Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Snort 2.9.4.1 pkg v. 2.5.5 Issue(s)

    Scheduled Pinned Locked Moved pfSense Packages
    111 Posts 14 Posters 30.1k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • AhnHELA
      AhnHEL
      last edited by

      What does your Snort Update Log state?  I saw in my own update logs where Snort was down a few days ago at a certain time after midnight and my download failed.  Could just be a possible download failure which resides on snort.org side of things which will resolve itself later.

      Will take a while Bill before others get used to checking on their update logs as well as the system logs when they have issues.  Great feature to have now, thanks to Bmeeks.

      AhnHEL (Angel)

      1 Reply Last reply Reply Quote 0
      • AhnHELA
        AhnHEL
        last edited by

        Looking through my own update logs in response to Asterix' issue I noticed the following:

        Starting rules update...  Time: 2013-04-15 00:03:01
        	Downloading Snort VRT md5 file...
        Starting rules update...  Time: 2013-04-15 00:03:01
        	Downloading Snort VRT md5 file...
        Starting rules update...  Time: 2013-04-15 00:03:01
        	Downloading Snort VRT md5 file...
        	Checking Snort VRT md5 file...
        	Snort VRT rules are up to date.
        	Downloading Snort GPLv2 Community Rules md5 file...
        	Checking Snort GPLv2 Community Rules md5.
        	Snort GPLv2 Community Rules are up to date.
        	Downloading EmergingThreats md5 file...
        	Checking EmergingThreats md5.
        	Emerging Threats rules are up to date.
        The Rules update has finished.  Time: 2013-04-15 00:03:57
        
        	Checking Snort VRT md5 file...
        	Snort VRT rules are up to date.
        	Downloading Snort GPLv2 Community Rules md5 file...
        	Checking Snort GPLv2 Community Rules md5.
        	Snort GPLv2 Community Rules are up to date.
        	Downloading EmergingThreats md5 file...
        	Checking EmergingThreats md5.
        	Emerging Threats rules are up to date.
        The Rules update has finished.  Time: 2013-04-15 00:05:31
        
        	Checking Snort VRT md5 file...
        	Snort VRT rules are up to date.
        	Downloading Snort GPLv2 Community Rules md5 file...
        	Checking Snort GPLv2 Community Rules md5.
        	Snort GPLv2 Community Rules are up to date.
        	Downloading EmergingThreats md5 file...
        	Checking EmergingThreats md5.
        	Emerging Threats rules are up to date.
        The Rules update has finished.  Time: 2013-04-15 00:06:28
        
        

        Cron only has the 'check for rule updates' command listed once.  I only have Snort running on one interface and I confirmed there is only one instance of the Snort process running but it seems to have attempted the download 3x simultaneously last night.  Any thoughts Bill?

        Update:  Looking at my other 2 boxes, they both show two simultaneous attempts at Update time.

        AhnHEL (Angel)

        1 Reply Last reply Reply Quote 0
        • C
          Cino
          last edited by

          @AhnHEL:

          @Cino:

          I'm using Snort Basic VRT Rules, Snort GPLv2, and Emerging Threats rule sets.  I've also noticed that auto blocking is removing IPs after 5 minutes instead of an hour. The cron job looks like this

          Are you still seeing this Cino?  I'm not getting this at all using the same rulesets, same cron job.

          Anyone else having this issue? IPs are removed from the block list after 5 minutes when the cron job is run. I've check the snort2c table and they aren't there anymore. Any ideas?

          1 Reply Last reply Reply Quote 0
          • bmeeksB
            bmeeks
            last edited by

            @AhnHEL:

            Looking through my own update logs in response to Asterix' issue I noticed the following:

            Starting rules update...  Time: 2013-04-15 00:03:01
            	Downloading Snort VRT md5 file...
            Starting rules update...  Time: 2013-04-15 00:03:01
            	Downloading Snort VRT md5 file...
            Starting rules update...  Time: 2013-04-15 00:03:01
            	Downloading Snort VRT md5 file...
            	Checking Snort VRT md5 file...
            	Snort VRT rules are up to date.
            	Downloading Snort GPLv2 Community Rules md5 file...
            	Checking Snort GPLv2 Community Rules md5.
            	Snort GPLv2 Community Rules are up to date.
            	Downloading EmergingThreats md5 file...
            	Checking EmergingThreats md5.
            	Emerging Threats rules are up to date.
            The Rules update has finished.  Time: 2013-04-15 00:03:57
            
            	Checking Snort VRT md5 file...
            	Snort VRT rules are up to date.
            	Downloading Snort GPLv2 Community Rules md5 file...
            	Checking Snort GPLv2 Community Rules md5.
            	Snort GPLv2 Community Rules are up to date.
            	Downloading EmergingThreats md5 file...
            	Checking EmergingThreats md5.
            	Emerging Threats rules are up to date.
            The Rules update has finished.  Time: 2013-04-15 00:05:31
            
            	Checking Snort VRT md5 file...
            	Snort VRT rules are up to date.
            	Downloading Snort GPLv2 Community Rules md5 file...
            	Checking Snort GPLv2 Community Rules md5.
            	Snort GPLv2 Community Rules are up to date.
            	Downloading EmergingThreats md5 file...
            	Checking EmergingThreats md5.
            	Emerging Threats rules are up to date.
            The Rules update has finished.  Time: 2013-04-15 00:06:28
            
            

            Cron only has the 'check for rule updates' command listed once.  I only have Snort running on one interface and I confirmed there is only one instance of the Snort process running but it seems to have attempted the download 3x simultaneously last night.  Any thoughts Bill?

            Update:  Looking at my other 2 boxes, they both show two simultaneous attempts at Update time.

            I have never seen this behavior.  Here are the Update Logs from my production LAN firewall.  The couple of times that are not 12-hour intervals are when I forced a manual update and one today when I upgraded to the new 2.0.3 release.

            Starting rules update...  Time: 2013-04-08 19:06:22
            	Downloading Snort VRT md5 file...
            	Checking Snort VRT md5 file...
            	Snort VRT rules are up to date.
            	Downloading EmergingThreats md5 file...
            	Checking EmergingThreats md5.
            	Emerging Threats rules are up to date.
            The Rules update has finished.  Time: 2013-04-08 19:06:24
            
            Starting rules update...  Time: 2013-04-09 00:03:01
            	Downloading Snort VRT md5 file...
            	Checking Snort VRT md5 file...
            	Snort VRT rules are up to date.
            	Downloading EmergingThreats md5 file...
            	Checking EmergingThreats md5.
            	There is a new set of EmergingThreats rules posted. Downloading...
            	Done downloading EmergingThreats rules file.
            	Extracting and installing EmergingThreats.org rules...
            	Installation of EmergingThreats.org rules completed.
            	Copying new config and map files...
            	Updating rules configuration for: WAN ...
            	Signalling Snort to load new rules for: WAN ...
            	Updating rules configuration for: DMZ ...
            	Signalling Snort to load new rules for: DMZ ...
            	Updating rules configuration for: LAN ...
            	Signalling Snort to load new rules for: LAN ...
            The Rules update has finished.  Time: 2013-04-09 00:05:35
            
            Starting rules update...  Time: 2013-04-09 12:03:01
            	Downloading Snort VRT md5 file...
            	Checking Snort VRT md5 file...
            	Snort VRT rules are up to date.
            	Downloading EmergingThreats md5 file...
            	Checking EmergingThreats md5.
            	Emerging Threats rules are up to date.
            The Rules update has finished.  Time: 2013-04-09 12:04:46
            
            Starting rules update...  Time: 2013-04-10 00:03:01
            	Downloading Snort VRT md5 file...
            	Checking Snort VRT md5 file...
            	There is a new set of Snort VRT rules posted. Downloading...
            	Done downloading rules file.
            	Downloading EmergingThreats md5 file...
            	Checking EmergingThreats md5.
            	There is a new set of EmergingThreats rules posted. Downloading...
            	Done downloading EmergingThreats rules file.
            	Extracting and installing EmergingThreats.org rules...
            	Installation of EmergingThreats.org rules completed.
            	Extracting and installing Snort VRT rules...
            	Using Snort VRT precompiled SO rules for FreeBSD-8-1 ...
            	Installation of Snort VRT rules completed.
            	Copying new config and map files...
            	Updating rules configuration for: WAN ...
            	Updating rules configuration for: DMZ ...
            	Updating rules configuration for: LAN ...
            	Restarting Snort to activate the new set of rules...
            	Snort has restarted with your new set of rules.
            The Rules update has finished.  Time: 2013-04-10 00:08:52
            
            Starting rules update...  Time: 2013-04-10 12:03:01
            	Downloading Snort VRT md5 file...
            	Checking Snort VRT md5 file...
            	Snort VRT rules are up to date.
            	Downloading EmergingThreats md5 file...
            	Checking EmergingThreats md5.
            	Emerging Threats rules are up to date.
            The Rules update has finished.  Time: 2013-04-10 12:04:39
            
            Starting rules update...  Time: 2013-04-10 21:51:37
            	Downloading Snort VRT md5 file...
            	Checking Snort VRT md5 file...
            	There is a new set of Snort VRT rules posted. Downloading...
            	Done downloading rules file.
            	Downloading EmergingThreats md5 file...
            	Checking EmergingThreats md5.
            	There is a new set of EmergingThreats rules posted. Downloading...
            	Done downloading EmergingThreats rules file.
            	Extracting and installing EmergingThreats.org rules...
            	Installation of EmergingThreats.org rules completed.
            	Extracting and installing Snort VRT rules...
            	Using Snort VRT precompiled SO rules for FreeBSD-8-1 ...
            	Installation of Snort VRT rules completed.
            	Copying new config and map files...
            	Updating rules configuration for: WAN ...
            	Updating rules configuration for: DMZ ...
            	Updating rules configuration for: LAN ...
            The Rules update has finished.  Time: 2013-04-10 21:54:45
            
            Starting rules update...  Time: 2013-04-11 00:03:01
            	Downloading Snort VRT md5 file...
            	Checking Snort VRT md5 file...
            	Snort VRT rules are up to date.
            	Downloading EmergingThreats md5 file...
            	Checking EmergingThreats md5.
            	Emerging Threats rules are up to date.
            The Rules update has finished.  Time: 2013-04-11 00:06:54
            
            Starting rules update...  Time: 2013-04-11 12:03:01
            	Downloading Snort VRT md5 file...
            	Checking Snort VRT md5 file...
            	Snort VRT rules are up to date.
            	Downloading EmergingThreats md5 file...
            	Checking EmergingThreats md5.
            	Emerging Threats rules are up to date.
            The Rules update has finished.  Time: 2013-04-11 12:04:57
            
            Starting rules update...  Time: 2013-04-12 00:03:01
            	Downloading Snort VRT md5 file...
            	Checking Snort VRT md5 file...
            	There is a new set of Snort VRT rules posted. Downloading...
            	Done downloading rules file.
            	Downloading EmergingThreats md5 file...
            	Checking EmergingThreats md5.
            	There is a new set of EmergingThreats rules posted. Downloading...
            	Done downloading EmergingThreats rules file.
            	Extracting and installing EmergingThreats.org rules...
            	Installation of EmergingThreats.org rules completed.
            	Extracting and installing Snort VRT rules...
            	Using Snort VRT precompiled SO rules for FreeBSD-8-1 ...
            	Installation of Snort VRT rules completed.
            	Copying new config and map files...
            	Updating rules configuration for: WAN ...
            	Updating rules configuration for: DMZ ...
            	Updating rules configuration for: LAN ...
            	Restarting Snort to activate the new set of rules...
            	Snort has restarted with your new set of rules.
            The Rules update has finished.  Time: 2013-04-12 00:08:38
            
            Starting rules update...  Time: 2013-04-12 12:03:00
            	Downloading Snort VRT md5 file...
            	Checking Snort VRT md5 file...
            	Snort VRT rules are up to date.
            	Downloading EmergingThreats md5 file...
            	Checking EmergingThreats md5.
            	Emerging Threats rules are up to date.
            The Rules update has finished.  Time: 2013-04-12 12:04:48
            
            Starting rules update...  Time: 2013-04-13 00:03:00
            	Downloading Snort VRT md5 file...
            	Checking Snort VRT md5 file...
            	Snort VRT rules are up to date.
            	Downloading EmergingThreats md5 file...
            	Checking EmergingThreats md5.
            	There is a new set of EmergingThreats rules posted. Downloading...
            	Done downloading EmergingThreats rules file.
            	Extracting and installing EmergingThreats.org rules...
            	Installation of EmergingThreats.org rules completed.
            	Copying new config and map files...
            	Updating rules configuration for: WAN ...
            	Updating rules configuration for: DMZ ...
            	Updating rules configuration for: LAN ...
            	Restarting Snort to activate the new set of rules...
            	Snort has restarted with your new set of rules.
            The Rules update has finished.  Time: 2013-04-13 00:04:40
            
            Starting rules update...  Time: 2013-04-13 12:03:02
            	Downloading Snort VRT md5 file...
            	Checking Snort VRT md5 file...
            	Snort VRT rules are up to date.
            	Downloading EmergingThreats md5 file...
            	Checking EmergingThreats md5.
            	Emerging Threats rules are up to date.
            The Rules update has finished.  Time: 2013-04-13 12:04:41
            
            Starting rules update...  Time: 2013-04-13 19:10:25
            	Downloading Snort VRT md5 file...
            	Checking Snort VRT md5 file...
            	Snort VRT rules are up to date.
            	Downloading EmergingThreats md5 file...
            	Checking EmergingThreats md5.
            	There is a new set of EmergingThreats rules posted. Downloading...
            	Done downloading EmergingThreats rules file.
            	Extracting and installing EmergingThreats.org rules...
            	Installation of EmergingThreats.org rules completed.
            	Copying new config and map files...
            	Updating rules configuration for: WAN ...
            	Updating rules configuration for: DMZ ...
            	Updating rules configuration for: LAN ...
            	Restarting Snort to activate the new set of rules...
            	Snort has restarted with your new set of rules.
            The Rules update has finished.  Time: 2013-04-13 19:12:06
            
            Starting rules update...  Time: 2013-04-14 00:03:01
            	Downloading Snort VRT md5 file...
            	Checking Snort VRT md5 file...
            	Snort VRT rules are up to date.
            	Downloading EmergingThreats md5 file...
            	Checking EmergingThreats md5.
            	Emerging Threats rules are up to date.
            The Rules update has finished.  Time: 2013-04-14 00:06:12
            
            Starting rules update...  Time: 2013-04-14 12:03:01
            	Downloading Snort VRT md5 file...
            	Checking Snort VRT md5 file...
            	Snort VRT rules are up to date.
            	Downloading EmergingThreats md5 file...
            	Checking EmergingThreats md5.
            	There is a new set of EmergingThreats rules posted. Downloading...
            	Done downloading EmergingThreats rules file.
            	Extracting and installing EmergingThreats.org rules...
            	Installation of EmergingThreats.org rules completed.
            	Copying new config and map files...
            	Updating rules configuration for: WAN ...
            	Updating rules configuration for: DMZ ...
            	Updating rules configuration for: LAN ...
            	Restarting Snort to activate the new set of rules...
            	Snort has restarted with your new set of rules.
            The Rules update has finished.  Time: 2013-04-14 12:05:32
            
            Starting rules update...  Time: 2013-04-15 00:03:01
            	Downloading Snort VRT md5 file...
            	Checking Snort VRT md5 file...
            	Snort VRT rules are up to date.
            	Downloading EmergingThreats md5 file...
            	Checking EmergingThreats md5.
            	Emerging Threats rules are up to date.
            The Rules update has finished.  Time: 2013-04-15 00:03:48
            
            Starting rules update...  Time: 2013-04-15 12:03:01
            	Downloading Snort VRT md5 file...
            	Checking Snort VRT md5 file...
            	Snort VRT rules are up to date.
            	Downloading EmergingThreats md5 file...
            	Checking EmergingThreats md5.
            	Emerging Threats rules are up to date.
            The Rules update has finished.  Time: 2013-04-15 12:05:02
            
            Starting rules update...  Time: 2013-04-15 18:03:41
            	Downloading Snort VRT md5 file...
            	Checking Snort VRT md5 file...
            	There is a new set of Snort VRT rules posted. Downloading...
            	Done downloading rules file.
            	Downloading EmergingThreats md5 file...
            	Checking EmergingThreats md5.
            	There is a new set of EmergingThreats rules posted. Downloading...
            	Done downloading EmergingThreats rules file.
            	Extracting and installing EmergingThreats.org rules...
            	Installation of EmergingThreats.org rules completed.
            	Extracting and installing Snort VRT rules...
            	Using Snort VRT precompiled SO rules for FreeBSD-8-1 ...
            	Installation of Snort VRT rules completed.
            	Copying new config and map files...
            	Updating rules configuration for: WAN ...
            	Updating rules configuration for: DMZ ...
            	Updating rules configuration for: LAN ...
            The Rules update has finished.  Time: 2013-04-15 18:06:45
            
            

            I really don't know what could cause simultaneous updates to kick off except multiple cron jobs.  I have the i386 version of 2.0.3.  All the stuff for it is stored in /usr/local/etc/snort.  For 2.1-BETA platforms, all the Snort stuff is now stored in /usr/pbi/snort-{arch}/.  Don't know if this might somehow translate into multiple crontab setups or not.  Just hypothesizing at the moment…

            Also take a look in the /conf/config.xml file in the [cron] section to see what is listed there (and how many times).

            Bill

            1 Reply Last reply Reply Quote 0
            • bmeeksB
              bmeeks
              last edited by

              @Cino:

              Anyone else having this issue? IPs are removed from the block list after 5 minutes when the cron job is run. I've check the snort2c table and they aren't there anymore. Any ideas?

              I have not timed mine, but I think the blocks are lasting for an hour.  That's what I have mine set for.  How is the time on your firewall synchronized?  Does it have a NTP source to sync with, and is it holding the correct time?

              Bill

              1 Reply Last reply Reply Quote 0
              • bmeeksB
                bmeeks
                last edited by

                @AhnHEL:

                I saw in my own update logs where Snort was down a few days ago at a certain time after midnight and my download failed.  Could just be a possible download failure which resides on snort.org side of things which will resolve itself later.

                The Snort Community Rules are hosted on an Amazon web services server and not the Snort.org site, so it would take an issue with Amazon's server farm to kill the Community Rules download.  Only the Snort VRT rules are hosted at Snort.org.

                Here is the URL for the Snort Community GPLv2 Rules:  https://s3.amazonaws.com/snort-org/www/rules/community/community-rules.tar.gz

                Bill

                1 Reply Last reply Reply Quote 0
                • C
                  Cino
                  last edited by

                  @bmeeks:

                  @Cino:

                  Anyone else having this issue? IPs are removed from the block list after 5 minutes when the cron job is run. I've check the snort2c table and they aren't there anymore. Any ideas?

                  I have not timed mine, but I think the blocks are lasting for an hour.  That's what I have mine set for.  How is the time on your firewall synchronized?  Does it have a NTP source to sync with, and is it holding the correct time?

                  Bill

                  It syncs with a local NTP server in my time zone and if its not available then it syncs with couple from pool.ntp.org. The time is holding as far as I can tell…

                  1 Reply Last reply Reply Quote 0
                  • AhnHELA
                    AhnHEL
                    last edited by

                    @bmeeks:

                    Also take a look in the /conf/config.xml file in the [cron] section to see what is listed there (and how many times).

                    Looks normal enough, no duplicates.

                     <cron><minute>0</minute>
                    			<hour>*</hour>
                    			<mday>*</mday>
                    			<month>*</month>
                    			<wday>*</wday>
                    			<who>root</who>
                    			<command></command>/usr/bin/nice -n20 newsyslog 
                    		 <minute>1,31</minute>
                    			<hour>0-5</hour>
                    			<mday>*</mday>
                    			<month>*</month>
                    			<wday>*</wday>
                    			<who>root</who>
                    			<command></command>/usr/bin/nice -n20 adjkerntz -a 
                    		 <minute>1</minute>
                    			<hour>3</hour>
                    			<mday>1</mday>
                    			<month>*</month>
                    			<wday>*</wday>
                    			<who>root</who>
                    			<command></command>/usr/bin/nice -n20 /etc/rc.update_bogons.sh 
                    		 <minute>*/60</minute>
                    			<hour>*</hour>
                    			<mday>*</mday>
                    			<month>*</month>
                    			<wday>*</wday>
                    			<who>root</who>
                    			<command></command>/usr/bin/nice -n20 /usr/local/sbin/expiretable -v -t 3600 sshlockout 
                    		 <minute>1</minute>
                    			<hour>1</hour>
                    			<mday>*</mday>
                    			<month>*</month>
                    			<wday>*</wday>
                    			<who>root</who>
                    			<command></command>/usr/bin/nice -n20 /etc/rc.dyndns.update 
                    		 <minute>*/60</minute>
                    			<hour>*</hour>
                    			<mday>*</mday>
                    			<month>*</month>
                    			<wday>*</wday>
                    			<who>root</who>
                    			<command></command>/usr/bin/nice -n20 /usr/local/sbin/expiretable -v -t 3600 virusprot 
                    		 <minute>30</minute>
                    			<hour>12</hour>
                    			<mday>*</mday>
                    			<month>*</month>
                    			<wday>*</wday>
                    			<who>root</who>
                    			<command></command>/usr/bin/nice -n20 /etc/rc.update_urltables 
                    		 <minute>*/5</minute>
                    			<hour>*</hour>
                    			<mday>*</mday>
                    			<month>*</month>
                    			<wday>*</wday>
                    			<who>root</who>
                    			<command></command>/usr/bin/nice -n20 /usr/local/bin/php -f /usr/local/pkg/snort/snort_check_cron_misc.inc 
                    		 <minute>*/5</minute>
                    			<hour>*</hour>
                    			<mday>*</mday>
                    			<month>*</month>
                    			<wday>*</wday>
                    			<who>root</who>
                    			<command></command>/usr/bin/nice -n20 /usr/local/sbin/expiretable -t 3600 snort2c 
                    		 <minute>3</minute>
                    			<hour>0</hour>
                    			<mday>*/1</mday>
                    			<month>*</month>
                    			<wday>*</wday>
                    			<who>root</who>
                    			<command></command>/usr/bin/nice -n20 /usr/local/bin/php -f /usr/local/pkg/snort/snort_check_for_rule_updates.php >> /tmp/snort_update.log</cron> 
                    

                    I'll report back what I see tonight when it updates again just after midnight

                    AhnHEL (Angel)

                    1 Reply Last reply Reply Quote 0
                    • G
                      Gradius
                      last edited by

                      @bmeeks:

                      You seem to have something weird going on in that install.  You are clicking the "X" icon to completely remove the Snort package on the Installed Packages tab, and then going to the Available Packages tab and installing it again, correct?

                      That's correct.

                      @bmeeks:

                      That error you are posting indicates an incomplete uninstall/reinstall process.  Those files (with -example- in the filenames) are fixed up by the full package installation process.  The fact you keep seeing this error means either that process is not happening, or is not running to conclusion.

                      One thing to try – click the "X" to totally remove Snort.  Then go to the command line and issue this command to completely remove any remaining traces of Snort:

                      rm -rf /usr/pbi/snort-i386
                      

                      Then go to the Available Packages tab and install it fresh.

                      I'll do manual uninstall, but is really weird this is happening, since I did that a week or two ago (manually uninstalled).

                      1 Reply Last reply Reply Quote 0
                      • G
                        Gradius
                        last edited by

                        This is all I have after uninstall by X:

                        /usr/local/etc/snort/snort_59419_pppoe0/rules/snort.rules
                        /usr/local/etc/snort/snort_59419_pppoe0/snort.conf
                        /usr/local/etc/snort/snort.conf
                        /usr/local/etc/snort/rules/snort_attack-responses.rules
                        /usr/local/etc/snort/rules/snort_backdoor.rules
                        /usr/local/etc/snort/rules/snort_bad-traffic.rules
                        /usr/local/etc/snort/rules/snort_blacklist.rules
                        /usr/local/etc/snort/rules/snort_botnet-cnc.rules
                        /usr/local/etc/snort/rules/snort_chat.rules
                        /usr/local/etc/snort/rules/snort_content-replace.rules
                        /usr/local/etc/snort/rules/snort_ddos.rules
                        /usr/local/etc/snort/rules/snort_deleted.rules
                        /usr/local/etc/snort/rules/snort_dns.rules
                        /usr/local/etc/snort/rules/snort_dos.rules
                        /usr/local/etc/snort/rules/snort_experimental.rules
                        /usr/local/etc/snort/rules/snort_exploit.rules
                        /usr/local/etc/snort/rules/snort_file-identify.rules
                        /usr/local/etc/snort/rules/snort_file-office.rules
                        /usr/local/etc/snort/rules/snort_file-other.rules
                        /usr/local/etc/snort/rules/snort_file-pdf.rules
                        /usr/local/etc/snort/rules/snort_finger.rules
                        /usr/local/etc/snort/rules/snort_ftp.rules
                        /usr/local/etc/snort/rules/snort_icmp-info.rules
                        /usr/local/etc/snort/rules/snort_icmp.rules
                        /usr/local/etc/snort/rules/snort_imap.rules
                        /usr/local/etc/snort/rules/snort_indicator-compromise.rules
                        /usr/local/etc/snort/rules/snort_indicator-obfuscation.rules
                        /usr/local/etc/snort/rules/snort_info.rules
                        /usr/local/etc/snort/rules/snort_local.rules
                        /usr/local/etc/snort/rules/snort_misc.rules
                        /usr/local/etc/snort/rules/snort_multimedia.rules
                        /usr/local/etc/snort/rules/snort_mysql.rules
                        /usr/local/etc/snort/rules/snort_netbios.rules
                        /usr/local/etc/snort/rules/snort_nntp.rules
                        /usr/local/etc/snort/rules/snort_oracle.rules
                        /usr/local/etc/snort/rules/snort_other-ids.rules
                        /usr/local/etc/snort/rules/snort_p2p.rules
                        /usr/local/etc/snort/rules/snort_phishing-spam.rules
                        /usr/local/etc/snort/rules/snort_policy-multimedia.rules
                        /usr/local/etc/snort/rules/snort_policy-other.rules
                        /usr/local/etc/snort/rules/snort_policy-social.rules
                        /usr/local/etc/snort/rules/snort_policy.rules
                        /usr/local/etc/snort/rules/snort_pop2.rules
                        /usr/local/etc/snort/rules/snort_pop3.rules
                        /usr/local/etc/snort/rules/snort_pua-p2p.rules
                        /usr/local/etc/snort/rules/snort_pua-toolbars.rules
                        /usr/local/etc/snort/rules/snort_rpc.rules
                        /usr/local/etc/snort/rules/snort_rservices.rules
                        /usr/local/etc/snort/rules/snort_scada.rules
                        /usr/local/etc/snort/rules/snort_scan.rules
                        /usr/local/etc/snort/rules/snort_server-mail.rules
                        /usr/local/etc/snort/rules/snort_shellcode.rules
                        /usr/local/etc/snort/rules/snort_smtp.rules
                        /usr/local/etc/snort/rules/snort_snmp.rules
                        /usr/local/etc/snort/rules/snort_specific-threats.rules
                        /usr/local/etc/snort/rules/snort_spyware-put.rules
                        /usr/local/etc/snort/rules/snort_sql.rules
                        /usr/local/etc/snort/rules/snort_telnet.rules
                        /usr/local/etc/snort/rules/snort_tftp.rules
                        /usr/local/etc/snort/rules/snort_virus.rules
                        /usr/local/etc/snort/rules/snort_voip.rules
                        /usr/local/etc/snort/rules/snort_web-activex.rules
                        /usr/local/etc/snort/rules/snort_web-attacks.rules
                        /usr/local/etc/snort/rules/snort_web-cgi.rules
                        /usr/local/etc/snort/rules/snort_web-client.rules
                        /usr/local/etc/snort/rules/snort_web-coldfusion.rules
                        /usr/local/etc/snort/rules/snort_x11.rules
                        /usr/local/etc/snort/rules/snort_web-frontpage.rules
                        /usr/local/etc/snort/rules/snort_web-iis.rules
                        /usr/local/etc/snort/rules/snort_web-misc.rules
                        /usr/local/etc/snort/rules/snort_web-php.rules
                        /usr/local/etc/snort/rules/snort_bad-traffic.so.rules
                        /usr/local/etc/snort/rules/snort_chat.so.rules
                        /usr/local/etc/snort/rules/snort_dos.so.rules
                        /usr/local/etc/snort/rules/snort_exploit.so.rules
                        /usr/local/etc/snort/rules/snort_icmp.so.rules
                        /usr/local/etc/snort/rules/snort_imap.so.rules
                        /usr/local/etc/snort/rules/snort_misc.so.rules
                        /usr/local/etc/snort/rules/snort_multimedia.so.rules
                        /usr/local/etc/snort/rules/snort_netbios.so.rules
                        /usr/local/etc/snort/rules/snort_nntp.so.rules
                        /usr/local/etc/snort/rules/snort_p2p.so.rules
                        /usr/local/etc/snort/rules/snort_smtp.so.rules
                        /usr/local/etc/snort/rules/snort_snmp.so.rules
                        /usr/local/etc/snort/rules/snort_specific-threats.so.rules
                        /usr/local/etc/snort/rules/snort_web-activex.so.rules
                        /usr/local/etc/snort/rules/snort_web-client.so.rules
                        /usr/local/etc/snort/rules/snort_web-iis.so.rules
                        /usr/local/etc/snort/rules/snort_web-misc.so.rules
                        /usr/local/etc/snort/rules/snort-2.9.0-open.txt
                        /usr/local/etc/snort/rules/snort_app-detect.rules
                        /usr/local/etc/snort/rules/snort_browser-chrome.rules
                        /usr/local/etc/snort/rules/snort_browser-firefox.rules
                        /usr/local/etc/snort/rules/snort_browser-ie.rules
                        /usr/local/etc/snort/rules/snort_browser-other.rules
                        /usr/local/etc/snort/rules/snort_browser-webkit.rules
                        /usr/local/etc/snort/rules/snort_exploit-kit.rules
                        /usr/local/etc/snort/rules/snort_file-executable.rules
                        /usr/local/etc/snort/rules/snort_file-flash.rules
                        /usr/local/etc/snort/rules/snort_file-image.rules
                        /usr/local/etc/snort/rules/snort_file-multimedia.rules
                        /usr/local/etc/snort/rules/snort_malware-backdoor.rules
                        /usr/local/etc/snort/rules/snort_malware-cnc.rules
                        /usr/local/etc/snort/rules/snort_malware-other.rules
                        /usr/local/etc/snort/rules/snort_malware-tools.rules
                        /usr/local/etc/snort/rules/snort_browser-plugins.rules
                        /usr/local/etc/snort/rules/snort_indicator-shellcode.rules
                        /usr/local/etc/snort/rules/snort_os-linux.rules
                        /usr/local/etc/snort/rules/snort_os-other.rules
                        /usr/local/etc/snort/rules/snort_os-solaris.rules
                        /usr/local/etc/snort/rules/snort_os-windows.rules
                        /usr/local/etc/snort/rules/snort_policy-spam.rules
                        /usr/local/etc/snort/rules/snort_protocol-finger.rules
                        /usr/local/etc/snort/rules/snort_protocol-ftp.rules
                        /usr/local/etc/snort/rules/snort_protocol-icmp.rules
                        /usr/local/etc/snort/rules/snort_protocol-imap.rules
                        /usr/local/etc/snort/rules/snort_protocol-pop.rules
                        /usr/local/etc/snort/rules/snort_protocol-services.rules
                        /usr/local/etc/snort/rules/snort_protocol-voip.rules
                        /usr/local/etc/snort/rules/snort_pua-adware.rules
                        /usr/local/etc/snort/rules/snort_pua-other.rules
                        /usr/local/etc/snort/rules/snort_server-apache.rules
                        /usr/local/etc/snort/rules/snort_server-iis.rules
                        /usr/local/etc/snort/rules/snort_server-mssql.rules
                        /usr/local/etc/snort/rules/snort_server-mysql.rules
                        /usr/local/etc/snort/rules/snort_server-oracle.rules
                        /usr/local/etc/snort/rules/snort_server-other.rules
                        /usr/local/etc/snort/rules/snort_server-webapp.rules
                        /usr/local/etc/snort/rules/snort-2.9.0-open-nogpl.txt
                        
                        1 Reply Last reply Reply Quote 0
                        • bmeeksB
                          bmeeks
                          last edited by

                          @Gradius:

                          This is all I have after uninstall by X:

                          /usr/local/etc/snort/snort_59419_pppoe0/rules/snort.rules
                          /usr/local/etc/snort/snort_59419_pppoe0/snort.conf
                          /usr/local/etc/snort/snort.conf
                          /usr/local/etc/snort/rules/snort_attack-responses.rules
                          /usr/local/etc/snort/rules/snort_backdoor.rules
                          /usr/local/etc/snort/rules/snort_bad-traffic.rules
                          /usr/local/etc/snort/rules/snort_blacklist.rules
                          /usr/local/etc/snort/rules/snort_botnet-cnc.rules
                          /usr/local/etc/snort/rules/snort_chat.rules
                          /usr/local/etc/snort/rules/snort_content-replace.rules
                          /usr/local/etc/snort/rules/snort_ddos.rules
                          /usr/local/etc/snort/rules/snort_deleted.rules
                          /usr/local/etc/snort/rules/snort_dns.rules
                          /usr/local/etc/snort/rules/snort_dos.rules
                          /usr/local/etc/snort/rules/snort_experimental.rules
                          /usr/local/etc/snort/rules/snort_exploit.rules
                          /usr/local/etc/snort/rules/snort_file-identify.rules
                          /usr/local/etc/snort/rules/snort_file-office.rules
                          /usr/local/etc/snort/rules/snort_file-other.rules
                          /usr/local/etc/snort/rules/snort_file-pdf.rules
                          /usr/local/etc/snort/rules/snort_finger.rules
                          /usr/local/etc/snort/rules/snort_ftp.rules
                          /usr/local/etc/snort/rules/snort_icmp-info.rules
                          /usr/local/etc/snort/rules/snort_icmp.rules
                          /usr/local/etc/snort/rules/snort_imap.rules
                          /usr/local/etc/snort/rules/snort_indicator-compromise.rules
                          /usr/local/etc/snort/rules/snort_indicator-obfuscation.rules
                          /usr/local/etc/snort/rules/snort_info.rules
                          /usr/local/etc/snort/rules/snort_local.rules
                          /usr/local/etc/snort/rules/snort_misc.rules
                          /usr/local/etc/snort/rules/snort_multimedia.rules
                          /usr/local/etc/snort/rules/snort_mysql.rules
                          /usr/local/etc/snort/rules/snort_netbios.rules
                          /usr/local/etc/snort/rules/snort_nntp.rules
                          /usr/local/etc/snort/rules/snort_oracle.rules
                          /usr/local/etc/snort/rules/snort_other-ids.rules
                          /usr/local/etc/snort/rules/snort_p2p.rules
                          /usr/local/etc/snort/rules/snort_phishing-spam.rules
                          /usr/local/etc/snort/rules/snort_policy-multimedia.rules
                          /usr/local/etc/snort/rules/snort_policy-other.rules
                          /usr/local/etc/snort/rules/snort_policy-social.rules
                          /usr/local/etc/snort/rules/snort_policy.rules
                          /usr/local/etc/snort/rules/snort_pop2.rules
                          /usr/local/etc/snort/rules/snort_pop3.rules
                          /usr/local/etc/snort/rules/snort_pua-p2p.rules
                          /usr/local/etc/snort/rules/snort_pua-toolbars.rules
                          /usr/local/etc/snort/rules/snort_rpc.rules
                          /usr/local/etc/snort/rules/snort_rservices.rules
                          /usr/local/etc/snort/rules/snort_scada.rules
                          /usr/local/etc/snort/rules/snort_scan.rules
                          /usr/local/etc/snort/rules/snort_server-mail.rules
                          /usr/local/etc/snort/rules/snort_shellcode.rules
                          /usr/local/etc/snort/rules/snort_smtp.rules
                          /usr/local/etc/snort/rules/snort_snmp.rules
                          /usr/local/etc/snort/rules/snort_specific-threats.rules
                          /usr/local/etc/snort/rules/snort_spyware-put.rules
                          /usr/local/etc/snort/rules/snort_sql.rules
                          /usr/local/etc/snort/rules/snort_telnet.rules
                          /usr/local/etc/snort/rules/snort_tftp.rules
                          /usr/local/etc/snort/rules/snort_virus.rules
                          /usr/local/etc/snort/rules/snort_voip.rules
                          /usr/local/etc/snort/rules/snort_web-activex.rules
                          /usr/local/etc/snort/rules/snort_web-attacks.rules
                          /usr/local/etc/snort/rules/snort_web-cgi.rules
                          /usr/local/etc/snort/rules/snort_web-client.rules
                          /usr/local/etc/snort/rules/snort_web-coldfusion.rules
                          /usr/local/etc/snort/rules/snort_x11.rules
                          /usr/local/etc/snort/rules/snort_web-frontpage.rules
                          /usr/local/etc/snort/rules/snort_web-iis.rules
                          /usr/local/etc/snort/rules/snort_web-misc.rules
                          /usr/local/etc/snort/rules/snort_web-php.rules
                          /usr/local/etc/snort/rules/snort_bad-traffic.so.rules
                          /usr/local/etc/snort/rules/snort_chat.so.rules
                          /usr/local/etc/snort/rules/snort_dos.so.rules
                          /usr/local/etc/snort/rules/snort_exploit.so.rules
                          /usr/local/etc/snort/rules/snort_icmp.so.rules
                          /usr/local/etc/snort/rules/snort_imap.so.rules
                          /usr/local/etc/snort/rules/snort_misc.so.rules
                          /usr/local/etc/snort/rules/snort_multimedia.so.rules
                          /usr/local/etc/snort/rules/snort_netbios.so.rules
                          /usr/local/etc/snort/rules/snort_nntp.so.rules
                          /usr/local/etc/snort/rules/snort_p2p.so.rules
                          /usr/local/etc/snort/rules/snort_smtp.so.rules
                          /usr/local/etc/snort/rules/snort_snmp.so.rules
                          /usr/local/etc/snort/rules/snort_specific-threats.so.rules
                          /usr/local/etc/snort/rules/snort_web-activex.so.rules
                          /usr/local/etc/snort/rules/snort_web-client.so.rules
                          /usr/local/etc/snort/rules/snort_web-iis.so.rules
                          /usr/local/etc/snort/rules/snort_web-misc.so.rules
                          /usr/local/etc/snort/rules/snort-2.9.0-open.txt
                          /usr/local/etc/snort/rules/snort_app-detect.rules
                          /usr/local/etc/snort/rules/snort_browser-chrome.rules
                          /usr/local/etc/snort/rules/snort_browser-firefox.rules
                          /usr/local/etc/snort/rules/snort_browser-ie.rules
                          /usr/local/etc/snort/rules/snort_browser-other.rules
                          /usr/local/etc/snort/rules/snort_browser-webkit.rules
                          /usr/local/etc/snort/rules/snort_exploit-kit.rules
                          /usr/local/etc/snort/rules/snort_file-executable.rules
                          /usr/local/etc/snort/rules/snort_file-flash.rules
                          /usr/local/etc/snort/rules/snort_file-image.rules
                          /usr/local/etc/snort/rules/snort_file-multimedia.rules
                          /usr/local/etc/snort/rules/snort_malware-backdoor.rules
                          /usr/local/etc/snort/rules/snort_malware-cnc.rules
                          /usr/local/etc/snort/rules/snort_malware-other.rules
                          /usr/local/etc/snort/rules/snort_malware-tools.rules
                          /usr/local/etc/snort/rules/snort_browser-plugins.rules
                          /usr/local/etc/snort/rules/snort_indicator-shellcode.rules
                          /usr/local/etc/snort/rules/snort_os-linux.rules
                          /usr/local/etc/snort/rules/snort_os-other.rules
                          /usr/local/etc/snort/rules/snort_os-solaris.rules
                          /usr/local/etc/snort/rules/snort_os-windows.rules
                          /usr/local/etc/snort/rules/snort_policy-spam.rules
                          /usr/local/etc/snort/rules/snort_protocol-finger.rules
                          /usr/local/etc/snort/rules/snort_protocol-ftp.rules
                          /usr/local/etc/snort/rules/snort_protocol-icmp.rules
                          /usr/local/etc/snort/rules/snort_protocol-imap.rules
                          /usr/local/etc/snort/rules/snort_protocol-pop.rules
                          /usr/local/etc/snort/rules/snort_protocol-services.rules
                          /usr/local/etc/snort/rules/snort_protocol-voip.rules
                          /usr/local/etc/snort/rules/snort_pua-adware.rules
                          /usr/local/etc/snort/rules/snort_pua-other.rules
                          /usr/local/etc/snort/rules/snort_server-apache.rules
                          /usr/local/etc/snort/rules/snort_server-iis.rules
                          /usr/local/etc/snort/rules/snort_server-mssql.rules
                          /usr/local/etc/snort/rules/snort_server-mysql.rules
                          /usr/local/etc/snort/rules/snort_server-oracle.rules
                          /usr/local/etc/snort/rules/snort_server-other.rules
                          /usr/local/etc/snort/rules/snort_server-webapp.rules
                          /usr/local/etc/snort/rules/snort-2.9.0-open-nogpl.txt
                          

                          None of that should be there after a Delete.  Get to the command line (either locally or via SSH) and execute the following commands –

                          rm -rf /usr/local/etc/snort
                          rm -rf /usr/local/lib/snort
                          
                          

                          If you can, reboot the firewall after the commands above to be 100% sure no other Snort process is out there running.  If you are confident no Snort processes remain, you can skip the reboot.

                          Reinstall Snort again and let's see if things work better.

                          Bill

                          1 Reply Last reply Reply Quote 0
                          • F
                            fragged
                            last edited by

                            I have Snort set to never remove blocked IP's, but they still get removed and not all IP's from alerts are put on blocked at all. It almost seems like Snort stops working after running for a while. The process is still running and alerts are made, but nothing is blocked and IP's already blocked are removed. Last time I noticed this was just now at ~21:50 and Snort was last restarted at 12:00 after rules update.

                            I'm on pfSense:

                            
                            2.1-BETA1 (amd64)
                            built on Thu Apr 4 12:39:50 EDT 2013
                            FreeBSD 8.3-RELEASE-p7
                            
                            
                            1 Reply Last reply Reply Quote 0
                            • bmeeksB
                              bmeeks
                              last edited by

                              @fragged:

                              I have Snort set to never remove blocked IP's, but they still get removed and not all IP's from alerts are put on blocked at all. It almost seems like Snort stops working after running for a while. The process is still running and alerts are made, but nothing is blocked and IP's already blocked are removed. Last time I noticed this was just now at ~21:50 and Snort was last restarted at 12:00 after rules update.

                              I'm on pfSense:

                              
                              2.1-BETA1 (amd64)
                              built on Thu Apr 4 12:39:50 EDT 2013
                              FreeBSD 8.3-RELEASE-p7
                              
                              

                              Are all the IPs you think should be blocked, but aren't, located outside HOME_NET?  In other words, are they all IP addresses that are NOT in your automatic whitelist (the $HOME_NET variable).

                              Second question is do you have Snort on that interface set to block SRC, DST or BOTH?  That setting can affect what you see getting blocked.

                              I don't have a good answer yet for the IPs getting removed from the block table if you have the automatic removal disabled.  Look in the file /etc/crontab to see if there is a line that reads similar to this one:

                              /usr/bin/nice -n20 /usr/local/sbin/expiretable -t {# of seconds} snort2c
                              

                              If you see such a line, then it means the cron job did not get cleaned up/deleted.

                              Bill

                              1 Reply Last reply Reply Quote 0
                              • F
                                fragged
                                last edited by

                                I'm not sure if this is by design or not, but applying firewall rules (filter reload?) will erase Snort blocked list.

                                1 Reply Last reply Reply Quote 0
                                • bmeeksB
                                  bmeeks
                                  last edited by

                                  @fragged:

                                  I'm not sure if this is by design or not, but applying firewall rules (filter reload?) will erase Snort blocked list.

                                  That does make sense.  I had not thought of that.  Snort actually uses some of the same pf tables to perform its inline blocking (using a third-party output plugin for Snort called Spoink).  So when the firewall rules refresh, I would assume the tables are cleared.

                                  Once the Spoink plugin writes the IP address from an alert into the table, it does not check on it anymore.  It's a "post and forget" type of operation from Snort's point of view.  There is a completely separate cron task that fires based on your configured time, and this task is the one that actually clears the pf table where the blocks were inserted.  The Spoink plugin only fires on the initial alert from Snort.  It does not do any kind of "state keeping" whereby it periodically scans the Snort log or anything like that.  It just intercepts that initial alert, then posts the required IP address in the pf table for blocking.

                                  1 Reply Last reply Reply Quote 0
                                  • S
                                    Supermule Banned
                                    last edited by

                                    Snort was killed again after rules update!

                                    Apr 18 00:05:44 php: : The Rules update has finished.
                                    Apr 18 00:05:44 php: : Snort has restarted with your new set of rules…
                                    Apr 18 00:05:42 SnortStartup[800]: Snort SOFT START For Internet(36256_em0)…
                                    Apr 18 00:05:42 snort[27180]: Could not remove pid file /var/run/snort_em036256.pid: No such file or directory
                                    Apr 18 00:05:42 snort[27180]: Could not remove pid file /var/run/snort_em036256.pid: No such file or directory
                                    Apr 18 00:05:41 kernel: em0: promiscuous mode disabled
                                    Apr 18 00:05:41 snort[27180]: *** Caught Term-Signal
                                    Apr 18 00:05:41 snort[27180]: *** Caught Term-Signal
                                    Apr 18 00:05:40 SnortStartup[63434]: Snort STOP For Internet(36256_em0)…
                                    Apr 18 00:05:40 php: : Building new sig-msg.map file for WAN...
                                    Apr 18 00:05:38 php: : Resolving and auto-enabling any flowbit-required rules for WAN...
                                    Apr 18 00:05:36 php: : Updating rules configuration for: WAN ...
                                    Apr 18 00:05:36 php: : EmergingThreats rules file update downloaded succsesfully
                                    Apr 18 00:05:33 php: : There is a new set of EmergingThreats rules posted. Downloading...
                                    Apr 18 00:05:33 php: : Snort GPLv2 Community Rules file update downloaded succsesfully
                                    Apr 18 00:05:31 php: : There is a new set of Snort GPLv2 Community Rules posted. Downloading...
                                    Apr 18 00:05:30 php: : Snort VRT rules are up to date...
                                    Apr 18 00:05:30 php: : Snort MD5 Attempts: 2
                                    Apr 17 00:03:07 php: : The Rules update has finished.
                                    Apr 17 00:03:07 php: : Emerging Threat rules are up to date...
                                    Apr 17 00:03:07 php: : Snort GPLv2 Community Rules are up to date...
                                    Apr 17 00:03:06 php: : Snort VRT rules are up to date...
                                    Apr 17 00:03:06 php: : Snort MD5 Attempts: 1

                                    And then manually started

                                    pr 18 12:00:44 php: /status_services.php: The command '/usr/local/etc/rc.d/snort.sh stop' returned exit code '1', the output was ''
                                    Apr 18 12:00:42 SnortStartup[51714]: Snort STOP For Internet(36256_em0)…

                                    Another FW got killed. Same error.

                                    Apr 18 00:03:41 php: : The Rules update has finished.
                                    Apr 18 00:03:41 php: : Snort has restarted with your new set of rules...
                                    Apr 18 00:03:39 SnortStartup[4528]: Snort SOFT START For Internet(9626_em0)…
                                    Apr 18 00:03:39 snort[54662]: Could not remove pid file /var/run/snort_em09626.pid: No such file or directory
                                    Apr 18 00:03:39 snort[54662]: Could not remove pid file /var/run/snort_em09626.pid: No such file or directory
                                    Apr 18 00:03:38 kernel: em0: promiscuous mode disabled
                                    Apr 18 00:03:38 snort[54662]: *** Caught Term-Signal
                                    Apr 18 00:03:38 snort[54662]: *** Caught Term-Signal
                                    Apr 18 00:03:37 SnortStartup[3264]: Snort STOP For Internet(9626_em0)…
                                    Apr 18 00:03:37 php: : Building new sig-msg.map file for WAN...
                                    Apr 18 00:03:35 php: : Resolving and auto-enabling any flowbit-required rules for WAN...
                                    Apr 18 00:03:33 php: : Updating rules configuration for: WAN ...
                                    Apr 18 00:03:32 php: : EmergingThreats rules file update downloaded succsesfully
                                    Apr 18 00:03:29 php: : There is a new set of EmergingThreats rules posted. Downloading...
                                    Apr 18 00:03:29 php: : Snort GPLv2 Community Rules file update downloaded succsesfully
                                    Apr 18 00:03:27 php: : There is a new set of Snort GPLv2 Community Rules posted. Downloading...
                                    Apr 18 00:03:26 php: : Snort VRT rules are up to date...
                                    Apr 18 00:03:26 php: : Snort MD5 Attempts: 1

                                    1 Reply Last reply Reply Quote 0
                                    • G
                                      gogol
                                      last edited by

                                      Confirmed:

                                      
                                      Apr 17 12:06:12	php: : The Rules update has finished.
                                      Apr 17 12:06:12	php: : Snort has restarted with your new set of rules...Apr 17 12:06:10	kernel: em0: promiscuous mode enabled
                                      Apr 17 12:06:10	SnortStartup[65474]: Snort START For WAN(54477_em0)...
                                      Apr 17 12:05:40	snort[71072]: Could not remove pid file /var/run/snort_em054477.pid: No such file or directory
                                      Apr 17 12:05:40	kernel: em0: promiscuous mode disabled
                                      Apr 17 12:05:40	snort[71072]: *** Caught Term-Signal
                                      Apr 17 12:05:39	SnortStartup[63404]: Snort STOP For WAN(54477_em0)...
                                      Apr 17 12:05:38	php: : Building new sig-msg.map file for WAN...
                                      Apr 17 12:05:30	php: : Resolving and auto-enabling any flowbit-required rules for WAN...
                                      Apr 17 12:05:22	php: : Updating rules configuration for: WAN ...
                                      Apr 17 12:05:21	php: : EmergingThreats rules file update downloaded succsesfully
                                      Apr 17 12:05:12	php: : There is a new set of EmergingThreats rules posted. Downloading...
                                      Apr 17 12:05:12	php: : Snort VRT rules are up to date...
                                      Apr 17 12:05:12	php: : Snort MD5 Attempts: 2
                                      

                                      This one looks OK, but the next one does not:

                                      Apr 18 12:07:19	php: : The Rules update has finished.
                                      Apr 18 12:07:18	php: : Building new sig-msg.map file for WAN...
                                      Apr 18 12:07:09	php: : Resolving and auto-enabling any flowbit-required rules for WAN...
                                      Apr 18 12:07:02	php: : Updating rules configuration for: WAN ...
                                      Apr 18 12:07:01	kernel: em0: promiscuous mode disabled
                                      Apr 18 12:07:01	kernel: pid 65246 (snort), uid 0: exited on signal 4
                                      Apr 18 12:06:52	php: : EmergingThreats rules file update downloaded succsesfully
                                      Apr 18 12:06:50	php: : There is a new set of EmergingThreats rules posted. Downloading...
                                      Apr 18 12:06:49	php: : Snort Rules Attempts: 1
                                      Apr 18 12:06:10	php: : There is a new set of Snort VRT rules posted. Downloading...
                                      Apr 18 12:06:10	php: : Snort MD5 Attempts: 3
                                      

                                      It happens when there is a new Snort ruleset, not when the ET rules are updated.

                                      1 Reply Last reply Reply Quote 0
                                      • bmeeksB
                                        bmeeks
                                        last edited by

                                        Supermule and gogol:

                                        Thank you for your detailed reports with the logs.  I think I spotted a clue.  I will need to investigate it a bit, but the clue I see is in Supermule's log entries.  Notice it says "Snort SOFT START".  That is not what I expected.  The rules update procedure asks for a complete shutdown and restart of Snort by calling the /usr/local/etc/rc.d/snort.sh script with the restart argument.  In the shell script, that causes Snort to be stopped and then restarted.  The STOP part is happening, but the restart is getting hosed, and I need to see why.

                                        The logic in the shell script tries to be smart on starting Snort.  If it sees the process is already running, it issues a SIGHUP command to the running process signalling Snort to reload its rules and other configuration settings.  If there is no running Snort process detected, it just cold-starts Snort.

                                        So here is what I think is going on.  The STOP signal is caught by the running Snort process and it begins the shutdown process.  However, the START command is issued before STOP has completetly finished cleaning up the PID files.  So START sees the not-yet-cleaned up PID file and thinks Snort is still running.  Thinking there is a running Snort process, it just issues the SIGHUP soft restart instead of the hard START.  That clue comes from the "SOFT START" part of the log entry.  That line only gets printed when the script tries the SIGHUP approach.

                                        I need to test out my theory in my VM world a bit, and this may take me a few days.  In the interim, try the fix I posted earlier of adding a sleep 3 command between the rc_stop() and rc_start() calls in the shell script.

                                        Bill

                                        1 Reply Last reply Reply Quote 0
                                        • S
                                          Supermule Banned
                                          last edited by

                                          Thanks Bill!

                                          Looking forward to see what you come up with.

                                          1 Reply Last reply Reply Quote 0
                                          • bmeeksB
                                            bmeeks
                                            last edited by

                                            @Supermule:

                                            Thanks Bill!

                                            Looking forward to see what you come up with.

                                            If you want to try a quick experiment, follow the instructions here:  http://forum.pfsense.org/index.php/topic,61001.msg330160.html#msg330160

                                            Try fiddling with the sleep time.  Maybe try a little longer.  If my theory is correct, it's a timing issue.

                                            Bill

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.