Snort 2.9.5.5 pkg. v3.0.0 – Update Released
-
I have updated one of my 2.1 Release (x64) to the new Snort 2.9.5.5 pkg v.3.0.0 routers today.
No issues with the installation. No missing data from my previous install. Everything seems to be functioning 100%
Thanks Bill and all the SNORT team for their efforts.
ps - a GUI snort disablesid.conf editor would be nice. Esp. when you want to update several different pfSense boxes.
-
I used the plus arrow then hit the alias tab. When i select the alias, it refreshes the page but it doesnt take me out of the alias window. Its not a big deal anyway , could just be my browser :)
Updated Reply: After thinking about this some more after posting the initial response below, I suspect it is a browser issue with the new session variable code in the Alias import page. I tried to get fancy there using session variables to save the calling page (that is, the page where the imported Alias will be returned to), but I may have gotten too fancy and created something that is not 100% browser agnostic. Tell me the Browser type and version you are using and I will see if I can reproduce and then find a fix.
Initial Reply:
Yeah, it might be something with the browser. I used IE10 and IE11 for most of my testing, but did install Chrome and Firefox in a couple of VMs for some testing in the past. I don't recall offhand if I tested the new Alias import with Chrome or Firefox, though. What browser are you using?Bill
-
@BBcan17:
I have updated one of my 2.1 Release (x64) to the new Snort 2.9.5.5 pkg v.3.0.0 routers today.
No issues with the installation. No missing data from my previous install. Everything seems to be functioning 100%
Thanks Bill and all the SNORT team for their efforts.
ps - a GUI snort disablesid.conf editor would be nice. Esp. when you want to update several different pfSense boxes.
Thank you for the positive feedback, and that is a good idea. Supermule also suggested some time back a sort of "template" system for Snort where you could create a set of configuration templates and then assign one to a specific pfSense box or group of boxes. The template would have all the settings preset. I have that idea in my list of future enhancements. I could probably incorporate your disablesid.conf idea into the same template design. I'm thinking maybe this would be an add-on package for Snort much like the Snort Dashboard Widget is today.
Bill
-
I am using the latest firefox version 26. But its not a big deal since i can make it work the other way. I did check with internet explorer and it does work correctly.
And thanks again for all the work that you put into adding separate engines. Its much easier and cleaner then how i was adding them manually. :)
-
Smooth transition. I'm amazed at how much this package has progressed in such a short time. Great job Bill.
-
I am using the latest firefox version 26. But its not a big deal since i can make it work the other way. I did check with internet explorer and it does work correctly.
And thanks again for all the work that you put into adding separate engines. Its much easier and cleaner then how i was adding them manually. :)
I will see if I can fix it for Firefox. There are some other potential issues with the way I did the session state according to Ermal, so I will research a better way to accomplish the goal. I will also be sure the final result works in IE, Firefox and Chrome.
Glad you can use the multi-engine feature. That was a GUI feature I had been thinking about adding for quite some time.
Bill
-
Smooth transition. I'm amazed at how much this package has progressed in such a short time. Great job Bill.
Thank you. Glad to help out the community.
I am working on my next pfSense package. I have a very early Beta of Suricata working in IDS mode at the moment. The goal is to get it working in IPS mode and offer it as an alternative to Snort. The key difference is Snort works off copies of packets from libpcap. It analyzes the packet copy and then makes a block decision. In the meantime, the original packet has passed on through the network stack to the original target. If Snort decides to block, it then essentially blocks only subsequent packets. Suricata, when run in IPS mode, can insert itself directly into the firewall packet processing chain. That way it can analyze and block the initial packet along with subsequent packets. It can run in true in-line mode (I hope I can get it working on pfSense). I will try the IPS mode soon in my lab.
Bill
-
DAMN NICE!
-
Just tried updating Snort on pfsense 2.1 and receive the following error:
snort[82423]: FATAL ERROR: SDF preprocessor config option "alert_threshold" requires an argument.I tried removing and reinstalling and still get the same error message. The older version of snort was working. What is causing this, do I need to configure something somewhere else.
-
Just tried updating Snort on pfsense 2.1 and receive the following error:
snort[82423]: FATAL ERROR: SDF preprocessor config option "alert_threshold" requires an argument.I tried removing and reinstalling and still get the same error message. The older version of snort was working. What is causing this, do I need to configure something somewhere else.
I forgot to set a default value for this new parameter when the user had an existing Sensitive Data configuration that was imported. This is a newly added configuration parameter for SDF (the Sensitive Data preprocessor). I will post a fix in the next package update. Give me a few days to collect up the bug reports, and then I will post an update with the fixes.
In the meantime, go to the Preprocessors tab for the interface in Snort and be sure a value is set in the box as shown in the attached screenshot. Also be sure to click on all the types of SDF you want to inspect for in the Inspect For drop-down. To select more than one entry, hold down CTRL while clicking. Click SAVE at the bottom of the page to create a new snort.conf file. Snort should start after that. Let me know if that does not work for you. I tested it this morning in my lab and it worked.
Bill
-
Smooth transition. I'm amazed at how much this package has progressed in such a short time. Great job Bill.
mee too.
-
I am working on my next pfSense package. I have a very early Beta of Suricata working in IDS mode at the moment. The goal is to get it working in IPS mode and offer it as an alternative to Snort. The key difference is Snort works off copies of packets from libpcap. It analyzes the packet copy and then makes a block decision. In the meantime, the original packet has passed on through the network stack to the original target. If Snort decides to block, it then essentially blocks only subsequent packets. Suricata, when run in IPS mode, can insert itself directly into the firewall packet processing chain. That way it can analyze and block the initial packet along with subsequent packets. It can run in true in-line mode (I hope I can get it working on pfSense). I will try the IPS mode soon in my lab.
Salivating at this, can't wait. Since Sourcefire was bought out by Cisco, Snort as we know it might become a thing of the past in the not so distant future. Staying one step ahead with a Suricata package is an awesome idea.
-
I am using the latest firefox version 26. But its not a big deal since i can make it work the other way. I did check with internet explorer and it does work correctly.
And thanks again for all the work that you put into adding separate engines. Its much easier and cleaner then how i was adding them manually. :)
shinzo:
I tried to reproduce your problem in my VMware environment and could not. I used Firefox 26 on a Windows XP SP3 virtual machine. I connected to a pfSense 2.1-amd64 box with the latest Snort package. I could both import Aliases into the Frag3 engine list, and I could create a new, empty engine and add an Alias from the button in the Details screen. I tried it several times and could not get it to fail for me.
I did a fresh install of Firefox on that VM just before the test. Prior to the test, the VM only had Chrome and the native IE installed. Does your Firefox have any extras installed that might interfere with JavaScript or other stuff?
Bill
-
I am working on my next pfSense package. I have a very early Beta of Suricata working in IDS mode at the moment. The goal is to get it working in IPS mode and offer it as an alternative to Snort. The key difference is Snort works off copies of packets from libpcap. It analyzes the packet copy and then makes a block decision. In the meantime, the original packet has passed on through the network stack to the original target. If Snort decides to block, it then essentially blocks only subsequent packets. Suricata, when run in IPS mode, can insert itself directly into the firewall packet processing chain. That way it can analyze and block the initial packet along with subsequent packets. It can run in true in-line mode (I hope I can get it working on pfSense). I will try the IPS mode soon in my lab.
Salivating at this, can't wait. Since Sourcefire was bought out by Cisco, Snort as we know it might become a thing of the past in the not so distant future. Staying one step ahead with a Suricata package is an awesome idea.
Yeah, Suricata is probably the best way forward for a true IPS since Snort inline was essentially killed in favor of supporting Suricata inline. The $64,000 question is can I get Suricata inline IPS to work properly on pfSense. Out of the box Suricata wants to use ipfw on FreeBSD, but the pfSense guys prefer to use pf instead. Getting IPS mode to work with pf and Suricata might take some magic. The IDS part is super easy. I could rollout an IDS-only package within two weeks, but in my view there is really no good case for that on a firewall. For a firewall, if you are going to install Intrusion Detection/Prevention, then it should be in Prevention mode.
Bill
-
Out of the box Suricata wants to use ipfw on FreeBSD, but the pfSense guys prefer to use pf instead.
Well I know the Captive Portal feature of pfSense uses ipfw, so maybe the developers will allow it for Suricata as well if using pf becomes a "show stopper" for Suricata.
-
In Security Onion, the software can flip between Snort and Suricata with a simple change in a conf file. ENGINE=SNORT or ENGINE=SURICATA and restarting the NSM. Maybe the package should stay the same with just the engine changing behind the scene on pfSense.
I don't know if one is better than the other. My Network speeds will never need PF_Ring or multi-process. I see a lot of False positives and I am always opening up the Ruleset to allow more traffic thru. With the latest patch Tueday, ET PRO sid:2002400, Sid 3:13802 detected windows updates as Malware.
I have 6 routers that I need to maintain and Snort/pfSense in a PFCenter would help in my daily management. (Wishfull thinking)
Having pfSense perform CINS, DROP, Scans, MSSQL, MYSQL IPS are obvious but almost all other alerts that I have seen are false positives. Unless Yahoo is full of malware.
Since I have been running Full Packet Capture after pfSense with Security Onion, I can drill down on an alert and see if it was malicious. Using its others tools like ELSA you can perform a search for a particular IP and see where else it showed up on your network and also view the full packets that were involved.
Another issue is knowing what is malicious and what is not. When an alert is triggered the information presented is limited in scope. A project like https://code.google.com/p/collective-intelligence-framework/
"CIF allows you to combine known malicious threat information from many sources and use that information for identification (incident response), detection (IDS) and mitigation (null route)."I think having OSSEC installed on all Servers and sensitive Hardware can help detect Intrusions. It will perform log analysis, file integrity checking, policy monitoring, rootkit detection, real-time alerting and active response.
I would be thrilled to see someone develop an OSSEC package in pfSense as any Active Response taken on a server could put a block at the pfSense Router level.
A Quote from Doug Burks of Security Onion "A better solution would be to let your firewall be a firewall and leave the IDS functionality to Security Onion."
This link to OSSEC developer/founder Daniel B. Cids Blog, I believe, says it all http://dcid.me/notes/2013-jul-08My two cents …
-
I am using the latest firefox version 26. But its not a big deal since i can make it work the other way. I did check with internet explorer and it does work correctly.
And thanks again for all the work that you put into adding separate engines. Its much easier and cleaner then how i was adding them manually. :)
shinzo:
I tried to reproduce your problem in my VMware environment and could not. I used Firefox 26 on a Windows XP SP3 virtual machine. I connected to a pfSense 2.1-amd64 box with the latest Snort package. I could both import Aliases into the Frag3 engine list, and I could create a new, empty engine and add an Alias from the button in the Details screen. I tried it several times and could not get it to fail for me.
I did a fresh install of Firefox on that VM just before the test. Prior to the test, the VM only had Chrome and the native IE installed. Does your Firefox have any extras installed that might interfere with JavaScript or other stuff?
Bill
So i created another firefox portable and gave it a shot and works fine. So i have to go through the extensions to see which one is causing my issue. Thanks for looking into it And you have my vote on Suricata
-
I've got this after updating two boxes.
Is it a normal behavior?
update log
Starting rules update... Time: 2013-12-13 00:03:01 Downloading Snort VRT md5 file 'snortrules-snapshot-2946.tar.gz.md5'... Checking Snort VRT md5 file... There is a new set of Snort VRT rules posted. Downloading file 'snortrules-snapshot-2946.tar.gz'... Done downloading rules file. Downloading Snort GPLv2 Community Rules md5 file 'community-rules.tar.gz.md5'... Checking Snort GPLv2 Community Rules md5. There is a new set of Snort GPLv2 Community Rules posted. Downloading file 'community-rules.tar.gz'... Done downloading Snort GPLv2 Community Rules file. Extracting and installing Snort GPLv2 Community Rules... Installation of Snort GPLv2 Community Rules completed. Downloading Emerging Threats Open md5 file 'emerging.rules.tar.gz.md5'... Checking Emerging Threats Open md5. There is a new set of Emerging Threats Open rules posted. Downloading file 'emerging.rules.tar.gz'... Done downloading Emerging Threats Open rules file. Extracting and installing Emerging Threats Open rules... Installation of Emerging Threats Open rules completed. Extracting and installing Snort VRT rules... Using Snort VRT precompiled SO rules for FreeBSD-8-1 ... Installation of Snort VRT rules completed. Copying new config and map files... Updating rules configuration for: WAN ... Restarting Snort to activate the new set of rules... Snort has restarted with your new set of rules. The Rules update has finished. Time: 2013-12-13 00:05:19 Starting rules update... Time: 2013-12-13 10:43:23 Extracting and installing Snort GPLv2 Community Rules... Installation of Snort GPLv2 Community Rules completed. Extracting and installing Emerging Threats Open rules... Installation of Emerging Threats Open rules completed. Copying new config and map files... Updating rules configuration for: WAN ... The Rules update has finished. Time: 2013-12-13 10:44:30
But gui shows no vrt rules downloaded
-
bmeeks:
Thanks for the update. Just skipped the whole "test in a non-production system" part and went straight to an actual production system update. Everything is working as expected. Disabled sync, then re-enabled after the update.
I don't need to post my vote on suricata, since I went crazy over the past months on this :D. Another poster said that snort will soon be a thing of the past, and I strongly believe this. Suricata in IPS mode is the way forward IMNSHO.BBcan17:
The windows updates were detected as malware because that's the early release of the new three letter agency backdoor. Ok not a backdoor, but malware to install a backdoor. It's needed for them to do their job. Let's see what's in the "Keeping You Scared" bag. Terrorists, kids, cyber. I'll go with terrorists this time. This should be taken as a joke. Or not. ;)
Disclaimer: The paragraph above (never mind the indent) contains sarcasm. It should not be interpreted as stating actual facts. Microsoft (Inc) would never release backdoors to three letter agencies.
Disclaimer:The disclaimer above contains sarcasm….etc...etc... ;) -
I've got this after updating two boxes.
Is it a normal behavior?
update log
Starting rules update... Time: 2013-12-13 00:03:01 Downloading Snort VRT md5 file 'snortrules-snapshot-2946.tar.gz.md5'... Checking Snort VRT md5 file... There is a new set of Snort VRT rules posted. Downloading file 'snortrules-snapshot-2946.tar.gz'... Done downloading rules file. Downloading Snort GPLv2 Community Rules md5 file 'community-rules.tar.gz.md5'... Checking Snort GPLv2 Community Rules md5. There is a new set of Snort GPLv2 Community Rules posted. Downloading file 'community-rules.tar.gz'... Done downloading Snort GPLv2 Community Rules file. Extracting and installing Snort GPLv2 Community Rules... Installation of Snort GPLv2 Community Rules completed. Downloading Emerging Threats Open md5 file 'emerging.rules.tar.gz.md5'... Checking Emerging Threats Open md5. There is a new set of Emerging Threats Open rules posted. Downloading file 'emerging.rules.tar.gz'... Done downloading Emerging Threats Open rules file. Extracting and installing Emerging Threats Open rules... Installation of Emerging Threats Open rules completed. Extracting and installing Snort VRT rules... Using Snort VRT precompiled SO rules for FreeBSD-8-1 ... Installation of Snort VRT rules completed. Copying new config and map files... Updating rules configuration for: WAN ... Restarting Snort to activate the new set of rules... Snort has restarted with your new set of rules. The Rules update has finished. Time: 2013-12-13 00:05:19 Starting rules update... Time: 2013-12-13 10:43:23 Extracting and installing Snort GPLv2 Community Rules... Installation of Snort GPLv2 Community Rules completed. Extracting and installing Emerging Threats Open rules... Installation of Emerging Threats Open rules completed. Copying new config and map files... Updating rules configuration for: WAN ... The Rules update has finished. Time: 2013-12-13 10:44:30
But gui shows no vrt rules downloaded
No, this is not normal. Looks like the update is downloading the wrong rule version. It should be downloading the file snortrules-snapshot-2955.tar.gz instead of snortrules-snapshot-2946.tar.gz.
Look in the snort_check_for_rule_updates.php file, and just a bit down from the top is a section where it parses the Snort version (and thus the rule to download) directly from the Snort binary. Wonder if that part is not working, or you have an old version of the file?
Here is the section of code:
/* Grab the Snort binary version programmatically and use it to construct */ /* the proper Snort VRT rules tarball and md5 filenames. */ exec("/usr/local/bin/snort -V 2>&1 |/usr/bin/grep Version | /usr/bin/cut -c20-26", $snortver); // Save the version with decimal delimiters for use in extracting the rules $snort_version = $snortver[0]; // Create a collapsed version string for use in the tarball filename $snortver[0] = str_replace(".", "", $snortver[0]); $snort_filename = "snortrules-snapshot-{$snortver[0]}.tar.gz"; $snort_filename_md5 = "{$snort_filename}.md5"; $snort_rule_url = VRT_DNLD_URL;
If your file looks like the above, then try hardcoding the $snort_filename variable to "snortrules-snapshot-2955.tar.gz". Let me know what you find. This should not happen, so I would like to make sure any software bug is fixed.
Bill