Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Snort False-Positives

    Scheduled Pinned Locked Moved IDS/IPS
    6 Posts 2 Posters 2.4k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • M
      MilesDeep
      last edited by

      Very sorry if this topic has been covered.  My guess is it has but I can't find an answer.

      In the past few months, more and more, I am getting SNORT alerts and blocks on 1e100.net IPs (which pretty much kills Chrome browsing) and alerts and block on anything …deploy.static.akamaitechnologies.com, which now seems to affect more then just downloads.

      Both, obviously, have huge IP ranges so picking them off one at a time is futile.

      Is there a way to allow the entire domain?  And, if so, should I?  Maybe a better idea is to have people stop using Chrome?

      Should we all just stop using Google everything?

      Miles

      1 Reply Last reply Reply Quote 0
      • D
        doktornotor Banned
        last edited by

        You should disable the offending rules (completely, not for individual IPs). The SID Mgmt tab is a good place to disable completely broken rules.

        1 Reply Last reply Reply Quote 0
        • M
          MilesDeep
          last edited by

          I understand, but if the offensive (or falsely detected offense) is port scanning, are you not opening your entire network to the potentially very harmful hacking staple?

          I think the rule is 122.  Do I really want to shut down that rule?  Seems risky.

          1 Reply Last reply Reply Quote 0
          • D
            doktornotor Banned
            last edited by

            It's already blocked by the firewall (unless you have your network completely open, in which case you have bigger issues than Snort FPs).

            1 Reply Last reply Reply Quote 0
            • M
              MilesDeep
              last edited by

              Makes sense but, if the firewall already blocks something why would Snort not only be detecting it but also blocking it?  That just does not make any sense.  What filters first, the firewall or Snort?  Also, why would it determine that a simple Google search is somehow port scanning?

              Thanks for your help but this is extremely confusing.

              1 Reply Last reply Reply Quote 0
              • D
                doktornotor Banned
                last edited by

                Snort works on a copy of a packet, it doesn't block anything, it merely passes the offenders to snort2c table for pf to handle it. If you want an inline IDS/IPS, use Suricata. (Inline mode needs a supported NIC, plus I would not suggest this if you are using VLAN or shapers, see #6690 and #6023.)

                1 Reply Last reply Reply Quote 0
                • First post
                  Last post
                Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.