Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Snort 2.9.2.3 pkg v. 2.5.1 blocks certain white listed IPs

    Scheduled Pinned Locked Moved pfSense Packages
    13 Posts 5 Posters 3.7k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • T Offline
      trvsecurity
      last edited by

      We have created a white list alias and use that alias as the HOME NET (External net is left as DEFAULT). Most of the time, this works fine however our external NATTED IPs still get put in Snort's block list even though they are in the white list.

      To give more detail, we do lots of security scans from a server in our LAN to the Internet via the firewall / Snort. This raises Snort alerts (as I would expect), however Snort puts the external Natted IP of the scanning server in the block list even though this IP is in the Snort white list alias.

      Any ideas? :-)

      1 Reply Last reply Reply Quote 0
      • V Offline
        vbentley
        last edited by

        Are you running 32-bit or 64-bit?

        Trademark Attribution and Credit
        pfSense® and pfSense Certified® are registered trademarks of Electric Sheep Fencing, LLC in the United States and other countries.

        1 Reply Last reply Reply Quote 0
        • T Offline
          trvsecurity
          last edited by

          32 bit :-)

          1 Reply Last reply Reply Quote 0
          • V Offline
            vbentley
            last edited by

            My 32-bit is failing to load mbstring functions which is having all sorts of consequences for SNORT, mainly in whitelists. Another user has posted a PHPinfo report which shows successful loading of mbstring on an i386 box which casts doubts in my mind as to the completeness of my installation. It was an 'in-place' upgrade from the 1.2.3 console and I'm going to see if I have enough spare NIC's to build another machine from scratch using a fresh CD.

            Trademark Attribution and Credit
            pfSense® and pfSense Certified® are registered trademarks of Electric Sheep Fencing, LLC in the United States and other countries.

            1 Reply Last reply Reply Quote 0
            • T Offline
              trvsecurity
              last edited by

              Thanks!  I was just wondering if I was supposed to put something in the EXTERNAL NET? Maybe snort doesnt like "external IPs" in the HOME NET?

              Let me know what you fin!

              1 Reply Last reply Reply Quote 0
              • F Offline
                Fesoj
                last edited by

                vbentley,

                you could also consider building a virtual machine (e.g. with VirtualBox) with 2 bridged NICs. The benefit is that you can take snapshots and go back to a working config anytime you want/need to.

                1 Reply Last reply Reply Quote 0
                • V Offline
                  vbentley
                  last edited by

                  That's a good idea. I haven't tried VirtualBox yet, will try it soon.

                  Trademark Attribution and Credit
                  pfSense® and pfSense Certified® are registered trademarks of Electric Sheep Fencing, LLC in the United States and other countries.

                  1 Reply Last reply Reply Quote 0
                  • F Offline
                    Fesoj
                    last edited by

                    If your desktop computer is a Windows machine, either use the cygwin environment or at least putty to communicate with the server (ssh enabled). Working with the console is a pain in the neck as VB extensions are not supported. Since you are evaluating Snort, you should also enable promiscuous mode for the NICs. If the virtual machine is entirely in your LAN you need some extra rules for the firewall, but you'll find out…

                    1 Reply Last reply Reply Quote 0
                    • V Offline
                      vbentley
                      last edited by

                      @Fesoj:

                      If your desktop computer is a Windows machine…

                      I migrated off Windows in 2009. I've been using mostly Ubuntu since then. Virtualbox is running nicely on my laptop, I'm starting to get familiar with it now.

                      Trademark Attribution and Credit
                      pfSense® and pfSense Certified® are registered trademarks of Electric Sheep Fencing, LLC in the United States and other countries.

                      1 Reply Last reply Reply Quote 0
                      • T Offline
                        trvsecurity
                        last edited by

                        Just wondering if anyone has any news about the initial issue?  I still cannot stop Snort from blocking our NATTED external IPs even when they are in the whitelist :-(

                        1 Reply Last reply Reply Quote 0
                        • J Offline
                          j.smith1981
                          last edited by

                          It's weird with my install for a while say for about 3 hours it will keep blocking any ports like for example my phones network is accepted as a whitelist. But if I was to remove it from the whitelist it would take 3 hours for it to be accepted when I start seeing loads of alerts in the logs for my phones network (of which I suppress for my works IP address).

                          If this is any good to anyone how long have you tested it for? I mean even if I am to restart my router it's very odd (my router being what pfsense is of course) it still manages to block those whitelisted IPs.

                          Be interesting that how long someone would test it after they have whitelisted an ip address it's rather odd to me to be honest.

                          1 Reply Last reply Reply Quote 0
                          • A Offline
                            apg
                            last edited by

                            I am getting blocked hosts that are in the $HOME_NET

                            After a fresh install:
                            2.0.1-RELEASE (amd64)
                            built on Mon Dec 12 18:16:13 EST 2011
                            FreeBSD 8.1-RELEASE-p6

                            …and only installing:
                            arping 2.09.1
                            snort  2.9.2.3 pkg v. 2.5.1

                            Global settings:
                              checked Install Basic Rules
                              checked Install Emergingthreats rules

                            Snort: Interface Edit: WAN
                            Selected all defaults, checked block offenders, and the src for IP to block

                            https://fw1/snort/snort_rulesets.php?id=0
                            I selected all, and turned snort on

                            1 Reply Last reply Reply Quote 0
                            • T Offline
                              trvsecurity
                              last edited by

                              Sorry for the delay. We have the same issue and it is causing us major problems.

                              We have an internal server that scans web sites known as a security risk so we generate alot of Snort alerts. However, our internal LAN servers are getting blocked by Snort on the virtual IP (IP the server has on the Internet).

                              We have put the virtual IP range in the white list and we have set the "Add Virtual IP Addresses to the list" option on. Yet still our virtual IPs get blocked by snort (they appear in the Snort blocked list).

                              What can be done to fix this?

                              Any help would be much appreciated!!

                              1 Reply Last reply Reply Quote 0
                              • First post
                                Last post
                              Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.