                        • E
                          eri--
                          last edited by

                          @breusshe:

                          @ermal:

                          @Cino:

                          Added some more suggestions/issues to post http://forum.pfsense.org/index.php/topic,51387.msg275159.html#msg275159

                          @breusshe

                          If you dont mind changing commenting out some php code, you can get your 2nd WAN interface back:

                          lines 82 and 83 in /usr/local/www/snort/snort_interfaces_edit.php

                          make them look like this:

                          
                          #		if ($natent['interface'] == $_POST['interface'])
                          #			$input_errors[] = "This interface is already configured for another instance";
                          
                          

                          This allowed me to create another WAN interface, and it has a different ID:

                          
                           ps -aux | grep snort
                          root   61341 23.7    ??  Ss    1:56PM   0:01.29 /usr/pbi/snort-i386/bin/snort -R 36745 -D -q -l /var/log/snort/snort_em336745 --pid-path /var/run --nolock-pidfile -G 36745 -c /usr/
                          root   59209  0.2    ??  Ss    1:54PM   0:01.13 /usr/pbi/snort-i386/bin/snort -R 60770 -D -q -l /var/log/snort/snort_em360770 --pid-path /var/run --nolock-pidfile -G 60770 -c /usr/
                          root    3143  0.0  0.3 13048  8384  ??  Ss    1:54PM   0:00.06 /usr/local/bin/barnyard2 -r 60770 -f snort_60770_em3.u2 --pid-path /var/run --nolock-pidfile -c /usr/local/etc/snort/snort_60770_em3
                          root   35410  0.0  0.0  3536  1256   0  S+    1:56PM   0:00.01 grep snort
                          
                          

                          Use event_filter configurations for this it makes no sense to do this!

                          The above quotes are from the v2.4.2 issues posting, but I see the issue still applies, so I'm bringing the discussion here.

                          @Ermal:  event_filter does not do what I want.  There are categories of rules that I wish to log, but don't want to block if they are seen.  I simply wish to monitor how prolific the event is.  Since there is no way to block some categories/rules while also only alerting for other categories without using two instances of snort on the same interface, it seems necessary to have this feature.

                          Now, let's assume I'm mistaken and there is a way to have only one instance where some things are blocked while some are only noted in the snort logs using some filter command.  I would have to activate all of the categories/rules I want running on my interface and then manually identify all of those gen_id and sig_id numbers that I only wanted alerted, but not blocked.  Since those rule files contain multiple gen_id's I can't so something like "gen_id=xxx, sig_id=0" to change how a whole category is handled.  What you are asking us do to is an administrative nightmare.  Also, having all of this running through one instance means all snort matching will occur on one CPU core (since, last I checked, Snort wasn't very multi-core friendly) while how I run Snort allows multiple cores to be used, thus helping to prevent snort from getting swamped with requests.

                          So, I ask you, even though you don't see the sense in it, please implement the edit that Cino suggests so multiple instances of Snort will run on one interface.  If nothing else, it makes management of Snort easier.

                          My fix to this would be to make alert_pf understand a kind of suppress type list to block also.
                          This would make your setup usable with one instance.
                          Though for now i want go into that implementation anyhow.

                          1 Reply Last reply Reply Quote 0
                          • E
                            eri--
                            last edited by

                            @breusshe:

                            @ermal:

                            Reinstall you will be able to configure 2 ifaces.

                            The logtype was removed because:
                            barnyard logging will be enabled when you enable barnyard
                            alerts tab uses alert_csv format

                            syslog exporting remains the other thing you want to enable disable.

                            Thank you, Ermal.  Is it still true with barnyard2 that the sql server is not installed on pfsense?  I'm a home user, myself, so I don't have extra servers just lying around simply for a sql database.  I know it isn't "recommended" to have sql server running on an Internet facing system, but if it is locked down to only the localhost interface, the risks are acceptable for a home user.  Hmmm.  I wonder if a "mySQL for Barnyard2" package could be built?  You obviously build packages, Ermal.  Do you mind pointing me to the documentation on how one adds a package to the pfSense Package Manager?

                            Just add yourself the mysql-server package.

                            1 Reply Last reply Reply Quote 0
                            • D
                              dwood
                              last edited by

                              Ermal, when enabling sensitive data pre-processor, whitelisted IPs are possibly ignored.  I've added an IMAP provider to the whitelist, however this whitelisted IP is being blocked by sensitive data email rule.  Adding to suppress list seems to work after restarting interfaces. AMD64, 2.0.1

                              Cheers,
                              Dennis.

                              1 Reply Last reply Reply Quote 0
                              • B
                                breusshe
                                last edited by

                                So, to deal with the error I'm getting after the latest reinstall, I dumped my config and uninstalled Snort.  I reinstalled, and started to reconfigure.  On the "Server" tab in one of the instances I'm configuring, I tried adding some port numbers, which I've done in the past, and got the following message:

                                The following input errors were detected:

                                Only aliases are allowed

                                For instance, I'm trying to set "Define IMAP_PORTS" to the value:  143,993.  The field states that "143" is the default and suggests examples "25,443" and "5060:5090".  However, the above error message seems to imply I need to use some sort of alias now.  Is this a new bug?

                                1 Reply Last reply Reply Quote 0
                                • J
                                  judex
                                  last edited by

                                  That is a new feature!
                                  https://github.com/bsdperimeter/pfsense-packages/commit/92fc14e2e523e2c314868fd861a80d0a25bd7549
                                  Judged by last days commits ermal is unstoppable at the moment  ;D

                                  2.1-RELEASE (amd64)
                                  built on Wed Sep 11 18:17:48 EDT 2013
                                  FreeBSD 8.3-RELEASE-p11

                                  1 Reply Last reply Reply Quote 0
                                  • F
                                    Fesoj
                                    last edited by

                                    breusshe,

                                    aliases are defined under Firewall: Aliases:

                                    Worked for me when I modified the HOME_NET.

                                    1 Reply Last reply Reply Quote 0
                                    • B
                                      breusshe
                                      last edited by

                                      @ermal:

                                      Just add yourself the mysql-server package.

                                      Yeah, I've tried that before.  The problem is that mysql-server isn't part of the pfsense repository and the release that pfsense 2.0.1 is built from doesn't exist any longer in FreeBSD's repos.  So, to get server, I have to upgrade mysql-client, which forces me to update other stuff as well.  None of it is from the normal repos for pfsense which causes problems with package upgrades in the future.  So, to do this, I'd have to get mysql-server (of the correct version) and its dependencies added to the pfsense repos and installable from the Package Manager.

                                      1 Reply Last reply Reply Quote 0
                                      • B
                                        breusshe
                                        last edited by

                                        @judex:

                                        That is a new feature!
                                        https://github.com/bsdperimeter/pfsense-packages/commit/92fc14e2e523e2c314868fd861a80d0a25bd7549
                                        Judged by last days commits ermal is unstoppable at the moment  ;D

                                        Ah, okay.  I'll add aliases there.  Thanks, Judex and Fesoj.

                                        1 Reply Last reply Reply Quote 0
                                        • B
                                          breusshe
                                          last edited by

                                          @breusshe:

                                          Just did the reinstall.  I get this error:

                                          FATAL ERROR: Failed to load /usr/local/lib/snort/dynamicrules/bad-traffic.so: /usr/local/lib/snort/dynamicrules/bad-traffic.so: Undefined symbol "freeRuleData"

                                          The funny part is I'm not even using bad-traffic.so.  Not sure why it is even loading.

                                          Uninstall and wipe of config, then reinstall seems to have fixed this.  Not sure what was causing it.  But, snort starts up just fine now.  Just waiting to see if I can catch alerts.

                                          1 Reply Last reply Reply Quote 0
                                          • F
                                            Fesoj
                                            last edited by

                                            This is just inquiring on how to do updates in an economical way.

                                            In emergency situations one could always update from github (github.com/bsdperimeter/pfsense-packages).

                                            The regular package updates seem to come from  http://files.pfsense.com/packages/8/All/, but it takes some time after updating the repository before the regular package update has the latest version (hours?). Since not every package update is accompanied by a change of the version string, it is rather difficult to see, whether the advertised updates from the forum are going to be installed or not. Currently snort-2.9.2.3-i386.pbi is still from yesterday 2012-Jul-15 21:11:02, so a regular update (System: Packages:) doesn't really update anything. It looks to me that some of the recent messages can be explained by this setup.

                                            It's not about making things faster, but to know when the update will actually be available. I wouldn't mind having a 4 digit version string for the package. Another method would be to base the update on the associated md5 hashes.

                                            Am I here off base, or does this remark that make some sense?

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.