Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Snort 2.9.4.6 pkg v2.6.0 Update

    Scheduled Pinned Locked Moved pfSense Packages
    61 Posts 16 Posters 17.0k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • D
      digdug3
      last edited by

      No, no changes. Even put back the backup from a day before, same problems.

      Here are the lines at #194 (all interfaces hang at the same line):
      Line 194 is in bold:

      preprocessor ftp_telnet_protocol: ftp server default
      ….
      ....
          cmd_validity STRU < char FRP >
          cmd_validity ALLO < int [ char R int ] >
          cmd_validity TYPE < { char AE [ char NTC ] | char I | char L [ number ] } >
          cmd_validity MDTM < [ date nnnnnnnnnnnnnn[.n[n[n]]] ] string >
          cmd_validity PORT < host_port >

      preprocessor ftp_telnet_protocol: ftp client default
        max_resp_len 256
        bounce yes
        ignore_telnet_erase_cmds yes
        telnet_cmds yes

      1 Reply Last reply Reply Quote 0
      • D
        digdug3
        last edited by

        Ok, found the problem… (Thanks for hinting me about the aliases)
        In v2.0.3 I added the FTP ports alias:
        20,21 AND 15002:15018

        That last one (with the semicolom) isn't supported anymore for the FTP preprocessor in the last version of the Snort package(?).

        After removing the port range the interfaces all started again.

        1 Reply Last reply Reply Quote 0
        • bmeeksB
          bmeeks
          last edited by

          @digdug3:

          Ok, found the problem… (Thanks for hinting me about the aliases)
          In v2.0.3 I added the FTP ports alias:
          20,21 AND 15002:15018

          That last one (with the semicolom) isn't supported anymore for the FTP preprocessor in the last version of the Snort package(?).

          After removing the port range the interfaces all started again.

          Probably my bad with the last update.  The port range should work.  Post back exactly what your Alias looks like and let me reproduce the condition in my test VMs so I can fix it.

          Thanks for reporting it,

          Bill

          1 Reply Last reply Reply Quote 0
          • D
            digdug3
            last edited by

            Here is the alias as attachment.

            alias.png
            alias.png_thumb

            1 Reply Last reply Reply Quote 0
            • bmeeksB
              bmeeks
              last edited by

              @digdug3:

              Here is the alias as attachment.

              Thanks for the information.  It will be a few days, but I will see if I can fix this.  I have some other conflicting activities the next few days.

              Bill

              1 Reply Last reply Reply Quote 0
              • D
                digdug3
                last edited by

                Take your time. Workaround was simple. Just add the ports one by one in the alias and all was working again.
                I think it is more important to fix the snort blocking issues in pfsense 2.1

                1 Reply Last reply Reply Quote 0
                • bmeeksB
                  bmeeks
                  last edited by

                  @digdug3:

                  Take your time. Workaround was simple. Just add the ports one by one in the alias and all was working again.
                  I think it is more important to fix the snort blocking issues in pfsense 2.1

                  Ermal has committed to take a run at that soon.  He did confirm the problem is with the filter_reload() code and not in the Snort package itself.  The bad news in this good news is that means an update to pfSense itself, so we are probably looking at 2.1.1 or something for the fix.

                  Bill

                  1 Reply Last reply Reply Quote 0
                  • S
                    Supermule Banned
                    last edited by

                    Then I wished they would incoporate the widescreen theme as well since it makes pfsense much better!

                    1 Reply Last reply Reply Quote 0
                    • V
                      VoidLabs
                      last edited by

                      @bmeeks:

                      @newbieuser1234:

                      Do you know roughly how often the filter_reload happens? Snort still blocks effectively correct, just allows the offending IP to attack again after the filter_reload happens?

                      No I don't, but I also don't think it is necessarily on a regularly scheduled basis.  I really don't know much about that process.  Guess I need to dig in and learn.

                      Bill

                      Filter reload is done every 15 mins.

                      From /etc/crontab :

                      
                      0,15,30,45      *       *       *       *       root    /etc/rc.filter_configure_sync                                                                        
                      
                      

                      Each time filter_configure_sync is called, the snort2c table is cleared:

                      
                      [2.1-RELEASE][root@necro.necronet.local]/root(6): pfctl -t snort2c -T show
                         209.31.45.2
                      [2.1-RELEASE][root@necro.necronet.local]/root(7): /etc/rc.filter_configure_sync
                      [2.1-RELEASE][root@necro.necronet.local]/root(8): pfctl -t snort2c -T show
                      
                      
                      1 Reply Last reply Reply Quote 0
                      • M
                        maverick_slo
                        last edited by

                        I do not have that entry in my crontab…
                        Checked 2 pfsense production boxes, snort is working as expected...

                        1 Reply Last reply Reply Quote 0
                        • N
                          newbieuser1234
                          last edited by

                          Something weird I noticed is on package 2.5.9 with 2.1 on 64, it is blocking just fine.  But on 32 bit 2.6 on 2.1, I have the blocking issue where the table gets wiped.  Do you still think it's the function filter reload? I thought it was a 2.1 issue, but maybe it's a 2.6 snort issue?

                          1 Reply Last reply Reply Quote 0
                          • F
                            fragged
                            last edited by

                            The behavior has been the same since 2.1 Snapshots. I'm running 64 bit and filter_reload will clear the snort2c table.

                            It's not a huge issue as the offending host will get blocked again if it tries anything fishy.

                            1 Reply Last reply Reply Quote 0
                            • N
                              newbieuser1234
                              last edited by

                              Are you running snort 2.5.9 or 2.6?

                              1 Reply Last reply Reply Quote 0
                              • F
                                fragged
                                last edited by

                                Currently 2.6.0, but also 2.5.9 and earlier before and they all behave the same in this regard.

                                1 Reply Last reply Reply Quote 0
                                • N
                                  newbieuser1234
                                  last edited by

                                  I wonder what's different on mine? Can you control how often it reloads?  I am seeing hundreds of blocks still in place back two weeks or more since last reboot.

                                  1 Reply Last reply Reply Quote 0
                                  • C
                                    Cino
                                    last edited by

                                    I've had barnyard2 enabled on 4 interfaces for the last 5 days and so far so good. Everything is running good and memory usage is right on the money

                                    1 Reply Last reply Reply Quote 0
                                    • bmeeksB
                                      bmeeks
                                      last edited by

                                      @Cino:

                                      I've had barnyard2 enabled on 4 interfaces for the last 5 days and so far so good. Everything is running good and memory usage is right on the money

                                      Thanks Cino.  I hope those pesky multiple instances are a thing of the past… ;)

                                      Bill

                                      1 Reply Last reply Reply Quote 0
                                      • F
                                        fragged
                                        last edited by

                                        Snort won't start anymore after the last rules update:

                                        
                                        snort[37386]: FATAL ERROR: /usr/pbi/snort-amd64/etc/snort/snort_2226_em0/rules/snort.rules(266) Unable to process the IP address: [103.6.207.37,.
                                        [/code]
                                        
                                        It seems to be one of the ET rules categories I had checked. Looks like I need to go through them all so see which.
                                        
                                        1 Reply Last reply Reply Quote 0
                                        • V
                                          val
                                          last edited by

                                          @fragged:

                                          Snort won't start anymore after the last rules update:

                                          
                                          snort[37386]: FATAL ERROR: /usr/pbi/snort-amd64/etc/snort/snort_2226_em0/rules/snort.rules(266) Unable to process the IP address: [103.6.207.37,.
                                          [/code]
                                          
                                          It seems to be one of the ET rules categories I had checked. Looks like I need to go through them all so see which.
                                          
                                          I am seeing the same thing here tho without the FATAL ERROR in log.
                                          Snort just die right after a rule update.
                                          

                                          Intel Xeon E3-1225 V2 @ 3.20Ghz
                                          Intel S1200KPR server board mini-ITX
                                          A-data ECC 4GB x 2 1600MHz
                                          Intel Ethernet Server Adapter I350-T2
                                          Samsung 840 Pro 120GB
                                          Lian-Li PC-Q15B

                                          1 Reply Last reply Reply Quote 0
                                          • BBcan177B
                                            BBcan177 Moderator
                                            last edited by

                                            Im running Snort 2.9.4.6 pkg v. 2.6.0 and Snort wont start on several of my pfsense boxes.

                                            I disabled Emerging-botcc.rules and Snort started without any issues.

                                            My Error was as follows:

                                            snort[97526]: FATAL ERROR: /usr/pbi/snort-amd64/etc/snort/snort_43799_rl0/rules/snort.rules(266) Unable to process the IP address: [103.6.207.37,.

                                            Any ideas?

                                            Thanks

                                            "Experience is something you don't get until just after you need it."

                                            Website: http://pfBlockerNG.com
                                            Twitter: @BBcan177  #pfBlockerNG
                                            Reddit: https://www.reddit.com/r/pfBlockerNG/new/

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.