Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Suricata IDS 1.4.6 BETA package update v0.3 released

    Scheduled Pinned Locked Moved pfSense Packages
    41 Posts 12 Posters 13.3k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • bmeeksB
      bmeeks
      last edited by

      @ScottCall:

      @bmeeks:

      Goto the LOGS MGMT tab and open the suricata.log by selecting it in the drop-down selector to view the contents.  See what errors are in there.  Suricata logs it's stuff to its own private log file.  Report back if you see something in there.

      Bill

      Thanks Bill.

      I checked under the "Logs Browser" and none of the logs exist, they all return "Log file does not exist or that logging feature is not enabled."

      I'm using ETOpen, Snort VRT (free registered) and Snort GPLv2.

      I'll schedule some time to reboot the firewall to see if that's what it needs.

      Thanks
      -S

      Whoa!  That's certainly not right.  The suricata.log file should always exist as it is created with any attempted start of Suricata.  Something is seriously borked with the Suricata install is my suspicion.  A reboot and possible reinstall of Suricata would be a good start.

      EDIT UPDATE: just re-read your original post and noticed the NanoBSD mention.  I overlooked that previously. That could be the problem.  There may be some problems with Suricata forgetting to put the file system in R/W mode before it writes configuration information.  I did all my development and testing on regular installs with hard disks (well, virtual hard disks in VMs).  I have not tested Suricata on something like NanoBSD.  You also may not have enough RAM to run Suricata and pfSense.  You said 4 GB, so I assume that is total CF capacity.  The OS is going to take a bit, and then Suricata gets what's left over.  That is not going to be much.

      Bill

      1 Reply Last reply Reply Quote 0
      • S
        ScottCall
        last edited by

        I did the nano install to try pfSense over the existing (commercial, expensive and outdated) install on the boxes.  I've been planning on converting them to HDD based installs anyways, so I'll hold off on suricata until then.

        Thanks!

        1 Reply Last reply Reply Quote 0
        • bmeeksB
          bmeeks
          last edited by

          @ScottCall:

          I did the nano install to try pfSense over the existing (commercial, expensive and outdated) install on the boxes.  I've been planning on converting them to HDD based installs anyways, so I'll hold off on suricata until then.

          Thanks!

          It should work fine on a conventional HDD (or SSD) installation.  Unfortunately, I don't have a CF system to test with.

          Bill

          1 Reply Last reply Reply Quote 0
          • G
            Gibbon_99
            last edited by

            Hi

            My logs are full of this message when starting Suricata

            
            Apr 17 17:50:44 	suricata[24023]: 17/4/2014 -- 17:50:44 - <error>-- [ERRCODE: SC_ERR_DATALINK_UNIMPLEMENTED(38)] - Error: datalink type 0 not yet supported in module DecodePcap
            Apr 17 17:50:44 	suricata[24023]: 17/4/2014 -- 17:50:44 - <error>-- [ERRCODE: SC_ERR_DATALINK_UNIMPLEMENTED(38)] - Error: datalink type 0 not yet supported in module DecodePcap
            Apr 17 17:50:44 	suricata[24023]: 17/4/2014 -- 17:50:44 - <error>-- [ERRCODE: SC_ERR_DATALINK_UNIMPLEMENTED(38)] - Error: datalink type 0 not yet supported in module DecodePcap
            Apr 17 17:50:44 	suricata[24023]: 17/4/2014 -- 17:50:44 - <error>-- [ERRCODE: SC_ERR_DATALINK_UNIMPLEMENTED(38)] - Error: datalink type 0 not yet supported in module DecodePcap
            Apr 17 17:50:44 	suricata[24023]: 17/4/2014 -- 17:50:44 - <error>-- [ERRCODE: SC_ERR_DATALINK_UNIMPLEMENTED(38)] - Error: datalink type 0 not yet supported in module DecodePcap
            Apr 17 17:50:44 	suricata[24023]: 17/4/2014 -- 17:50:44 - <error>-- [ERRCODE: SC_ERR_DATALINK_UNIMPLEMENTED(38)] - Error: datalink type 0 not yet supported in module DecodePcap
            Apr 17 17:50:44 	suricata[24023]: 17/4/2014 -- 17:50:44 - <error>-- [ERRCODE: SC_ERR_DATALINK_UNIMPLEMENTED(38)] - Error: datalink type 0 not yet supported in module DecodePcap
            Apr 17 17:50:44 	suricata[24023]: 17/4/2014 -- 17:50:44 - <error>-- [ERRCODE: SC_ERR_DATALINK_UNIMPLEMENTED(38)] - Error: datalink type 0 not yet supported in module DecodePcap
            Apr 17 17:50:44 	suricata[24023]: 17/4/2014 -- 17:50:44 - <error>-- [ERRCODE: SC_ERR_DATALINK_UNIMPLEMENTED(38)] - Error: datalink type 0 not yet supported in module DecodePcap
            Apr 17 17:50:44 	suricata[24023]: 17/4/2014 -- 17:50:44 - <error>-- [ERRCODE: SC_ERR_DATALINK_UNIMPLEMENTED(38)] - Error: datalink type 0 not yet supported in module DecodePcap
            Apr 17 17:50:44 	suricata[24023]: 17/4/2014 -- 17:50:44 - <error>-- [ERRCODE: SC_ERR_DATALINK_UNIMPLEMENTED(38)] - Error: datalink type 0 not yet supported in module DecodePcap
            Apr 17 17:50:44 	suricata[24023]: 17/4/2014 -- 17:50:44 - <error>-- [ERRCODE: SC_ERR_DATALINK_UNIMPLEMENTED(38)] - Error: datalink type 0 not yet supported in module DecodePcap
            Apr 17 17:50:44 	suricata[24023]: 17/4/2014 -- 17:50:44 - <error>-- [ERRCODE: SC_ERR_DATALINK_UNIMPLEMENTED(38)] - Error: datalink type 0 not yet supported in module DecodePcap
            Apr 17 17:50:44 	suricata[24023]: 17/4/2014 -- 17:50:44 - <error>-- [ERRCODE: SC_ERR_DATALINK_UNIMPLEMENTED(38)] - Error: datalink type 0 not yet supported in module DecodePcap
            Apr 17 17:50:44 	suricata[24023]: 17/4/2014 -- 17:50:44 - <error>-- [ERRCODE: SC_ERR_DATALINK_UNIMPLEMENTED(38)] - Error: datalink type 0 not yet supported in module DecodePcap
            Apr 17 17:50:44 	suricata[24023]: 17/4/2014 -- 17:50:44 - <error>-- [ERRCODE: SC_ERR_DATALINK_UNIMPLEMENTED(38)] - Error: datalink type 0 not yet supported in module DecodePcap
            Apr 17 17:50:44 	suricata[24023]: 17/4/2014 -- 17:50:44 - <error>-- [ERRCODE: SC_ERR_DATALINK_UNIMPLEMENTED(38)] - Error: datalink type 0 not yet supported in module DecodePcap
            Apr 17 17:50:44 	suricata[24023]: 17/4/2014 -- 17:50:44 - <error>-- [ERRCODE: SC_ERR_DATALINK_UNIMPLEMENTED(38)] - Error: datalink type 0 not yet supported in module DecodePcap</error></error></error></error></error></error></error></error></error></error></error></error></error></error></error></error></error></error> 
            
            
            Version
            
            2.1.2-RELEASE (amd64)
            built on Thu Apr 10 05:42:13 EDT 2014
            FreeBSD 8.3-RELEASE-p15
            
            You are on the latest version.
            
            

            Any pointers?

            Thanks

            1 Reply Last reply Reply Quote 0
            • bmeeksB
              bmeeks
              last edited by

              @Gibbon_99:

              Hi

              My logs are full of this message when starting Suricata

              
              Apr 17 17:50:44 	suricata[24023]: 17/4/2014 -- 17:50:44 - <error>-- [ERRCODE: SC_ERR_DATALINK_UNIMPLEMENTED(38)] - Error: datalink type 0 not yet supported in module DecodePcap
              Apr 17 17:50:44 	suricata[24023]: 17/4/2014 -- 17:50:44 - <error>-- [ERRCODE: SC_ERR_DATALINK_UNIMPLEMENTED(38)] - Error: datalink type 0 not yet supported in module DecodePcap
              Apr 17 17:50:44 	suricata[24023]: 17/4/2014 -- 17:50:44 - <error>-- [ERRCODE: SC_ERR_DATALINK_UNIMPLEMENTED(38)] - Error: datalink type 0 not yet supported in module DecodePcap
              Apr 17 17:50:44 	suricata[24023]: 17/4/2014 -- 17:50:44 - <error>-- [ERRCODE: SC_ERR_DATALINK_UNIMPLEMENTED(38)] - Error: datalink type 0 not yet supported in module DecodePcap
              Apr 17 17:50:44 	suricata[24023]: 17/4/2014 -- 17:50:44 - <error>-- [ERRCODE: SC_ERR_DATALINK_UNIMPLEMENTED(38)] - Error: datalink type 0 not yet supported in module DecodePcap
              Apr 17 17:50:44 	suricata[24023]: 17/4/2014 -- 17:50:44 - <error>-- [ERRCODE: SC_ERR_DATALINK_UNIMPLEMENTED(38)] - Error: datalink type 0 not yet supported in module DecodePcap
              Apr 17 17:50:44 	suricata[24023]: 17/4/2014 -- 17:50:44 - <error>-- [ERRCODE: SC_ERR_DATALINK_UNIMPLEMENTED(38)] - Error: datalink type 0 not yet supported in module DecodePcap
              Apr 17 17:50:44 	suricata[24023]: 17/4/2014 -- 17:50:44 - <error>-- [ERRCODE: SC_ERR_DATALINK_UNIMPLEMENTED(38)] - Error: datalink type 0 not yet supported in module DecodePcap
              Apr 17 17:50:44 	suricata[24023]: 17/4/2014 -- 17:50:44 - <error>-- [ERRCODE: SC_ERR_DATALINK_UNIMPLEMENTED(38)] - Error: datalink type 0 not yet supported in module DecodePcap
              Apr 17 17:50:44 	suricata[24023]: 17/4/2014 -- 17:50:44 - <error>-- [ERRCODE: SC_ERR_DATALINK_UNIMPLEMENTED(38)] - Error: datalink type 0 not yet supported in module DecodePcap
              Apr 17 17:50:44 	suricata[24023]: 17/4/2014 -- 17:50:44 - <error>-- [ERRCODE: SC_ERR_DATALINK_UNIMPLEMENTED(38)] - Error: datalink type 0 not yet supported in module DecodePcap
              Apr 17 17:50:44 	suricata[24023]: 17/4/2014 -- 17:50:44 - <error>-- [ERRCODE: SC_ERR_DATALINK_UNIMPLEMENTED(38)] - Error: datalink type 0 not yet supported in module DecodePcap
              Apr 17 17:50:44 	suricata[24023]: 17/4/2014 -- 17:50:44 - <error>-- [ERRCODE: SC_ERR_DATALINK_UNIMPLEMENTED(38)] - Error: datalink type 0 not yet supported in module DecodePcap
              Apr 17 17:50:44 	suricata[24023]: 17/4/2014 -- 17:50:44 - <error>-- [ERRCODE: SC_ERR_DATALINK_UNIMPLEMENTED(38)] - Error: datalink type 0 not yet supported in module DecodePcap
              Apr 17 17:50:44 	suricata[24023]: 17/4/2014 -- 17:50:44 - <error>-- [ERRCODE: SC_ERR_DATALINK_UNIMPLEMENTED(38)] - Error: datalink type 0 not yet supported in module DecodePcap
              Apr 17 17:50:44 	suricata[24023]: 17/4/2014 -- 17:50:44 - <error>-- [ERRCODE: SC_ERR_DATALINK_UNIMPLEMENTED(38)] - Error: datalink type 0 not yet supported in module DecodePcap
              Apr 17 17:50:44 	suricata[24023]: 17/4/2014 -- 17:50:44 - <error>-- [ERRCODE: SC_ERR_DATALINK_UNIMPLEMENTED(38)] - Error: datalink type 0 not yet supported in module DecodePcap
              Apr 17 17:50:44 	suricata[24023]: 17/4/2014 -- 17:50:44 - <error>-- [ERRCODE: SC_ERR_DATALINK_UNIMPLEMENTED(38)] - Error: datalink type 0 not yet supported in module DecodePcap</error></error></error></error></error></error></error></error></error></error></error></error></error></error></error></error></error></error> 
              
              
              Version
              
              2.1.2-RELEASE (amd64)
              built on Thu Apr 10 05:42:13 EDT 2014
              FreeBSD 8.3-RELEASE-p15
              
              You are on the latest version.
              
              

              Any pointers?

              Thanks

              Have not seen that error before.  This essentially means the protocol on the interface is not supported by Suricata.  Let me first ask you to try the old standard technique of removing Suricata and reinstalling.  Before doing this, go to the GLOBAL SETTINGS tab and check the box near the bottom of the page to retain Suricata settings when deinstalling.  Save that change and then remove the package under System…Packages from the pfSense menu.  When removal is complete, install it again.

              Please report back on the result.  Also, can you post what the interfaces are you are using Suricata on?  By that I mean vanilla Ethernet, or maybe something like PPP or some kind of tunneling interface?

              Bill

              1 Reply Last reply Reply Quote 0
              • S
                Supermule Banned
                last edited by

                Remember to reboot after deinstall….before you install it again!

                1 Reply Last reply Reply Quote 0
                • G
                  Gibbon_99
                  last edited by

                  @bmeeks:

                  Have not seen that error before.  This essentially means the protocol on the interface is not supported by Suricata.  Let me first ask you to try the old standard technique of removing Suricata and reinstalling.  Before doing this, go to the GLOBAL SETTINGS tab and check the box near the bottom of the page to retain Suricata settings when deinstalling.  Save that change and then remove the package under System…Packages from the pfSense menu.  When removal is complete, install it again.

                  Please report back on the result.  Also, can you post what the interfaces are you are using Suricata on?  By that I mean vanilla Ethernet, or maybe something like PPP or some kind of tunneling interface?

                  Bill

                  Remove and reinstall done - no change - still get the error when using the WAN interface.

                  I have created a LAN interface mapping, and it works just fine.

                  The WAN mapping is a PPPOE interface - looks like that type is not yet supported.

                  Here is the log for the working LAN interface ( type em0 ):

                  
                  18/4/2014 -- 12:42:24 - <info>-- allocated 1572864 bytes of memory for the defrag hash... 65536 buckets of size 24
                  18/4/2014 -- 12:42:24 - <info>-- preallocated 65535 defrag trackers of size 120
                  18/4/2014 -- 12:42:24 - <info>-- defrag memory usage: 9437064 bytes, maximum: 33554432
                  18/4/2014 -- 12:42:24 - <info>-- AutoFP mode using "Active Packets" flow load balancer
                  18/4/2014 -- 12:42:24 - <info>-- preallocated 1024 packets. Total memory 4294656
                  18/4/2014 -- 12:42:24 - <info>-- allocated 98304 bytes of memory for the host hash... 4096 buckets of size 24
                  18/4/2014 -- 12:42:24 - <info>-- preallocated 1000 hosts of size 96
                  18/4/2014 -- 12:42:24 - <info>-- host memory usage: 194304 bytes, maximum: 16777216
                  18/4/2014 -- 12:42:24 - <info>-- allocated 1572864 bytes of memory for the flow hash... 65536 buckets of size 24
                  18/4/2014 -- 12:42:24 - <info>-- preallocated 10000 flows of size 224
                  18/4/2014 -- 12:42:24 - <info>-- flow memory usage: 3812864 bytes, maximum: 33554432
                  18/4/2014 -- 12:42:24 - <info>-- IP reputation disabled
                  18/4/2014 -- 12:42:24 - <info>-- Added "35" classification types from the classification file
                  18/4/2014 -- 12:42:24 - <info>-- Added "19" reference types from the reference.config file
                  18/4/2014 -- 12:42:24 - <info>-- using magic-file /usr/pbi/suricata-amd64/etc/suricata/suricata_12618_em0/magic
                  18/4/2014 -- 12:42:24 - <info>-- Delayed detect enabled
                  18/4/2014 -- 12:42:24 - <info>-- Packets will start being processed before signatures are active.
                  18/4/2014 -- 12:42:24 - <info>-- Threshold config parsed: 1 rule(s) found
                  18/4/2014 -- 12:42:24 - <info>-- Core dump size is unlimited.
                  18/4/2014 -- 12:42:24 - <info>-- fast output device (regular) initialized: alerts.log
                  18/4/2014 -- 12:42:24 - <info>-- Unified2-alert initialized: filename unified2.alert, limit 32 MB
                  18/4/2014 -- 12:42:24 - <info>-- http-log output device (regular) initialized: http.log
                  18/4/2014 -- 12:42:24 - <info>-- Syslog output initialized
                  18/4/2014 -- 12:42:24 - <info>-- Using 1 live device(s).
                  18/4/2014 -- 12:42:24 - <info>-- using interface em0
                  18/4/2014 -- 12:42:24 - <info>-- Running in 'auto' checksum mode. Detection of interface state will require 1000 packets.
                  18/4/2014 -- 12:42:24 - <info>-- Found an MTU of 1500 for 'em0'
                  18/4/2014 -- 12:42:24 - <info>-- Set snaplen to 1500 for 'em0'
                  18/4/2014 -- 12:42:24 - <info>-- RunModeIdsPcapAutoFp initialised
                  18/4/2014 -- 12:42:24 - <info>-- stream "max-sessions": 262144
                  18/4/2014 -- 12:42:24 - <info>-- stream "prealloc-sessions": 32768
                  18/4/2014 -- 12:42:24 - <info>-- stream "memcap": 33554432
                  18/4/2014 -- 12:42:24 - <info>-- stream "midstream" session pickups: disabled
                  18/4/2014 -- 12:42:24 - <info>-- stream "async-oneside": disabled
                  18/4/2014 -- 12:42:24 - <info>-- stream "checksum-validation": disabled
                  18/4/2014 -- 12:42:24 - <info>-- stream."inline": disabled
                  18/4/2014 -- 12:42:24 - <info>-- stream.reassembly "memcap": 67108864
                  18/4/2014 -- 12:42:24 - <info>-- stream.reassembly "depth": 0
                  18/4/2014 -- 12:42:24 - <info>-- stream.reassembly "toserver-chunk-size": 2560
                  18/4/2014 -- 12:42:24 - <info>-- stream.reassembly "toclient-chunk-size": 2560
                  18/4/2014 -- 12:42:24 - <info>-- all 7 packet processing threads, 1 management threads initialized, engine started.
                  18/4/2014 -- 12:42:24 - <error>-- [ERRCODE: SC_ERR_INVALID_SIGNATURE(39)] - Signature combines packet specific matches (like dsize, flags, ttl) with stream / state matching by matching on app layer proto (like using http_* keywords).
                  18/4/2014 -- 12:42:24 - <error>-- [ERRCODE: SC_ERR_INVALID_SIGNATURE(39)] - error parsing signature "alert tcp $HOME_NET any -> $EXTERNAL_NET 1024:65535 (msg:"MALWARE-CNC Win.Trojan.Fakeavlock variant outbound connection"; flow:to_server,established; dsize:267<>276; content:"User-Agent|3A| Mozilla/5.0 (Windows|3B| U|3B| MSIE 9.0|3B| Windows NT 9.0|3B| en-US)|0D 0A|"; fast_pattern:only; http_header; urilen:159; pcre:"/\x2f[A-F0-9]{158}/U"; metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop, ruleset community, service http; reference:url,www.virustotal.com/file/c49f7dbc036ad0a86df02cbbde00cb3b3fbd651d82f6c9c5a98170644374f64f/analysis/; classtype:trojan-activity; sid:25675; rev:7;)" from file /usr/pbi/suricata-amd64/etc/suricata/suricata_12618_em0/rules/suricata.rules at line 59
                  18/4/2014 -- 12:42:24 - <error>-- [ERRCODE: SC_ERR_INVALID_SIGNATURE(39)] - previous keyword has a fast_pattern:only; set. Can't have relative keywords around a fast_pattern only content
                  18/4/2014 -- 12:42:24 - <error>-- [ERRCODE: SC_ERR_INVALID_SIGNATURE(39)] - error parsing signature "alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"MALWARE-OTHER Win.Trojan.Zeus Spam 2013 dated zip/exe HTTP Response - potential malware download"; flow:to_client,established; content:"-2013.zip|0D 0A|"; fast_pattern:only; content:"-2013.zip|0D 0A|"; http_header; content:"-"; within:1; distance:-14; http_header; file_data; content:"-2013.exe"; content:"-"; within:1; distance:-14; metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop, ruleset community, service http; reference:url,www.virustotal.com/en/file/2eff3ee6ac7f5bf85e4ebcbe51974d0708cef666581ef1385c628233614b22c0/analysis/; classtype:trojan-activity; sid:26470; rev:1;)" from file /usr/pbi/suricata-amd64/etc/suricata/suricata_12618_em0/rules/suricata.rules at line 94
                  18/4/2014 -- 12:42:24 - <error>-- [ERRCODE: SC_ERR_INVALID_SIGNATURE(39)] - previous keyword has a fast_pattern:only; set. Can't have relative keywords around a fast_pattern only content
                  18/4/2014 -- 12:42:24 - <error>-- [ERRCODE: SC_ERR_INVALID_SIGNATURE(39)] - error parsing signature "alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC Bancos fake JPG encrypted config file download"; flow:to_server,established; content:".com.br|0D 0A 0D 0A|"; fast_pattern:only; content:"/imagens/"; depth:9; http_uri; content:".jpg"; distance:0; http_uri; pcre:"/\.jpg\x20HTTP\/1\.[01]\r\nUser\x2dAgent\x3a\x20[a-z]+\r\nHost\x3a\x20[a-z0-9\x2d\x2e]+\.com\.br\r\n\r\n$/"; metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop, ruleset community, service http; classtype:trojan-activity; sid:26722; rev:1;)" from file /usr/pbi/suricata-amd64/etc/suricata/suricata_12618_em0/rules/suricata.rules at line 129
                  18/4/2014 -- 12:42:24 - <error>-- [ERRCODE: SC_ERR_INVALID_SIGNATURE(39)] - Signature combines packet specific matches (like dsize, flags, ttl) with stream / state matching by matching on app layer proto (like using http_* keywords).
                  18/4/2014 -- 12:42:24 - <error>-- [ERRCODE: SC_ERR_INVALID_SIGNATURE(39)] - error parsing signature "alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC Win32/Autorun.JN variant outbound connection"; flow:to_server,established; dsize:142; urilen:8; content:"/u5.htm"; fast_pattern:only; http_uri; content:"//u5.htm"; http_raw_uri; metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop, ruleset community, service http; reference:url,www.microsoft.com/security/portal/threat/encyclopedia/Entry.aspx?Name=Worm%3AWin32%2FAutorun.JN; reference:url,www.virustotal.com/en/file/36144738373c665d262bc007fceaeb9613e59ec29ea3d7424dd9f400af2c0f06/analysis/; classtype:trojan-activity; sid:26966; rev:3;)" from file /usr/pbi/suricata-amd64/etc/suricata/suricata_12618_em0/rules/suricata.rules at line 189
                  18/4/2014 -- 12:42:24 - <error>-- [ERRCODE: SC_ERR_INVALID_SIGNATURE(39)] - Signature combines packet specific matches (like dsize, flags, ttl) with stream / state matching by matching on app layer proto (like using http_* keywords).
                  18/4/2014 -- 12:42:24 - <error>-- [ERRCODE: SC_ERR_INVALID_SIGNATURE(39)] - error parsing signature "alert tcp $HOME_NET any -> $EXTERNAL_NET 80 (msg:"MALWARE-CNC Win.Trojan.Conficker variant outbound connection"; flow:to_server,established; dsize:146; urilen:1; content:"GET / HTTP/1.1|0D 0A|User-Agent: Mozilla/4.0 (compatible|3B| MSIE 7.0|3B| Windows NT 5.1|3B| Trident/4.0)|0D 0A|Host: checkip.dyndns.org|0D 0A|Cache-Control: no-cache|0D 0A 0D 0A|"; fast_pattern:only; metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop, ruleset community, service http; reference:url,www.sans.org/security-resources/malwarefaq/conficker-worm.php; classtype:trojan-activity; sid:28542; rev:1;)" from file /usr/pbi/suricata-amd64/etc/suricata/suricata_12618_em0/rules/suricata.rules at line 291
                  18/4/2014 -- 12:42:24 - <error>-- [ERRCODE: SC_ERR_INVALID_SIGNATURE(39)] - Signature combines packet specific matches (like dsize, flags, ttl) with stream / state matching by matching on app layer proto (like using http_* keywords).
                  18/4/2014 -- 12:42:24 - <error>-- [ERRCODE: SC_ERR_INVALID_SIGNATURE(39)] - error parsing signature "alert tcp $HOME_NET any -> $EXTERNAL_NET 80 (msg:"MALWARE-CNC Win.Trojan.Conficker variant outbound connection"; flow:to_server,established; dsize:139; urilen:1; content:"GET / HTTP/1.1|0D 0A|User-Agent: Mozilla/4.0 (compatible|3B| MSIE 7.0|3B| Windows NT 5.1|3B| Trident/4.0)|0D 0A|Host: www.ask.com|0D 0A|Cache-Control: no-cache|0D 0A 0D 0A|"; fast_pattern:only; metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop, ruleset community, service http; reference:url,www.sans.org/security-resources/malwarefaq/conficker-worm.php; classtype:trojan-activity; sid:28543; rev:1;)" from file /usr/pbi/suricata-amd64/etc/suricata/suricata_12618_em0/rules/suricata.rules at line 292
                  18/4/2014 -- 12:42:24 - <error>-- [ERRCODE: SC_ERR_INVALID_SIGNATURE(39)] - previous keyword has a fast_pattern:only; set. Can't have relative keywords around a fast_pattern only content
                  18/4/2014 -- 12:42:24 - <error>-- [ERRCODE: SC_ERR_INVALID_SIGNATURE(39)] - error parsing signature "alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC Win.Trojan.Injector variant outbound communication"; flow:to_server,established; urilen:9; content:"/load.exe HTTP/1.1|0D 0A|User-Agent: Mozilla/"; fast_pattern:only; content:"|3B 20|MSIE|20|"; http_header; content:")|0D 0A|Host: "; distance:0; http_header; content:!"Accept"; http_header; metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop, ruleset community, service http; reference:url,urlquery.net/search.php?q=%5C%2Fload%5C.exe%24&type=regexp&start=2013-08-24&end=2013-11-22&max=400; reference:url,www.virustotal.com/en/file/032572ea1f34a060ecac98a8e2899dc0f2a41dff199e879050481ddd3818b4d0/analysis/; classtype:trojan-activity; sid:28807; rev:1;)" from file /usr/pbi/suricata-amd64/etc/suricata/suricata_12618_em0/rules/suricata.rules at line 298
                  18/4/2014 -- 12:42:24 - <error>-- [ERRCODE: SC_ERR_INVALID_SIGNATURE(39)] - Signature combines packet specific matches (like dsize, flags, ttl) with stream / state matching by matching on app layer proto (like using http_* keywords).
                  18/4/2014 -- 12:42:24 - <error>-- [ERRCODE: SC_ERR_INVALID_SIGNATURE(39)] - error parsing signature "alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC Win.Trojan.WEC variant outbound connection"; flow:to_server,established; dsize:69; urilen:1; content:"GET / HTTP/1.1|0D 0A|User-Agent: Mozilla/4.0|0D 0A|Host: checkip.dyndns.org|0D 0A 0D 0A|"; fast_pattern:only; metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop, ruleset community, service http; reference:url,www.virustotal.com/en/file/164c792247b2822ab1dce8271a9498d3c9172ff21d36feccf83265ded1be8d0b/analysis/; classtype:trojan-activity; sid:29882; rev:2;)" from file /usr/pbi/suricata-amd64/etc/suricata/suricata_12618_em0/rules/suricata.rules at line 416
                  18/4/2014 -- 12:42:24 - <error>-- [ERRCODE: SC_ERR_INVALID_SIGNATURE(39)] - previous keyword has a fast_pattern:only; set. Can't have relative keywords around a fast_pattern only content
                  18/4/2014 -- 12:42:24 - <error>-- [ERRCODE: SC_ERR_INVALID_SIGNATURE(39)] - error parsing signature "alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC Win.Trojan.Bancos variant outbound connection "; flow:to_server,established; content:"Content-Length: 166"; content:".php HTTP/1.1|0D 0A|Accept: */*|0D 0A|Content-Type: application/x-www-form-urlencoded|0D 0A|User-Agent: Mozilla/5.0 (Windows NT 6.1|3B| Trident/7.0|3B| rv:11.0) like Gecko|0D 0A|Host: "; fast_pattern:only; content:"v="; depth:2; http_client_body; content:"&c="; within:7; http_client_body; pcre:"/\x3d\x3d$/P"; metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop, ruleset community, service http; reference:url,www.virustotal.com/en/file/51540d7c9a4bc2a430bc50c85cf9cec5c6f2bb755e800a3f3575ba34fe5f008c/analysis; classtype:trojan-activity; sid:29895; rev:1;)" from file /usr/pbi/suricata-amd64/etc/suricata/suricata_12618_em0/rules/suricata.rules at line 421
                  18/4/2014 -- 12:42:28 - <info>-- No packets with invalid checksum, assuming checksum offloading is NOT used
                  18/4/2014 -- 12:42:35 - <info>-- 2 rule files processed. 15090 rules successfully loaded, 9 rules failed</info></info></error></error></error></error></error></error></error></error></error></error></error></error></error></error></error></error></error></error></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info> 
                  

                  Here's the log for the not working WAN interface ( type PPPOE )

                  
                  18/4/2014 -- 12:46:39 - <info>-- allocated 1572864 bytes of memory for the defrag hash... 65536 buckets of size 24
                  18/4/2014 -- 12:46:39 - <info>-- preallocated 65535 defrag trackers of size 120
                  18/4/2014 -- 12:46:39 - <info>-- defrag memory usage: 9437064 bytes, maximum: 33554432
                  18/4/2014 -- 12:46:39 - <info>-- AutoFP mode using "Active Packets" flow load balancer
                  18/4/2014 -- 12:46:39 - <info>-- preallocated 1024 packets. Total memory 4294656
                  18/4/2014 -- 12:46:39 - <info>-- allocated 98304 bytes of memory for the host hash... 4096 buckets of size 24
                  18/4/2014 -- 12:46:39 - <info>-- preallocated 1000 hosts of size 96
                  18/4/2014 -- 12:46:39 - <info>-- host memory usage: 194304 bytes, maximum: 16777216
                  18/4/2014 -- 12:46:39 - <info>-- allocated 1572864 bytes of memory for the flow hash... 65536 buckets of size 24
                  18/4/2014 -- 12:46:39 - <info>-- preallocated 10000 flows of size 224
                  18/4/2014 -- 12:46:39 - <info>-- flow memory usage: 3812864 bytes, maximum: 33554432
                  18/4/2014 -- 12:46:39 - <info>-- IP reputation disabled
                  18/4/2014 -- 12:46:39 - <info>-- Added "35" classification types from the classification file
                  18/4/2014 -- 12:46:39 - <info>-- Added "19" reference types from the reference.config file
                  18/4/2014 -- 12:46:39 - <info>-- using magic-file /usr/pbi/suricata-amd64/etc/suricata/suricata_51110_pppoe0/magic
                  18/4/2014 -- 12:46:39 - <info>-- Delayed detect enabled
                  18/4/2014 -- 12:46:39 - <info>-- Packets will start being processed before signatures are active.
                  18/4/2014 -- 12:46:39 - <info>-- Threshold config parsed: 0 rule(s) found
                  18/4/2014 -- 12:46:39 - <info>-- Core dump size is unlimited.
                  18/4/2014 -- 12:46:39 - <info>-- fast output device (regular) initialized: alerts.log
                  18/4/2014 -- 12:46:39 - <info>-- http-log output device (regular) initialized: http.log
                  18/4/2014 -- 12:46:39 - <info>-- Syslog output initialized
                  18/4/2014 -- 12:46:39 - <info>-- Using 1 live device(s).
                  18/4/2014 -- 12:46:39 - <info>-- using interface pppoe0
                  18/4/2014 -- 12:46:39 - <info>-- Running in 'auto' checksum mode. Detection of interface state will require 1000 packets.
                  18/4/2014 -- 12:46:39 - <info>-- Found an MTU of 1492 for 'pppoe0'
                  18/4/2014 -- 12:46:39 - <info>-- Set snaplen to 1492 for 'pppoe0'
                  18/4/2014 -- 12:46:39 - <info>-- RunModeIdsPcapAutoFp initialised
                  18/4/2014 -- 12:46:39 - <info>-- stream "max-sessions": 262144
                  18/4/2014 -- 12:46:39 - <info>-- stream "prealloc-sessions": 32768
                  18/4/2014 -- 12:46:39 - <info>-- stream "memcap": 33554432
                  18/4/2014 -- 12:46:39 - <info>-- stream "midstream" session pickups: disabled
                  18/4/2014 -- 12:46:39 - <info>-- stream "async-oneside": disabled
                  18/4/2014 -- 12:46:39 - <info>-- stream "checksum-validation": disabled
                  18/4/2014 -- 12:46:39 - <info>-- stream."inline": disabled
                  18/4/2014 -- 12:46:39 - <info>-- stream.reassembly "memcap": 67108864
                  18/4/2014 -- 12:46:39 - <info>-- stream.reassembly "depth": 0
                  18/4/2014 -- 12:46:39 - <info>-- stream.reassembly "toserver-chunk-size": 2560
                  18/4/2014 -- 12:46:39 - <info>-- stream.reassembly "toclient-chunk-size": 2560
                  18/4/2014 -- 12:46:39 - <info>-- all 7 packet processing threads, 1 management threads initialized, engine started.
                  18/4/2014 -- 12:46:39 - <info>-- 1 rule files processed. 163 rules successfully loaded, 0 rules failed
                  18/4/2014 -- 12:46:39 - <info>-- 163 signatures processed. 0 are IP-only rules, 0 are inspecting packet payload, 35 inspect application layer, 76 are decoder event only
                  18/4/2014 -- 12:46:39 - <info>-- building signature grouping structure, stage 1: adding signatures to signature source addresses... complete
                  18/4/2014 -- 12:46:39 - <info>-- building signature grouping structure, stage 2: building source address list... complete
                  18/4/2014 -- 12:46:39 - <info>-- building signature grouping structure, stage 3: building destination address lists... complete
                  18/4/2014 -- 12:46:39 - <info>-- Signature(s) loaded, Detect thread(s) activated.
                  18/4/2014 -- 12:46:40 - <error>-- [ERRCODE: SC_ERR_DATALINK_UNIMPLEMENTED(38)] - Error: datalink type 0 not yet supported in module DecodePcap
                  18/4/2014 -- 12:46:40 - <error>-- [ERRCODE: SC_ERR_DATALINK_UNIMPLEMENTED(38)] - Error: datalink type 0 not yet supported in module DecodePcap
                  18/4/2014 -- 12:46:40 - <error>-- [ERRCODE: SC_ERR_DATALINK_UNIMPLEMENTED(38)] - Error: datalink type 0 not yet supported in module DecodePcap
                  ( lots of repeats snipped )</error></error></error></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info> 
                  
                  1 Reply Last reply Reply Quote 0
                  • bmeeksB
                    bmeeks
                    last edited by

                    @Gibbon_99:

                    Remove and reinstall done - no change - still get the error when using the WAN interface.

                    I have created a LAN interface mapping, and it works just fine.

                    The WAN mapping is a PPPOE interface - looks like that type is not yet supported.

                    Here is the log for the working LAN interface ( type em0 ):

                    
                    18/4/2014 -- 12:42:24 - <info>-- allocated 1572864 bytes of memory for the defrag hash... 65536 buckets of size 24
                    18/4/2014 -- 12:42:24 - <info>-- preallocated 65535 defrag trackers of size 120
                    18/4/2014 -- 12:42:24 - <info>-- defrag memory usage: 9437064 bytes, maximum: 33554432
                    18/4/2014 -- 12:42:24 - <info>-- AutoFP mode using "Active Packets" flow load balancer
                    18/4/2014 -- 12:42:24 - <info>-- preallocated 1024 packets. Total memory 4294656
                    18/4/2014 -- 12:42:24 - <info>-- allocated 98304 bytes of memory for the host hash... 4096 buckets of size 24
                    18/4/2014 -- 12:42:24 - <info>-- preallocated 1000 hosts of size 96
                    18/4/2014 -- 12:42:24 - <info>-- host memory usage: 194304 bytes, maximum: 16777216
                    18/4/2014 -- 12:42:24 - <info>-- allocated 1572864 bytes of memory for the flow hash... 65536 buckets of size 24
                    18/4/2014 -- 12:42:24 - <info>-- preallocated 10000 flows of size 224
                    18/4/2014 -- 12:42:24 - <info>-- flow memory usage: 3812864 bytes, maximum: 33554432
                    18/4/2014 -- 12:42:24 - <info>-- IP reputation disabled
                    18/4/2014 -- 12:42:24 - <info>-- Added "35" classification types from the classification file
                    18/4/2014 -- 12:42:24 - <info>-- Added "19" reference types from the reference.config file
                    18/4/2014 -- 12:42:24 - <info>-- using magic-file /usr/pbi/suricata-amd64/etc/suricata/suricata_12618_em0/magic
                    18/4/2014 -- 12:42:24 - <info>-- Delayed detect enabled
                    18/4/2014 -- 12:42:24 - <info>-- Packets will start being processed before signatures are active.
                    18/4/2014 -- 12:42:24 - <info>-- Threshold config parsed: 1 rule(s) found
                    18/4/2014 -- 12:42:24 - <info>-- Core dump size is unlimited.
                    18/4/2014 -- 12:42:24 - <info>-- fast output device (regular) initialized: alerts.log
                    18/4/2014 -- 12:42:24 - <info>-- Unified2-alert initialized: filename unified2.alert, limit 32 MB
                    18/4/2014 -- 12:42:24 - <info>-- http-log output device (regular) initialized: http.log
                    18/4/2014 -- 12:42:24 - <info>-- Syslog output initialized
                    18/4/2014 -- 12:42:24 - <info>-- Using 1 live device(s).
                    18/4/2014 -- 12:42:24 - <info>-- using interface em0
                    18/4/2014 -- 12:42:24 - <info>-- Running in 'auto' checksum mode. Detection of interface state will require 1000 packets.
                    18/4/2014 -- 12:42:24 - <info>-- Found an MTU of 1500 for 'em0'
                    18/4/2014 -- 12:42:24 - <info>-- Set snaplen to 1500 for 'em0'
                    18/4/2014 -- 12:42:24 - <info>-- RunModeIdsPcapAutoFp initialised
                    18/4/2014 -- 12:42:24 - <info>-- stream "max-sessions": 262144
                    18/4/2014 -- 12:42:24 - <info>-- stream "prealloc-sessions": 32768
                    18/4/2014 -- 12:42:24 - <info>-- stream "memcap": 33554432
                    18/4/2014 -- 12:42:24 - <info>-- stream "midstream" session pickups: disabled
                    18/4/2014 -- 12:42:24 - <info>-- stream "async-oneside": disabled
                    18/4/2014 -- 12:42:24 - <info>-- stream "checksum-validation": disabled
                    18/4/2014 -- 12:42:24 - <info>-- stream."inline": disabled
                    18/4/2014 -- 12:42:24 - <info>-- stream.reassembly "memcap": 67108864
                    18/4/2014 -- 12:42:24 - <info>-- stream.reassembly "depth": 0
                    18/4/2014 -- 12:42:24 - <info>-- stream.reassembly "toserver-chunk-size": 2560
                    18/4/2014 -- 12:42:24 - <info>-- stream.reassembly "toclient-chunk-size": 2560
                    18/4/2014 -- 12:42:24 - <info>-- all 7 packet processing threads, 1 management threads initialized, engine started.
                    18/4/2014 -- 12:42:24 - <error>-- [ERRCODE: SC_ERR_INVALID_SIGNATURE(39)] - Signature combines packet specific matches (like dsize, flags, ttl) with stream / state matching by matching on app layer proto (like using http_* keywords).
                    18/4/2014 -- 12:42:24 - <error>-- [ERRCODE: SC_ERR_INVALID_SIGNATURE(39)] - error parsing signature "alert tcp $HOME_NET any -> $EXTERNAL_NET 1024:65535 (msg:"MALWARE-CNC Win.Trojan.Fakeavlock variant outbound connection"; flow:to_server,established; dsize:267<>276; content:"User-Agent|3A| Mozilla/5.0 (Windows|3B| U|3B| MSIE 9.0|3B| Windows NT 9.0|3B| en-US)|0D 0A|"; fast_pattern:only; http_header; urilen:159; pcre:"/\x2f[A-F0-9]{158}/U"; metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop, ruleset community, service http; reference:url,www.virustotal.com/file/c49f7dbc036ad0a86df02cbbde00cb3b3fbd651d82f6c9c5a98170644374f64f/analysis/; classtype:trojan-activity; sid:25675; rev:7;)" from file /usr/pbi/suricata-amd64/etc/suricata/suricata_12618_em0/rules/suricata.rules at line 59
                    18/4/2014 -- 12:42:24 - <error>-- [ERRCODE: SC_ERR_INVALID_SIGNATURE(39)] - previous keyword has a fast_pattern:only; set. Can't have relative keywords around a fast_pattern only content
                    18/4/2014 -- 12:42:24 - <error>-- [ERRCODE: SC_ERR_INVALID_SIGNATURE(39)] - error parsing signature "alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"MALWARE-OTHER Win.Trojan.Zeus Spam 2013 dated zip/exe HTTP Response - potential malware download"; flow:to_client,established; content:"-2013.zip|0D 0A|"; fast_pattern:only; content:"-2013.zip|0D 0A|"; http_header; content:"-"; within:1; distance:-14; http_header; file_data; content:"-2013.exe"; content:"-"; within:1; distance:-14; metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop, ruleset community, service http; reference:url,www.virustotal.com/en/file/2eff3ee6ac7f5bf85e4ebcbe51974d0708cef666581ef1385c628233614b22c0/analysis/; classtype:trojan-activity; sid:26470; rev:1;)" from file /usr/pbi/suricata-amd64/etc/suricata/suricata_12618_em0/rules/suricata.rules at line 94
                    18/4/2014 -- 12:42:24 - <error>-- [ERRCODE: SC_ERR_INVALID_SIGNATURE(39)] - previous keyword has a fast_pattern:only; set. Can't have relative keywords around a fast_pattern only content
                    18/4/2014 -- 12:42:24 - <error>-- [ERRCODE: SC_ERR_INVALID_SIGNATURE(39)] - error parsing signature "alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC Bancos fake JPG encrypted config file download"; flow:to_server,established; content:".com.br|0D 0A 0D 0A|"; fast_pattern:only; content:"/imagens/"; depth:9; http_uri; content:".jpg"; distance:0; http_uri; pcre:"/\.jpg\x20HTTP\/1\.[01]\r\nUser\x2dAgent\x3a\x20[a-z]+\r\nHost\x3a\x20[a-z0-9\x2d\x2e]+\.com\.br\r\n\r\n$/"; metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop, ruleset community, service http; classtype:trojan-activity; sid:26722; rev:1;)" from file /usr/pbi/suricata-amd64/etc/suricata/suricata_12618_em0/rules/suricata.rules at line 129
                    18/4/2014 -- 12:42:24 - <error>-- [ERRCODE: SC_ERR_INVALID_SIGNATURE(39)] - Signature combines packet specific matches (like dsize, flags, ttl) with stream / state matching by matching on app layer proto (like using http_* keywords).
                    18/4/2014 -- 12:42:24 - <error>-- [ERRCODE: SC_ERR_INVALID_SIGNATURE(39)] - error parsing signature "alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC Win32/Autorun.JN variant outbound connection"; flow:to_server,established; dsize:142; urilen:8; content:"/u5.htm"; fast_pattern:only; http_uri; content:"//u5.htm"; http_raw_uri; metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop, ruleset community, service http; reference:url,www.microsoft.com/security/portal/threat/encyclopedia/Entry.aspx?Name=Worm%3AWin32%2FAutorun.JN; reference:url,www.virustotal.com/en/file/36144738373c665d262bc007fceaeb9613e59ec29ea3d7424dd9f400af2c0f06/analysis/; classtype:trojan-activity; sid:26966; rev:3;)" from file /usr/pbi/suricata-amd64/etc/suricata/suricata_12618_em0/rules/suricata.rules at line 189
                    18/4/2014 -- 12:42:24 - <error>-- [ERRCODE: SC_ERR_INVALID_SIGNATURE(39)] - Signature combines packet specific matches (like dsize, flags, ttl) with stream / state matching by matching on app layer proto (like using http_* keywords).
                    18/4/2014 -- 12:42:24 - <error>-- [ERRCODE: SC_ERR_INVALID_SIGNATURE(39)] - error parsing signature "alert tcp $HOME_NET any -> $EXTERNAL_NET 80 (msg:"MALWARE-CNC Win.Trojan.Conficker variant outbound connection"; flow:to_server,established; dsize:146; urilen:1; content:"GET / HTTP/1.1|0D 0A|User-Agent: Mozilla/4.0 (compatible|3B| MSIE 7.0|3B| Windows NT 5.1|3B| Trident/4.0)|0D 0A|Host: checkip.dyndns.org|0D 0A|Cache-Control: no-cache|0D 0A 0D 0A|"; fast_pattern:only; metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop, ruleset community, service http; reference:url,www.sans.org/security-resources/malwarefaq/conficker-worm.php; classtype:trojan-activity; sid:28542; rev:1;)" from file /usr/pbi/suricata-amd64/etc/suricata/suricata_12618_em0/rules/suricata.rules at line 291
                    18/4/2014 -- 12:42:24 - <error>-- [ERRCODE: SC_ERR_INVALID_SIGNATURE(39)] - Signature combines packet specific matches (like dsize, flags, ttl) with stream / state matching by matching on app layer proto (like using http_* keywords).
                    18/4/2014 -- 12:42:24 - <error>-- [ERRCODE: SC_ERR_INVALID_SIGNATURE(39)] - error parsing signature "alert tcp $HOME_NET any -> $EXTERNAL_NET 80 (msg:"MALWARE-CNC Win.Trojan.Conficker variant outbound connection"; flow:to_server,established; dsize:139; urilen:1; content:"GET / HTTP/1.1|0D 0A|User-Agent: Mozilla/4.0 (compatible|3B| MSIE 7.0|3B| Windows NT 5.1|3B| Trident/4.0)|0D 0A|Host: www.ask.com|0D 0A|Cache-Control: no-cache|0D 0A 0D 0A|"; fast_pattern:only; metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop, ruleset community, service http; reference:url,www.sans.org/security-resources/malwarefaq/conficker-worm.php; classtype:trojan-activity; sid:28543; rev:1;)" from file /usr/pbi/suricata-amd64/etc/suricata/suricata_12618_em0/rules/suricata.rules at line 292
                    18/4/2014 -- 12:42:24 - <error>-- [ERRCODE: SC_ERR_INVALID_SIGNATURE(39)] - previous keyword has a fast_pattern:only; set. Can't have relative keywords around a fast_pattern only content
                    18/4/2014 -- 12:42:24 - <error>-- [ERRCODE: SC_ERR_INVALID_SIGNATURE(39)] - error parsing signature "alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC Win.Trojan.Injector variant outbound communication"; flow:to_server,established; urilen:9; content:"/load.exe HTTP/1.1|0D 0A|User-Agent: Mozilla/"; fast_pattern:only; content:"|3B 20|MSIE|20|"; http_header; content:")|0D 0A|Host: "; distance:0; http_header; content:!"Accept"; http_header; metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop, ruleset community, service http; reference:url,urlquery.net/search.php?q=%5C%2Fload%5C.exe%24&type=regexp&start=2013-08-24&end=2013-11-22&max=400; reference:url,www.virustotal.com/en/file/032572ea1f34a060ecac98a8e2899dc0f2a41dff199e879050481ddd3818b4d0/analysis/; classtype:trojan-activity; sid:28807; rev:1;)" from file /usr/pbi/suricata-amd64/etc/suricata/suricata_12618_em0/rules/suricata.rules at line 298
                    18/4/2014 -- 12:42:24 - <error>-- [ERRCODE: SC_ERR_INVALID_SIGNATURE(39)] - Signature combines packet specific matches (like dsize, flags, ttl) with stream / state matching by matching on app layer proto (like using http_* keywords).
                    18/4/2014 -- 12:42:24 - <error>-- [ERRCODE: SC_ERR_INVALID_SIGNATURE(39)] - error parsing signature "alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC Win.Trojan.WEC variant outbound connection"; flow:to_server,established; dsize:69; urilen:1; content:"GET / HTTP/1.1|0D 0A|User-Agent: Mozilla/4.0|0D 0A|Host: checkip.dyndns.org|0D 0A 0D 0A|"; fast_pattern:only; metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop, ruleset community, service http; reference:url,www.virustotal.com/en/file/164c792247b2822ab1dce8271a9498d3c9172ff21d36feccf83265ded1be8d0b/analysis/; classtype:trojan-activity; sid:29882; rev:2;)" from file /usr/pbi/suricata-amd64/etc/suricata/suricata_12618_em0/rules/suricata.rules at line 416
                    18/4/2014 -- 12:42:24 - <error>-- [ERRCODE: SC_ERR_INVALID_SIGNATURE(39)] - previous keyword has a fast_pattern:only; set. Can't have relative keywords around a fast_pattern only content
                    18/4/2014 -- 12:42:24 - <error>-- [ERRCODE: SC_ERR_INVALID_SIGNATURE(39)] - error parsing signature "alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC Win.Trojan.Bancos variant outbound connection "; flow:to_server,established; content:"Content-Length: 166"; content:".php HTTP/1.1|0D 0A|Accept: */*|0D 0A|Content-Type: application/x-www-form-urlencoded|0D 0A|User-Agent: Mozilla/5.0 (Windows NT 6.1|3B| Trident/7.0|3B| rv:11.0) like Gecko|0D 0A|Host: "; fast_pattern:only; content:"v="; depth:2; http_client_body; content:"&c="; within:7; http_client_body; pcre:"/\x3d\x3d$/P"; metadata:impact_flag red, policy balanced-ips drop, policy security-ips drop, ruleset community, service http; reference:url,www.virustotal.com/en/file/51540d7c9a4bc2a430bc50c85cf9cec5c6f2bb755e800a3f3575ba34fe5f008c/analysis; classtype:trojan-activity; sid:29895; rev:1;)" from file /usr/pbi/suricata-amd64/etc/suricata/suricata_12618_em0/rules/suricata.rules at line 421
                    18/4/2014 -- 12:42:28 - <info>-- No packets with invalid checksum, assuming checksum offloading is NOT used
                    18/4/2014 -- 12:42:35 - <info>-- 2 rule files processed. 15090 rules successfully loaded, 9 rules failed</info></info></error></error></error></error></error></error></error></error></error></error></error></error></error></error></error></error></error></error></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info> 
                    

                    Here's the log for the not working WAN interface ( type PPPOE )

                    
                    18/4/2014 -- 12:46:39 - <info>-- allocated 1572864 bytes of memory for the defrag hash... 65536 buckets of size 24
                    18/4/2014 -- 12:46:39 - <info>-- preallocated 65535 defrag trackers of size 120
                    18/4/2014 -- 12:46:39 - <info>-- defrag memory usage: 9437064 bytes, maximum: 33554432
                    18/4/2014 -- 12:46:39 - <info>-- AutoFP mode using "Active Packets" flow load balancer
                    18/4/2014 -- 12:46:39 - <info>-- preallocated 1024 packets. Total memory 4294656
                    18/4/2014 -- 12:46:39 - <info>-- allocated 98304 bytes of memory for the host hash... 4096 buckets of size 24
                    18/4/2014 -- 12:46:39 - <info>-- preallocated 1000 hosts of size 96
                    18/4/2014 -- 12:46:39 - <info>-- host memory usage: 194304 bytes, maximum: 16777216
                    18/4/2014 -- 12:46:39 - <info>-- allocated 1572864 bytes of memory for the flow hash... 65536 buckets of size 24
                    18/4/2014 -- 12:46:39 - <info>-- preallocated 10000 flows of size 224
                    18/4/2014 -- 12:46:39 - <info>-- flow memory usage: 3812864 bytes, maximum: 33554432
                    18/4/2014 -- 12:46:39 - <info>-- IP reputation disabled
                    18/4/2014 -- 12:46:39 - <info>-- Added "35" classification types from the classification file
                    18/4/2014 -- 12:46:39 - <info>-- Added "19" reference types from the reference.config file
                    18/4/2014 -- 12:46:39 - <info>-- using magic-file /usr/pbi/suricata-amd64/etc/suricata/suricata_51110_pppoe0/magic
                    18/4/2014 -- 12:46:39 - <info>-- Delayed detect enabled
                    18/4/2014 -- 12:46:39 - <info>-- Packets will start being processed before signatures are active.
                    18/4/2014 -- 12:46:39 - <info>-- Threshold config parsed: 0 rule(s) found
                    18/4/2014 -- 12:46:39 - <info>-- Core dump size is unlimited.
                    18/4/2014 -- 12:46:39 - <info>-- fast output device (regular) initialized: alerts.log
                    18/4/2014 -- 12:46:39 - <info>-- http-log output device (regular) initialized: http.log
                    18/4/2014 -- 12:46:39 - <info>-- Syslog output initialized
                    18/4/2014 -- 12:46:39 - <info>-- Using 1 live device(s).
                    18/4/2014 -- 12:46:39 - <info>-- using interface pppoe0
                    18/4/2014 -- 12:46:39 - <info>-- Running in 'auto' checksum mode. Detection of interface state will require 1000 packets.
                    18/4/2014 -- 12:46:39 - <info>-- Found an MTU of 1492 for 'pppoe0'
                    18/4/2014 -- 12:46:39 - <info>-- Set snaplen to 1492 for 'pppoe0'
                    18/4/2014 -- 12:46:39 - <info>-- RunModeIdsPcapAutoFp initialised
                    18/4/2014 -- 12:46:39 - <info>-- stream "max-sessions": 262144
                    18/4/2014 -- 12:46:39 - <info>-- stream "prealloc-sessions": 32768
                    18/4/2014 -- 12:46:39 - <info>-- stream "memcap": 33554432
                    18/4/2014 -- 12:46:39 - <info>-- stream "midstream" session pickups: disabled
                    18/4/2014 -- 12:46:39 - <info>-- stream "async-oneside": disabled
                    18/4/2014 -- 12:46:39 - <info>-- stream "checksum-validation": disabled
                    18/4/2014 -- 12:46:39 - <info>-- stream."inline": disabled
                    18/4/2014 -- 12:46:39 - <info>-- stream.reassembly "memcap": 67108864
                    18/4/2014 -- 12:46:39 - <info>-- stream.reassembly "depth": 0
                    18/4/2014 -- 12:46:39 - <info>-- stream.reassembly "toserver-chunk-size": 2560
                    18/4/2014 -- 12:46:39 - <info>-- stream.reassembly "toclient-chunk-size": 2560
                    18/4/2014 -- 12:46:39 - <info>-- all 7 packet processing threads, 1 management threads initialized, engine started.
                    18/4/2014 -- 12:46:39 - <info>-- 1 rule files processed. 163 rules successfully loaded, 0 rules failed
                    18/4/2014 -- 12:46:39 - <info>-- 163 signatures processed. 0 are IP-only rules, 0 are inspecting packet payload, 35 inspect application layer, 76 are decoder event only
                    18/4/2014 -- 12:46:39 - <info>-- building signature grouping structure, stage 1: adding signatures to signature source addresses... complete
                    18/4/2014 -- 12:46:39 - <info>-- building signature grouping structure, stage 2: building source address list... complete
                    18/4/2014 -- 12:46:39 - <info>-- building signature grouping structure, stage 3: building destination address lists... complete
                    18/4/2014 -- 12:46:39 - <info>-- Signature(s) loaded, Detect thread(s) activated.
                    18/4/2014 -- 12:46:40 - <error>-- [ERRCODE: SC_ERR_DATALINK_UNIMPLEMENTED(38)] - Error: datalink type 0 not yet supported in module DecodePcap
                    18/4/2014 -- 12:46:40 - <error>-- [ERRCODE: SC_ERR_DATALINK_UNIMPLEMENTED(38)] - Error: datalink type 0 not yet supported in module DecodePcap
                    18/4/2014 -- 12:46:40 - <error>-- [ERRCODE: SC_ERR_DATALINK_UNIMPLEMENTED(38)] - Error: datalink type 0 not yet supported in module DecodePcap
                    ( lots of repeats snipped )</error></error></error></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info></info> 
                    

                    Yep, that is the problem – PPPoE does not appear to be supported by the underlying Suricata binary.  I will research to see if there is anything I might could do to address this.  I seem to remember some folks using Snort just fine on a PPPoE interface, and Snort and Suricata both are using the same libpcap library on pfSense.

                    Bill

                    1 Reply Last reply Reply Quote 0
                    • BBcan177B
                      BBcan177 Moderator
                      last edited by

                      @bmeeks:

                      Yep, that is the problem – PPPoE does not appear to be supported by the underlying Suricata binary.  I will research to see if there is anything I might could do to address this.  I seem to remember some folks using Snort just fine on a PPPoE interface, and Snort and Suricata both are using the same libpcap library on pfSense.

                      I have one of my pfSense boxes on ppoe with Snort for over a year without any issue like this. Just an FYI.

                      "Experience is something you don't get until just after you need it."

                      Website: http://pfBlockerNG.com
                      Twitter: @BBcan177  #pfBlockerNG
                      Reddit: https://www.reddit.com/r/pfBlockerNG/new/

                      1 Reply Last reply Reply Quote 0
                      • M
                        Mr. Jingles
                        last edited by

                        I can confirm I have the same problem, my log is flooded with this:

                        suricata: 14/6/2014 -- 12:13:21 - <error> -- [ERRCODE: SC_ERR_DATALINK_UNIMPLEMENTED(38)] - Error: datalink type 0 not yet supported in module DecodePcap</error>
                        

                        This might perhaps also explain why I don't see any hits on WAN (VDSL2) (but also not on WAN2 (Cable), for that matter), but quite some on LAN.

                        Suricata 1.4.6 pkg v1.0.3

                        It runs on VDSL2 (PPPoE), Cable (DHCP), and LAN.

                        Snort, which I ran for over a year did not show these errors. I only switched to Suricata yesterday as smart people in here recommended to do so.

                        6 and a half billion people know that they are stupid, agressive, lower life forms.

                        1 Reply Last reply Reply Quote 0
                        • C
                          Cino
                          last edited by

                          I'm trying to setup Suricata basically the same way I have snort configured today and I may have found an issue or maybe the snort code wasn't carried over.

                          Home Net and External Net are not pulling from 'Pass Lists' tab like they do in Snort. Only the Pass List area is able to pull from the list in Suricata..

                          Another issue I found is in the Alert log… In Snort, IPv6 address are compress if there are a bunch of 0:0:0... So an address may look like 123:345:567::1. In Suricata, they are displaying like 123:345:567:0000:0000:0000:0000:1..  Hopefully that is something that can be fix

                          thanks again!!

                          1 Reply Last reply Reply Quote 0
                          • dotOneD
                            dotOne
                            last edited by

                            It seems suricata has the same issue with the IPv6 link-local address as Snort has.
                            The default home net has the external link-local address with the interface reference in it.
                            This results in an error when parsing the home nets.

                            Jun 25 15:41:05 suricata: 25/6/2014 – 15:41:05 - <error>-- [ERRCODE: SC_ERR_INVALID_YAML_CONF_ENTRY(139)] - failed to parse address var "HOME_NET" with value "[10.0.8.0/24,10.0.9.0/24,10.0.18.0/24,10.0.19.0/24,64.4.0.0/18,64.233.160.0/19,65.52.0.0/14,66.102.0.0/20,66.249.64.0/19,72.14.192.0/18,74.125.0.0/16,82.75.177.152/32,82.94.229.0/24,82.101.62.110/32,127.0.0.1,131.253.21.0/24,131.253.22.0/23,131.253.24.0/21,131.253.32.0/20,157.54.0.0/32,157.56.0.0/14,157.60.0.0/16,172.16.1.0/24,172.16.3.0/24,192.168.1.0/24,192.168.2.0/24,192.168.10.0/24,194.109.0.0/16,194.109.5.175,194.109.6.66,194.109.9.99,207.46.0.0/16,207.68.128.0/18,207.68.192.0/20,209.85.128.0/17,212.238.xxx.xxx,213.75.10.0/24,213.84.136.0/24,216.239.32.0/18,2001:888:0:6::66,2001:888:0:9::99,2001:888:0:80::1/128,2001:888:2000:49::/48,2001:xxxx:xxxx:0:xxxx:xxxx:xxxx:xxxx/128,2001:xxxx:xxxx:1::/64,2001:xxxx:xxxx:2::/64,2001:xxxx:xxxx:3::/64,fe80::2a0:a50f:fc78:5530,[b]fe80::290:bff:fe32:5b2e%em0]". Please check it's syntax
                            Jun 25 15:41:05 suricata: 25/6/2014 – 15:41:05 - <error>-- [ERRCODE: SC_ERR_ADDRESS_ENGINE_GENERIC(89)] - failed to parse address "fe80::290:bff:fe32:5b2e%em0"
                            Jun 25 15:41:05 suricata: 25/6/2014 – 15:41:05 - <error>-- [ERRCODE: SC_ERR_ADDRESS_ENGINE_GENERIC(89)] - failed to parse address "fe80::290:bff:fe32:5b2e%em0"
                            Jun 25 15:41:05 suricata: 25/6/2014 – 15:41:05 - <info>-- AutoFP mode using "Active Packets" flow load balancer
                            Jun 25 15:41:05 suricata: 25/6/2014 -- 15:41:05 - <info>-- defrag memory usage: 9437064 bytes, maximum: 33554432
                            Jun 25 15:41:05 suricata: 25/6/2014 -- 15:41:05 - <info>-- preallocated 65535 defrag trackers of size 120
                            Jun 25 15:41:05 suricata: 25/6/2014 -- 15:41:05 - <info>-- allocated 1572864 bytes of memory for the defrag hash... 65536 buckets of size 24</info></info></info></info></error></error></error>

                            Using snort I can supply a home list and an external net by creating an alias.
                            On suricata I can create an alias but it will not show up in the drop-down list.

                            When looking in suricata_interfaces_edit.php I see the drop-down is populated using a passlist, however I cannot create a whitelist but only a passlist (used in the alert suppression).

                            home net: line 697:
                                           
                                           
                                                    <select name="homelistname" class="formselect" id="homelistname">                                                                        echo "<option value="default">default</option>";                                        /* find whitelist names and filter by type /                                        if (is_array($suricataglob['whitelist']['item'])) {                                                foreach ($suricataglob[[color=blue]'whitelist']['item'] as $value) {                                                        $ilistname = $value['name'];                                                        if ($ilistname == $pconfig['homelistname'])                                                                echo "<option value="$ilistname" selected="">";                                                        else                                                                echo "</option><option value="$ilistname">";                                                        echo htmlspecialchars($ilistname) . '</option>';Alert suppression: line 775:                                                       </select>
                                                                                    /
                            find passlist names and filter by type, make sure to track by uuid */
                                                            echo "<option value="default">default</option>\n";
                                                            if (is_array($suricataglob['passlist']['item'])) {
                                                                    foreach ($suricataglob['passlist']['item'] as $value) {
                                                                            if ($value['name'] == $pconfig['passlistname'])
                                                                                    echo "<option value="{$value[" name']}'="" selected="">";</option>

                            1 Reply Last reply Reply Quote 0
                            • bmeeksB
                              bmeeks
                              last edited by

                              @avink:

                              It seems suricata has the same issue with the IPv6 link-local address as Snort has.
                              The default home net has the external link-local address with the interface reference in it.
                              This results in an error when parsing the home nets.

                              Jun 25 15:41:05 suricata: 25/6/2014 – 15:41:05 - <error>-- [ERRCODE: SC_ERR_INVALID_YAML_CONF_ENTRY(139)] - failed to parse address var "HOME_NET" with value "[10.0.8.0/24,10.0.9.0/24,10.0.18.0/24,10.0.19.0/24,64.4.0.0/18,64.233.160.0/19,65.52.0.0/14,66.102.0.0/20,66.249.64.0/19,72.14.192.0/18,74.125.0.0/16,82.75.177.152/32,82.94.229.0/24,82.101.62.110/32,127.0.0.1,131.253.21.0/24,131.253.22.0/23,131.253.24.0/21,131.253.32.0/20,157.54.0.0/32,157.56.0.0/14,157.60.0.0/16,172.16.1.0/24,172.16.3.0/24,192.168.1.0/24,192.168.2.0/24,192.168.10.0/24,194.109.0.0/16,194.109.5.175,194.109.6.66,194.109.9.99,207.46.0.0/16,207.68.128.0/18,207.68.192.0/20,209.85.128.0/17,212.238.xxx.xxx,213.75.10.0/24,213.84.136.0/24,216.239.32.0/18,2001:888:0:6::66,2001:888:0:9::99,2001:888:0:80::1/128,2001:888:2000:49::/48,2001:xxxx:xxxx:0:xxxx:xxxx:xxxx:xxxx/128,2001:xxxx:xxxx:1::/64,2001:xxxx:xxxx:2::/64,2001:xxxx:xxxx:3::/64,fe80::2a0:a50f:fc78:5530,[b]fe80::290:bff:fe32:5b2e%em0]". Please check it's syntax
                              Jun 25 15:41:05 suricata: 25/6/2014 – 15:41:05 - <error>-- [ERRCODE: SC_ERR_ADDRESS_ENGINE_GENERIC(89)] - failed to parse address "fe80::290:bff:fe32:5b2e%em0"
                              Jun 25 15:41:05 suricata: 25/6/2014 – 15:41:05 - <error>-- [ERRCODE: SC_ERR_ADDRESS_ENGINE_GENERIC(89)] - failed to parse address "fe80::290:bff:fe32:5b2e%em0"
                              Jun 25 15:41:05 suricata: 25/6/2014 – 15:41:05 - <info>-- AutoFP mode using "Active Packets" flow load balancer
                              Jun 25 15:41:05 suricata: 25/6/2014 -- 15:41:05 - <info>-- defrag memory usage: 9437064 bytes, maximum: 33554432
                              Jun 25 15:41:05 suricata: 25/6/2014 -- 15:41:05 - <info>-- preallocated 65535 defrag trackers of size 120
                              Jun 25 15:41:05 suricata: 25/6/2014 -- 15:41:05 - <info>-- allocated 1572864 bytes of memory for the defrag hash... 65536 buckets of size 24</info></info></info></info></error></error></error>

                              Using snort I can supply a home list and an external net by creating an alias.
                              On suricata I can create an alias but it will not show up in the drop-down list.

                              When looking in suricata_interfaces_edit.php I see the drop-down is populated using a passlist, however I cannot create a whitelist but only a passlist (used in the alert suppression).

                              home net: line 697:
                                             
                                             
                                                      <select name="homelistname" class="formselect" id="homelistname">                                                                        echo "<option value="default">default</option>";                                        /* find whitelist names and filter by type /                                        if (is_array($suricataglob['whitelist']['item'])) {                                                foreach ($suricataglob[[color=blue]'whitelist']['item'] as $value) {                                                        $ilistname = $value['name'];                                                        if ($ilistname == $pconfig['homelistname'])                                                                echo "<option value="$ilistname" selected="">";                                                        else                                                                echo "</option><option value="$ilistname">";                                                        echo htmlspecialchars($ilistname) . '</option>';Alert suppression: line 775:                                                       </select>
                                                                                      /
                              find passlist names and filter by type, make sure to track by uuid */
                                                              echo "<option value="default">default</option>\n";
                                                              if (is_array($suricataglob['passlist']['item'])) {
                                                                      foreach ($suricataglob['passlist']['item'] as $value) {
                                                                              if ($value['name'] == $pconfig['passlistname'])
                                                                                      echo "<option value="{$value[" name']}'="" selected="">";</option>

                              I think you have indeed identified a bug in the code.  I'm sorry that one slipped by me.  I only recently obtained an IPv6 tunnel broker setup so I could test IPv6 in the flesh instead just in a limited VM world.

                              I will add this to my TODO list of fixes for Suricata.  I am currently working on moving that package to the 2.0.1 Suricata binary code base, so please be patient with me a little bit longer.  If I run into any significant delays with the 2.0.x update, I will push out a fix for this and several other reported bugs in a 1.4.6 binary update.

                              Bill

                              1 Reply Last reply Reply Quote 0
                              • C
                                Cino
                                last edited by

                                bill, thanks again for all the work you have done with suricata and snort.

                                not sure if this is on your todo list, but take a look at how the below alerts are displayed in the gui:

                                
                                06/25/2014-19:15:45.695657,,1,2009768,4,ET SCAN NBTStat Query Response to External Destination, Possible Windows Network Enumeration,Attempted Information Leak,2,UDP,192.168.0.100,137,224.0.0.252,137
                                06/25/2014-19:15:47.205405,,1,2009768,4,ET SCAN NBTStat Query Response to External Destination, Possible Windows Network Enumeration,Attempted Information Leak,2,UDP,192.168.0.100,137,224.0.0.252,137
                                06/25/2014-19:15:48.705994,,1,2009768,4,ET SCAN NBTStat Query Response to External Destination, Possible Windows Network Enumeration,Attempted Information Leak,2,UDP,192.168.0.100,137,224.0.0.252,137
                                06/25/2014-19:16:41.348884,,1,2012247,3,ET P2P BTWebClient UA uTorrent in use,Potential Corporate Privacy Violation,1,TCP,192.168.0.100,64434,194.71.107.17,80
                                06/25/2014-19:16:44.330005,,1,2012247,3,ET P2P BTWebClient UA uTorrent in use,Potential Corporate Privacy Violation,1,TCP,192.168.0.100,64443,185.19.104.90,80
                                06/25/2014-19:16:44.584111,,1,2012247,3,ET P2P BTWebClient UA uTorrent in use,Potential Corporate Privacy Violation,1,TCP,192.168.0.100,64444,185.19.104.90,80
                                
                                

                                i'm pretty sure its because of the comma in the alert description. pushed everything over a column.

                                suricataalertlog.png
                                suricataalertlog.png_thumb

                                1 Reply Last reply Reply Quote 0
                                • dotOneD
                                  dotOne
                                  last edited by

                                  Modified suricata_interfaces_edit.php to be able to use the Home Net alias.
                                  Also modified the /usr/local/pkg/suricata/suricata.inc to remove the interface reference from the link-local address.

                                  Now suricata neatly generates the configuration file.
                                  However, since I'm running over a PPPoE link, the syslog is filling with the 'datalink not supported' errors.

                                  Jun 26 09:09:04 suricata[20617]: 26/6/2014 – 09:09:04 - <error>-- [ERRCODE: SC_ERR_DATALINK_UNIMPLEMENTED(38)] - Error: datalink type 0 not yet supported in module DecodePcap
                                  Jun 26 09:09:04 suricata[20617]: 26/6/2014 – 09:09:04 - <error>-- [ERRCODE: SC_ERR_DATALINK_UNIMPLEMENTED(38)] - Error: datalink type 0 not yet supported in module DecodePcap
                                  Jun 26 09:09:04 suricata[20617]: 26/6/2014 – 09:09:04 - <error>-- [ERRCODE: SC_ERR_DATALINK_UNIMPLEMENTED(38)] - Error: datalink type 0 not yet supported in module DecodePcap
                                  Jun 26 09:09:04 suricata[20617]: 26/6/2014 – 09:09:04 - <error>-- [ERRCODE: SC_ERR_DATALINK_UNIMPLEMENTED(38)] - Error: datalink type 0 not yet supported in module DecodePcap
                                  Jun 26 09:09:04 suricata[20617]: 26/6/2014 – 09:09:04 - <error>-- [ERRCODE: SC_ERR_DATALINK_UNIMPLEMENTED(38)] - Error: datalink type 0 not yet supported in module DecodePcap
                                  Jun 26 09:09:04 suricata[20617]: 26/6/2014 – 09:09:04 - <error>-- [ERRCODE: SC_ERR_DATALINK_UNIMPLEMENTED(38)] - Error: datalink type 0 not yet supported in module DecodePcap
                                  Jun 26 09:09:04 suricata[20617]: 26/6/2014 – 09:09:04 - <error>-- [ERRCODE: SC_ERR_DATALINK_UNIMPLEMENTED(38)] - Error: datalink type 0 not yet supported in module DecodePcap
                                  Jun 26 09:09:04 suricata[20617]: 26/6/2014 – 09:09:04 - <error>-- [ERRCODE: SC_ERR_DATALINK_UNIMPLEMENTED(38)] - Error: datalink type 0 not yet supported in module DecodePcap
                                  Jun 26 09:09:04 suricata[20617]: 26/6/2014 – 09:09:04 - <error>-- [ERRCODE: SC_ERR_DATALINK_UNIMPLEMENTED(38)] - Error: datalink type 0 not yet supported in module DecodePcap</error></error></error></error></error></error></error></error></error>

                                  I hope we will find a solution for this too.
                                  Snort is running without problems as mentioned by others also.

                                  1 Reply Last reply Reply Quote 0
                                  • bmeeksB
                                    bmeeks
                                    last edited by

                                    @Cino:

                                    bill, thanks again for all the work you have done with suricata and snort.

                                    not sure if this is on your todo list, but take a look at how the below alerts are displayed in the gui:

                                    
                                    06/25/2014-19:15:45.695657,,1,2009768,4,ET SCAN NBTStat Query Response to External Destination, Possible Windows Network Enumeration,Attempted Information Leak,2,UDP,192.168.0.100,137,224.0.0.252,137
                                    06/25/2014-19:15:47.205405,,1,2009768,4,ET SCAN NBTStat Query Response to External Destination, Possible Windows Network Enumeration,Attempted Information Leak,2,UDP,192.168.0.100,137,224.0.0.252,137
                                    06/25/2014-19:15:48.705994,,1,2009768,4,ET SCAN NBTStat Query Response to External Destination, Possible Windows Network Enumeration,Attempted Information Leak,2,UDP,192.168.0.100,137,224.0.0.252,137
                                    06/25/2014-19:16:41.348884,,1,2012247,3,ET P2P BTWebClient UA uTorrent in use,Potential Corporate Privacy Violation,1,TCP,192.168.0.100,64434,194.71.107.17,80
                                    06/25/2014-19:16:44.330005,,1,2012247,3,ET P2P BTWebClient UA uTorrent in use,Potential Corporate Privacy Violation,1,TCP,192.168.0.100,64443,185.19.104.90,80
                                    06/25/2014-19:16:44.584111,,1,2012247,3,ET P2P BTWebClient UA uTorrent in use,Potential Corporate Privacy Violation,1,TCP,192.168.0.100,64444,185.19.104.90,80
                                    
                                    

                                    i'm pretty sure its because of the comma in the alert description. pushed everything over a column.

                                    Ouch!  That's going to be a tough one to fix.  The whole premise of parsing the alert text is based on splitting the fields on the commas.  I'll have to chew on that one.

                                    Bill

                                    1 Reply Last reply Reply Quote 0
                                    • G
                                      G.D. Wusser Esq.
                                      last edited by

                                      @bmeeks:

                                      Ouch!  That's going to be a tough one to fix.  The whole premise of parsing the alert text is based on splitting the fields on the commas.  I'll have to chew on that one.

                                      Yes, that should be fixed from the other end.
                                      Rfc4180.2.6: “Fields containing line breaks (CRLF), double quotes, and commas should be enclosed in double-quotes.”

                                      1 Reply Last reply Reply Quote 0
                                      • C
                                        Cino
                                        last edited by

                                        @G.D.:

                                        @bmeeks:

                                        Ouch!  That's going to be a tough one to fix.  The whole premise of parsing the alert text is based on splitting the fields on the commas.  I'll have to chew on that one.

                                        Yes, that should be fixed from the other end.
                                        Rfc4180.2.6: “Fields containing line breaks (CRLF), double quotes, and commas should be enclosed in double-quotes.”

                                        agreed!

                                        1 Reply Last reply Reply Quote 0
                                        • A
                                          adam65535
                                          last edited by

                                          Has anyone tried this on 2.2 ALPHA yet?  I keep getting emails from cron because it appears cron on 2.2 sends emails when there is output in a cronjob.  I actually like that it does that on 2.2 for my own purposes but for Suricata I get an email every 5 minutes when it prunes the block list and also when the ids rules get updated…

                                          Subject: Cron <root@pfsense> /usr/bin/nice -n20 /sbin/pfctl -t snort2c -T expire 3600
                                          
                                          X-Cron-Env: <shell= bin="" sh="">
                                          X-Cron-Env: <path= etc:="" bin:="" sbin:="" usr="" sbin="">
                                          X-Cron-Env: <home= var="" log="">
                                          X-Cron-Env: <logname=root>
                                          X-Cron-Env: <user=root>
                                          
                                          0/0 addresses expired.</user=root></logname=root></home=></path=></shell=></root@pfsense>
                                          
                                          Subject: Cron <root@pfsense> /usr/bin/nice -n20 /usr/local/bin/php -f /usr/local/www/suricata/suricata_check_for_rule_updates.php
                                          
                                          X-Cron-Env: <shell= bin="" sh="">
                                          X-Cron-Env: <path= etc:="" bin:="" sbin:="" usr="" sbin="">
                                          X-Cron-Env: <home= var="" log="">
                                          X-Cron-Env: <logname=root>
                                          X-Cron-Env: <user=root>
                                          
                                          1%   2%   4%   5%   6%   7%   8%   9%  10%  20%  30%  40%  50%  60%  70%  80%  90% 100%</user=root></logname=root></home=></path=></shell=></root@pfsense>
                                          
                                          1 Reply Last reply Reply Quote 0
                                          • BBcan177B
                                            BBcan177 Moderator
                                            last edited by

                                            @adam65535:

                                            Has anyone tried this on 2.2 ALPHA yet?  I keep getting emails from cron because it appears cron on 2.2 sends emails when there is output in a cronjob.  I actually like that it does that on 2.2 for my own purposes but for Suricata I get an email every 5 minutes when it prunes the block list and also when the ids rules get updated…

                                            Subject: Cron root@pfsense/usr/bin/nice -n20 /sbin/pfctl -t snort2c -T expire 3600/root@pfsense

                                            Hi Adam,

                                            You could try to add "2>&1" to the Cron job and see if that fixes it?

                                            [  [b]/usr/bin/nice -n20 /sbin/pfctl -t snort2c -T expire 3600 2>&1  ]

                                            If you have the Cron package, you can do that without going into the Shell to edit Cron.

                                            However, if you make any changes to the Snort Interfaces, it could get reset by

                                            [  [b]/usr/local/pkg/snort/snort.inc  ]  which write that line into CRON.

                                            "Experience is something you don't get until just after you need it."

                                            Website: http://pfBlockerNG.com
                                            Twitter: @BBcan177  #pfBlockerNG
                                            Reddit: https://www.reddit.com/r/pfBlockerNG/new/

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.