Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Snort 2.9.2.3 pkg v. 2.5.1 service fails overnight, unable to restart

    Scheduled Pinned Locked Moved pfSense Packages
    65 Posts 14 Posters 22.7k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • C
      caustic386
      last edited by

      @blundar:

      I set up the package on 7/27 on PF2.01/Amd64

      When the updates processed (last night I think) things broke.  I removed the package, reinstalled about 3pm EST and it seems to have fixed things.  Just FYI.

      This is my exact setup, and I'm still having trouble after a few re-installs.  Fails overnight, restart manually is successful.

      1 Reply Last reply Reply Quote 0
      • B
        blundar
        last edited by

        I must eat my words!  Snort died again last night!

        from logs:

        
        20	snort[32228]: Initializing rule chains...
        Jul 31 12:03:20	snort[32228]: FATAL ERROR: /usr/local/etc/snort/snort_13690_em0/preproc_rules/sensitive-data.rules(1) Unknown ClassType: sdf
        Jul 31 12:03:20	snort[32228]: FATAL ERROR: /usr/local/etc/snort/snort_13690_em0/preproc_rules/sensitive-data.rules(1) Unknown ClassType: sdf
        Jul 31 12:03:20	php: : Snort has restarted with your new set of rules...
        Jul 31 12:03:20	kernel: em0: promiscuous mode disabled
        
        

        Unchecking the "sensitive-data" checkbox for the CC# check, etc. in preprocessors was enough to get snort running again, albeit without some useful checks.

        1 Reply Last reply Reply Quote 0
        • C
          caustic386
          last edited by

          @blundar:

          I must eat my words!  Snort died again last night!

          Unchecking the "sensitive-data" checkbox for the CC# check, etc. in preprocessors was enough to get snort running again, albeit without some useful checks.

          This is my exact same issue.  I'm not sure how to find logs for past snort events?

          1 Reply Last reply Reply Quote 0
          • B
            blundar
            last edited by

            Services… System logs.

            1 Reply Last reply Reply Quote 0
            • C
              caustic386
              last edited by

              @blundar:

              Services… System logs.

              Unfortunately it only displays the last 50 events, which doesn't take me back to the overnight failure.

              1 Reply Last reply Reply Quote 0
              • F
                Fesoj
                last edited by

                blundar,

                the sdf problem is known for quite a while and if you search backwards in this thread you'll find a way of handling it.

                1 Reply Last reply Reply Quote 0
                • B
                  blundar
                  last edited by

                  you can change the number of lines using the settings tab.  I have mine set to 500.

                  1 Reply Last reply Reply Quote 0
                  • C
                    caustic386
                    last edited by

                    @blundar:

                    you can change the number of lines using the settings tab.  I have mine set to 500.

                    Thanks - can't believe I never noticed that.  I'll check it again first thing in the AM.

                    1 Reply Last reply Reply Quote 0
                    • C
                      Cino
                      last edited by

                      dumb question, is everyone seeing updated rules? Since Sunday, i've had the same hash:

                      SNORT.ORG >>>   "7017498f85ec6d0fc34c904c950ed8c1"
                      EMERGINGTHREATS.NET >>>   13611f17ed1c94d40c8f0a78566dbb90

                      I've been deleting the hash to force a manual update.. The auto update kicks off but nothing is downloaded since there isn't a new hash

                      1 Reply Last reply Reply Quote 0
                      • C
                        caustic386
                        last edited by

                        @Cino:

                        dumb question, are is everyone seeing updated rules? Since Sunday, i've had the same hash:

                        SNORT.ORG >>>   "7017498f85ec6d0fc34c904c950ed8c1"
                        EMERGINGTHREATS.NET >>>   13611f17ed1c94d40c8f0a78566dbb90

                        I've been deleting the hash to force a manual update.. The auto update kicks off but nothing is downloaded since there isn't a new hash

                        Sunday-Monday was the only day snort did not fail during updates, so it's possible there just weren't any that night.  I can't account for Monday, however.

                        1 Reply Last reply Reply Quote 0
                        • J
                          judex
                          last edited by

                          You can check the actual MD5 Hash of "Only Registered Users" here:

                          http://www.snort.org/downloads/1778/show_md5

                          It is still:
                          "7017498f85ec6d0fc34c904c950ed8c1"

                          I am also checking that, because I also suspect snort to only update ET rules automatically. Manual updates work so far.

                          Greets, Judex

                          2.1-RELEASE (amd64)
                          built on Wed Sep 11 18:17:48 EDT 2013
                          FreeBSD 8.3-RELEASE-p11

                          1 Reply Last reply Reply Quote 0
                          • C
                            Cino
                            last edited by

                            auto update finally kicked for snort for me… 2 test boxes fresh installs of pfsense and snort...

                            box with using snort and et with sensitive data preprocessor enabled: failed to reload, the usually error everyone is seeing
                            box with using snort and et with sensitive data preprocessor disabled: reloaded fine

                            IMHO, I feel the sensitive preprocessor option should be removed from snort until a working fix can be applied to the package. or a warning that auto updates should be disabled and and to run updates manually

                            1 Reply Last reply Reply Quote 0
                            • C
                              caustic386
                              last edited by

                              Finally getting back to the original post, I think this is what's causing the issue:

                              kernel: pid 31475 (snort), uid 0, was killed: out of swap space

                              As a test, I disabled updates.  As expected, snort ran fine until I did a manual update.  The error above was what showed up after running the update.  Restarting snort by hand brought success.

                              Is the swap space error helpful?  I do not have a swap partition on my install, as I have significant excess RAM.

                              1 Reply Last reply Reply Quote 0
                              • First post
                                Last post
                              Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.