Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Is pfSense "IDS weak" ?

    Scheduled Pinned Locked Moved General pfSense Questions
    19 Posts 13 Posters 12.1k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • D
      dplat
      last edited by

      Hey!

      What do you think about http://securityonion.blogspot.se/ ?    see also :
      http://www.irongeek.com/i.php?page=videos/derbycon2/2-2-9-doug-burks-security-onion-network-security-monitoring-in-minutes

      Don't you think that pfSense is somewhat "IDS weak" in comparison to this distro?

      Thank you for your advice & comments!

      1 Reply Last reply Reply Quote 0
      • T
        tim.mcmanus
        last edited by

        No.  They are two completely different things.

        Because, using your comparison, Security Onion is a terrible firewall/router distribution as compared to pfSense.

        1 Reply Last reply Reply Quote 0
        • R
          radrmr
          last edited by

          PFsense and security onion are different things, but why not have more options.
          Judging by forum traffic, IDS is a pretty popular use of PFsense. 
          Snort is handy, but the parent company has just been bought by cisco. Who knows what they plan to do with it. http://newsroom.cisco.com/press-release-content?articleId=1225204

          Securityonion has suricata and ossec in addition to snort, Along with some interesting data visualization tools.
          PFsense may not need every feature from security onion, but it is a good tool. Perhaps we could learn something.

          1 Reply Last reply Reply Quote 0
          • jimpJ
            jimp Rebel Alliance Developer Netgate
            last edited by

            Security Onion is nice. And you can run both at once (setup a span/mirror port on your switch to copy data to security onion for monitoring)

            You could even run snort on pfSense and push the alert data from snort over to Security Onion for further processing.

            Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

            Need help fast? Netgate Global Support!

            Do not Chat/PM for help!

            1 Reply Last reply Reply Quote 0
            • C
              cmb
              last edited by

              Network security monitoring is something that needs a dedicated platform like Security Onion. The guy behind Security Onion is a big pfSense fan, they have it widely deployed at work and home. NSM takes up a ton of hardware resources, CPU, RAM, and disk. Their recommended hardware requirements exceed what many people run as a firewall. What I'd like to see, maybe once bhyve stabilizes and matures, is a VM of Security Onion running on top of pfSense. That would allow you to share the hardware resources, and limit your NSM's total resource consumption. Would require significantly faster hardware for many people vs. what they're running now, but it would be a nice solution.

              1 Reply Last reply Reply Quote 0
              • C
                CS
                last edited by

                I have added Snort package on pfSense, configured as IPS (inline) not just IDS and works fine!  :)
                I agreed with the guys above that you cannot compare two different distros.

                1 Reply Last reply Reply Quote 0
                • L
                  laleger
                  last edited by

                  FWIW, I just submitted a new pfSense package for ossec today. It's very experimental, but if committed, it should be available for evaluation on 2.1 systems.

                  Cheers,

                  Lance

                  1 Reply Last reply Reply Quote 0
                  • stephenw10S
                    stephenw10 Netgate Administrator
                    last edited by

                    Ooo that's interesting. Nice work.  :)
                    More options is always better. Who are OSSEC? They seem to be tied to Trend Micro. Is that better than Cisco?  ;)

                    Steve

                    1 Reply Last reply Reply Quote 0
                    • bmeeksB
                      bmeeks
                      last edited by

                      I am investigating a Suricata package for pfSense.  I have been sort of maintaining the Snort package for the last several months.  I want to take that knowledge and see if a Suricata package on pfSense will work using the FreeBSD port of Suricata.

                      Bill

                      1 Reply Last reply Reply Quote 0
                      • BBcan177B
                        BBcan177 Moderator
                        last edited by

                        @jimp:

                        You could even run snort on pfSense and push the alert data from snort over to Security Onion for further processing.

                        Hi Jimp,

                        Have you configured pfSense to push data to SO? Would be nice to see a packaged SO sensor for pfSense.
                        If you have any details could you share? If the packet could be pushed to SO that could allow further analysis in SO.

                        "Experience is something you don't get until just after you need it."

                        Website: http://pfBlockerNG.com
                        Twitter: @BBcan177  #pfBlockerNG
                        Reddit: https://www.reddit.com/r/pfBlockerNG/new/

                        1 Reply Last reply Reply Quote 0
                        • C
                          Clear-Pixel
                          last edited by

                          @bmeeks:

                          I am investigating a Suricata package for pfSense.  I have been sort of maintaining the Snort package for the last several months.  I want to take that knowledge and see if a Suricata package on pfSense will work using the FreeBSD port of Suricata.

                          Bill

                          Looks like Suricata has a nice list of features and future additions ….... Would love to see a state of the art open source IPS/IDS package come to Pfsense ...... That is assuming there are better options in the open source community than Snort. But from what I have read Snort is the best time tested IPS/IDS system out there .....

                          It looks as though DHS funded the the start up of the Suricata project. They say its nothing more than a Snort fork that cost tax payers $1million bucks. Depending on where the rules come from that could turn out to be somewhat troublesome...

                          I have said this before ...... The states table GUI needs more data and functionality. A IPS/IDS can not catch everything and never will ...... We need a better visual way of seeing what is connected, its GPS location and what its doing connected .... some things just need the human touch.  If a IP looks fishy .... out of place, Block it, but we need lots of data to make that decision and must be done quickly/efficiently. Maybe the States Table data could be added to Snort with additional functions, now that might could turn out to be a useful tool?

                          HP EliteBook 2530p Laptop - Core2 Duo SL9600 @ 2.13Ghz - 4 GB Ram -128GB SSD
                          Atheros Mini PCI-E as Access Point (AR5BXB63H/AR5007EG/AR2425)
                          Single Ethernet Port - VLAN
                          Cisco SG300 10-port Gigabit Managed Switch
                          Cisco DPC3008 Cable Modem  30/4 Mbps
                          Pfsense 2.1-RELEASE (amd64)
                          –------------------------------------------------------------
                          Total Network Power Consumption - 29 Watts

                          1 Reply Last reply Reply Quote 0
                          • S
                            Supermule Banned
                            last edited by

                            There is a reason that Snort was bought by Cisco…and not Suricata. ;) security, features and usability!

                            1 Reply Last reply Reply Quote 0
                            • bmeeksB
                              bmeeks
                              last edited by

                              @Supermule:

                              There is a reason that Snort was bought by Cisco…and not Suricata. ;) security, features and usability!

                              But it is my understanding from some limited reading that Suricata is multi-threaded.  Snort has not done that yet in their open-source binary.  So theoretically Suricata could have better performance in high traffic applications than Snort.  Both use the same rules, though.  So detection-wise I suspect it's a wash in terms of which is better.

                              Bill

                              1 Reply Last reply Reply Quote 0
                              • J
                                jasonlitka
                                last edited by

                                @bmeeks:

                                But it is my understanding from some limited reading that Suricata is multi-threaded.  Snort has not done that yet in their open-source binary.  So theoretically Suricata could have better performance in high traffic applications than Snort.

                                That's true, but there are ways to run multiple copies of Snort and load balance between them.  Even without that it's not likely to be an issue for anyone with a decently-powerful box.  There's a user in the thread below who hit 4.3Gbit/s with Snort.

                                http://forum.pfsense.org/index.php/topic,65462.0.html

                                I can break anything.

                                1 Reply Last reply Reply Quote 0
                                • C
                                  Clear-Pixel
                                  last edited by

                                  There are claims on discussion boards that Suricata multi-threading cant touch Snorts single threaded performance.

                                  HP EliteBook 2530p Laptop - Core2 Duo SL9600 @ 2.13Ghz - 4 GB Ram -128GB SSD
                                  Atheros Mini PCI-E as Access Point (AR5BXB63H/AR5007EG/AR2425)
                                  Single Ethernet Port - VLAN
                                  Cisco SG300 10-port Gigabit Managed Switch
                                  Cisco DPC3008 Cable Modem  30/4 Mbps
                                  Pfsense 2.1-RELEASE (amd64)
                                  –------------------------------------------------------------
                                  Total Network Power Consumption - 29 Watts

                                  1 Reply Last reply Reply Quote 0
                                  • J
                                    jasonlitka
                                    last edited by

                                    @Clear-Pixel:

                                    There are claims on discussion boards that Suricata multi-threading cant touch Snorts single threaded performance.

                                    The performance of 1.2 was pretty bad. Newer versions are faster.

                                    I can break anything.

                                    1 Reply Last reply Reply Quote 0
                                    • bmeeksB
                                      bmeeks
                                      last edited by

                                      @Jason:

                                      That's true, but there are ways to run multiple copies of Snort and load balance between them.  Even without that it's not likely to be an issue for anyone with a decently-powerful box.  There's a user in the thread below who hit 4.3Gbit/s with Snort.

                                      http://forum.pfsense.org/index.php/topic,65462.0.html

                                      I agree that with today's hardware you aren't likely to notice much in terms of performance differences with multi-threaded versus single-threaded until you get to the 10Gbps realm.  However, just for fun, I do intend to attempt producing a Suricata package for pfSense in the near future.  I have the time now to devote to that project.  If nothing else, this will at least offer some insurance for the availability of an IPS/IDS tool for pfSense in the event Sourcefire's new owner decides to scrap open-source Snort at some point.  They have said they intend to continue Snort support, but I guess there are never any guarantees.

                                      Bill

                                      1 Reply Last reply Reply Quote 0
                                      • C
                                        Clear-Pixel
                                        last edited by

                                        Until we find out how Cisco will affect the open source end of it if any, I suggest continue developing the snort package and refining it.

                                        HP EliteBook 2530p Laptop - Core2 Duo SL9600 @ 2.13Ghz - 4 GB Ram -128GB SSD
                                        Atheros Mini PCI-E as Access Point (AR5BXB63H/AR5007EG/AR2425)
                                        Single Ethernet Port - VLAN
                                        Cisco SG300 10-port Gigabit Managed Switch
                                        Cisco DPC3008 Cable Modem  30/4 Mbps
                                        Pfsense 2.1-RELEASE (amd64)
                                        –------------------------------------------------------------
                                        Total Network Power Consumption - 29 Watts

                                        1 Reply Last reply Reply Quote 0
                                        • bmeeksB
                                          bmeeks
                                          last edited by

                                          @Clear-Pixel:

                                          Until we find out how Cisco will affect the open source end of it if any, I suggest continue developing the snort package and refining it.

                                          Oh, I don't intend to abandon Snort at all.  Just looking at Suricata as another alternative to have in the package collection.

                                          Bill

                                          1 Reply Last reply Reply Quote 0
                                          • First post
                                            Last post
                                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.