Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Suricata true inline IPS mode coming with pfSense 2.3 – here is a preview

    Scheduled Pinned Locked Moved IDS/IPS
    94 Posts 26 Posters 68.5k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • bmeeksB
      bmeeks
      last edited by

      @ntct:

      I use SID State Order(disable,enable), add emerging-scan.rules to disablesid.conf and add sid A to enablesid.conf, I didn't see any enable rules. Sid A is also not in XXX/rules/suricata.rules  :)

      This is by design.  The logic excludes based on the largest net.  So if you disable a category by putting it in the disablesid.conf file, then none of that category's rules can be used.  Enabling individual SIDs from an excluded category in the enablesid.conf file is not possible (because the whole category has been excluded).  It would be better to use SID ranges from the category in the two files and work out a solution that way.  The biggest "excluding" statement wins between the two files (enablesid and disablesid).  What the "order" drop-down controls is which conf file runs first and which last.  So if you have the order set to "enable/disable" and you enable a category in enableside.conf and you disable the same category in disablesid.conf, then the category's rules are not present in the enforcing rules array at all because the entire category has been disabled.  On the other hand, if you leave the conf files the same but switch the "order" drop-down to "disable/enable", then the category will be enabled and its rules present in the enforcing rules array because the enablesid.conf file ran last and enabled the category even though the disablesid.conf had previously disabled it.

      @ntct:

      I use pcre:xxxxx, It can be selected, but use pcre:"xxxxx", It can't.

      Yeah, that was a typo by me in the example.  You do not need the quote marks.  Just use the format pcre:xxxx.  There was also an unneeded called in that part of the code to the preg_quote() function.  That caused the PCRE compare to fail as well.  This is fixed in the update just posted this morning.

      @ntct:

      By the way, Is it possiable for drop all match rules traffic? Do you have any suggestions?

      Not sure I understand what you are asking me here.  If you just want all triggered rules to cause traffic to be blocked, you will need to switch back to legacy mode on the interface.  That will let a few packets leak through, though, as I explained in previous posts.  There is no way without rewriting the Suricata binary to have it "drop" all alerts the way legacy mode works.

      Bill

      1 Reply Last reply Reply Quote 0
      • N
        ntct
        last edited by

        How to evaluate performance and detect packet loss for pfSense 2.3 in inline IPS mode?  stats.log or?

        Thanks again!

        1 Reply Last reply Reply Quote 0
        • bmeeksB
          bmeeks
          last edited by

          @ntct:

          How to evaluate performance and detect packet loss for pfSense 2.3 in inline IPS mode?  stats.log or?

          Thanks again!

          I think that log primarily shows how much time was spent analyzing particular rules.  But I don't remember for sure.  It's been a long time since I activated the stats.log option and looked over the log.

          Bill

          1 Reply Last reply Reply Quote 0
          • N
            ntct
            last edited by

            hmm…

            I can't see capture.kernel_drops in stats.log.  :P

            1 Reply Last reply Reply Quote 0
            • N
              ntct
              last edited by

              Hi Bill,

              I can't start Barnyard2, I use Syslog Output.

              It's seem none barnyard2 installed.

              Can you check?

              Thx!

              1.jpg_thumb
              1.jpg

              1 Reply Last reply Reply Quote 0
              • bmeeksB
                bmeeks
                last edited by

                @ntct:

                Hi Bill,

                I can't start Barnyard2, I use Syslog Output.

                It's seem none barnyard2 installed.

                Can you check?

                Thx!

                Yep, it looks like the Barnyard2 binary is not there.  I will need to investigate how it got missed in the build/run dependencies. It should have been installed along with Suricata. In the meantime, you should be able to just install it using pkg from the command line.

                Bill

                1 Reply Last reply Reply Quote 0
                • bmeeksB
                  bmeeks
                  last edited by

                  A quick fix for the missing Barnyard2 binary was posted today by the pfSense team.  If you remove and then reinstall Suricata, it should bring along Barnyard2 now like it did in the past.

                  Bill

                  1 Reply Last reply Reply Quote 0
                  • D
                    dcol Banned
                    last edited by

                    There has been nothing new on this project in many months. Is it dead? I certainly hope not, but I assume we are waiting on improvements to netmap which hasn't been updated in quite a while. Suricata 3.1.1 is out now and seems to be in current development.

                    I could really use this package as I am sure many others are chomping at the bit for it.

                    Progress preview maybe?

                    Dan

                    1 Reply Last reply Reply Quote 0
                    • D
                      dcol Banned
                      last edited by

                      I guess this really is a dead project after all. It's a real shame.

                      1 Reply Last reply Reply Quote 0
                      • D
                        dhboyd26
                        last edited by

                        This desperately needs to happen… I need Inline mode so bad, I can't describe how badly I need it.  We have so much junk traffic tossed at valid IPs that perfectly good sites get blocked and many web/cloud based tools that my faculty and staff depend on become useless.

                        I've tuned Suricata rules until I can't see straight, and still, valid sites get blocked.

                        Come on devs, roll this stuff out!  We are all rooting for you (and whining a bit).

                        Suricata 3.1.1 has been out for a while now in production, I wonder if there are still underlying netmap/driver issues causing problems with Inline mode?

                        1 Reply Last reply Reply Quote 0
                        • R
                          repne
                          last edited by

                          I installed suricata, and the installer complained about some mysql client vulnerability that will not be patched. Something to be worried about?

                          1 Reply Last reply Reply Quote 0
                          • bmeeksB
                            bmeeks
                            last edited by

                            @<deleted>:</deleted>

                            Suricata package has been updated today from 3.0_7 to 3.0_8.

                            From the changelogs I see only a fix for "Suricata, a broken download should not wait forever." ,and some changes in licenses.

                            @bmeeks I don't understand, why not jumping to the latest version, with latest fixes, because they are alot ?

                            10x

                            I have been very busy with other work outside of my volunteer package maintainer duties for Suricata and Snort.  The other work pays me, the volunteer maintainer duties do not …  ;).

                            I am testing the latest 3.1.1 binary this weekend and hope to have a pull request posted very soon.

                            Bill

                            1 Reply Last reply Reply Quote 0
                            • D
                              dcol Banned
                              last edited by

                              Will inline IDS be working with the latest Suricata update?

                              1 Reply Last reply Reply Quote 0
                              • bmeeksB
                                bmeeks
                                last edited by

                                @dcol:

                                Will inline IDS be working with the latest Suricata update?

                                Hopefully better than it currently does.  The issues are pretty much all netmap related as netmap is a relatively new technology.  Suricata has had some upstream bugs reported around the netmap interface used for inline mode.  A lot of those reported issues are fixed in the 3.1.1 release.

                                Bill

                                1 Reply Last reply Reply Quote 0
                                • W
                                  Wisiwyg
                                  last edited by

                                  Thank you @BMeeks!

                                  Looks like there's an updated Suricata in Package Manager with the latest 3.1.1_1 version. Trying it out now!

                                  Overkill - i5 quad, 3.1ghz, 8gb, 240gb SSD, dual & single Intel NICs

                                  1 Reply Last reply Reply Quote 0
                                  • N
                                    ntct
                                    last edited by

                                    Does  latest suricata 3.1.1_1 support hyperscan pattern match ?

                                    1 Reply Last reply Reply Quote 0
                                    • ?
                                      Guest
                                      last edited by

                                      @Wisiwyg:

                                      Thank you @BMeeks!

                                      Looks like there's an updated Suricata in Package Manager with the latest 3.1.1_1 version. Trying it out now!

                                      On which branch are you? I don't see any updates on stable branch?

                                      1 Reply Last reply Reply Quote 0
                                      • W
                                        Wisiwyg
                                        last edited by

                                        2.3.3_dev

                                        Overkill - i5 quad, 3.1ghz, 8gb, 240gb SSD, dual & single Intel NICs

                                        1 Reply Last reply Reply Quote 0
                                        • ?
                                          Guest
                                          last edited by

                                          @Wisiwyg:

                                          2.3.3_dev

                                          Thanks @Wisiwyg

                                          1 Reply Last reply Reply Quote 0
                                          • bmeeksB
                                            bmeeks
                                            last edited by

                                            @ntct:

                                            Does  latest suricata 3.1.1_1 support hyperscan pattern match ?

                                            It's not turned on yet.  That is next on my list to test.  Not sure what kinds of tweaking may be required in FreeBSD ports to get that enabled and compiling successfully.

                                            Bill

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.