Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Snort 2.9.6.2 pkg v3.1.4 - Preprocessors blocks my WAN IP

    Scheduled Pinned Locked Moved pfSense Packages
    16 Posts 4 Posters 4.2k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • B
      Beerman
      last edited by

      Hi,

      It seems that all alerts generated by preprocessors are blocking my WAN IP, too. (I think since the update to 3.1.4)

      For example, this alert

      11/10/14-18:14:27.572670 ,140,18,1,"(spp_sip) Content length mismatch",UDP,71.6.Y.Y,41480,84.159.X.X,5060,54321,Potentially Bad Traffic,2,f

      blocks both IPs. (71.6.Y.Y and 84.159.X.X. 84.159.X.X -> my WAN IP)

      also this alert blocks both source and destination:

      11/10/14-20:44:39.784310 ,122,21,1,"(portscan) UDP Filtered Portscan",,5.146.Y.Y,,84.159.X.X,,4307,Attempted Information Leak,2,

      It seems only be a problem, for preprocessors alerts.

      Is it possible, that  $HOME_NET is being ignored?

      (My WAN IP is in the $HOME_NET, I can see it, if i click on "view list". )

      Sometimes a portscan is detected with my WAN IP as source. But I think the preprocessor should ignore it, or not?
      The option "_Ignore Scanne_r" should use the $HOME_NET (Leave blank for default. Default value is $HOME_NET.)

      Thank you, for any help or suggestions!!

      1 Reply Last reply Reply Quote 0
      • bmeeksB
        bmeeks
        last edited by

        @Beerman:

        Hi,

        It seems that all alerts generated by preprocessors are blocking my WAN IP, too. (I think since the update to 3.1.4)

        For example, this alert

        11/10/14-18:14:27.572670 ,140,18,1,"(spp_sip) Content length mismatch",UDP,71.6.Y.Y,41480,84.159.X.X,5060,54321,Potentially Bad Traffic,2,f

        blocks both IPs. (71.6.Y.Y and 84.159.X.X. 84.159.X.X -> my WAN IP)

        also this alert blocks both source and destination:

        11/10/14-20:44:39.784310 ,122,21,1,"(portscan) UDP Filtered Portscan",,5.146.Y.Y,,84.159.X.X,,4307,Attempted Information Leak,2,

        It seems only be a problem, for preprocessors alerts.

        Is it possible, that  $HOME_NET is being ignored?

        (My WAN IP is in the $HOME_NET, I can see it, if i click on "view list". )

        Sometimes a portscan is detected with my WAN IP as source. But I think the preprocessor should ignore it, or not?
        The option "_Ignore Scanne_r" should use the $HOME_NET (Leave blank for default. Default value is $HOME_NET.)

        Thank you, for any help or suggestions!!

        $HOME_NET has nothing to do with IP addresses that are not blocked.  That is from the PASS LIST.  There is a default PASS LIST that should include your WAN IP, default gateway, DNS servers and all locally-attached networks.  To see that list, do this:

        Go to the INTERFACES tab and click to edit the interface in Snort.  Scroll down and find the PASS LIST combo-box.  It should be set to "default".  Out to the right, click the VIEW LIST button.

        Examine the contents of that list.  You should see your WAN IP and the other items I listed as default entries showing up there.  If not, then that is your problem.

        Bill

        1 Reply Last reply Reply Quote 0
        • RonpfSR
          RonpfS
          last edited by

          I got something similar after a power failure, pfsense 2.1.5 Snort 2.9.6.2 pkg v3.1.4, the WAN IP was blocked ….

          
          Nov 10 17:15:14 	snort[54050]: [122:3:1] (portscan) TCP Portsweep [Classification: Attempted Information Leak] [Priority: 2] {PROTO:255} 50.21.134.xx-> 173.194.43.97
          Nov 10 17:15:14 	snort[54050]: [122:3:1] (portscan) TCP Portsweep [Classification: Attempted Information Leak] [Priority: 2] {PROTO:255} 50.21.134.xx-> 173.194.43.97
          
          Nov 10 17:09:07 	snort[54050]: [122:3:1] (portscan) TCP Portsweep [Classification: Attempted Information Leak] [Priority: 2] {PROTO:255} 50.21.134.xx-> 65.55.163.222
          Nov 10 17:09:07 	snort[54050]: [122:3:1] (portscan) TCP Portsweep [Classification: Attempted Information Leak] [Priority: 2] {PROTO:255} 50.21.134.xx-> 65.55.163.222
          Nov 10 16:48:06 	php: rc.newwanip: pfSense package system has detected an ip change 199.192.238.xx -> 50.21.134.xx... Restarting packages.
          

          I add this one to the suppress list

          #(portscan) TCP Portsweep 17:18 lundi 10 novembre 2014 Block au reboot
          suppress gen_id 122, sig_id 3
          

          2.4.5-RELEASE-p1 (amd64)
          Intel Core2 Quad CPU Q8400 @ 2.66GHz 8GB
          Backup 0.5_5, Bandwidthd 0.7.4_4, Cron 0.3.7_5, pfBlockerNG-devel 3.0.0_16, Status_Traffic_Totals 2.3.1_1, System_Patches 1.2_5

          1 Reply Last reply Reply Quote 0
          • B
            Beerman
            last edited by

            @bmeeks:

            $HOME_NET has nothing to do with IP addresses that are not blocked.  That is from the PASS LIST.  There is a default PASS LIST that should include your WAN IP, default gateway, DNS servers and all locally-attached networks.  To see that list, do this:

            Go to the INTERFACES tab and click to edit the interface in Snort.  Scroll down and find the PASS LIST combo-box.  It should be set to "default".  Out to the right, click the VIEW LIST button.

            Examine the contents of that list.  You should see your WAN IP and the other items I listed as default entries showing up there.  If not, then that is your problem.

            Bill

            Thank you, for the quick answer! :-)

            Yes, my actual WAN IP is also in the PASS LIST! So, the WAN IP shouldn´t be blocked?

            My WAN IP ist only blocked with alerts generated by a preprocessor, not with the "normal" ruleset.

            And the "Ignore Scanner" option should use the HOME NET, if it´s blank. But did see alerts, with my WAN IP as source. (And because of this, WAN IP was also blocked).

            1 Reply Last reply Reply Quote 0
            • bmeeksB
              bmeeks
              last edited by

              @Beerman:

              @bmeeks:

              $HOME_NET has nothing to do with IP addresses that are not blocked.  That is from the PASS LIST.  There is a default PASS LIST that should include your WAN IP, default gateway, DNS servers and all locally-attached networks.  To see that list, do this:

              Go to the INTERFACES tab and click to edit the interface in Snort.  Scroll down and find the PASS LIST combo-box.  It should be set to "default".  Out to the right, click the VIEW LIST button.

              Examine the contents of that list.  You should see your WAN IP and the other items I listed as default entries showing up there.  If not, then that is your problem.

              Bill

              Thank you, for the quick answer! :-)

              Yes, my actual WAN IP is also in the PASS LIST! So, the WAN IP shouldn´t be blocked?

              My WAN IP ist only blocked with alerts generated by a preprocessor, not with the "normal" ruleset.

              And the "Ignore Scanner" option should use the HOME NET, if it´s blank. But did see alerts, with my WAN IP as source. (And because of this, WAN IP was also blocked).

              Have you stopped and restarted Snort to see if that helps?  The internal code that does the blocking only reads the PASS LIST during startup.  If your WAN IP changed for some reason and Snort did not restart, then the new IP might get blocked because the "in use" PASS LIST would still contain the old IP.

              Bill

              1 Reply Last reply Reply Quote 0
              • B
                Beerman
                last edited by

                @bmeeks:

                Have you stopped and restarted Snort to see if that helps?  The internal code that does the blocking only reads the PASS LIST during startup.  If your WAN IP changed for some reason and Snort did not restart, then the new IP might get blocked because the "in use" PASS LIST would still contain the old IP.

                Bill

                My WAN IP changes every 24h.

                But why the WAN IP get´s only blocked by alerts generated by preprocessors? As I  mentioned before, It never gets blocked by the "normal" ruleset. (The Option "Which IP to Block" is set to "both")

                If it´s the changing WAN IP, should the "normal" Ruleset not also block my WAN IP? But they never do. (And I get some alerts a day).

                Or I am thinking wrong?

                Thank you!

                1 Reply Last reply Reply Quote 0
                • bmeeksB
                  bmeeks
                  last edited by

                  @Beerman:

                  @bmeeks:

                  Have you stopped and restarted Snort to see if that helps?  The internal code that does the blocking only reads the PASS LIST during startup.  If your WAN IP changed for some reason and Snort did not restart, then the new IP might get blocked because the "in use" PASS LIST would still contain the old IP.

                  Bill

                  My WAN IP changes every 24h.

                  But why the WAN IP get´s only blocked by alerts generated by preprocessors? As I  mentioned before, It never gets blocked by the "normal" ruleset. (The Option "Which IP to Block" is set to "both")

                  If it´s the changing WAN IP, should the "normal" Ruleset not also block my WAN IP? But they never do. (And I get some alerts a day).

                  Or I am thinking wrong?

                  Thank you!

                  As far as the blocking module is concerned, there is no difference between rule alerts and preprocessor alerts – they are the same.

                  Is your WAN IP always assigned from the same subnet?  If so, you could create an Alias with that subnet and assign the alias to the "ignore scanners" setting for the portscan preprocessor.  There is also nothing wrong with simply turning off the portscan preprocessor.  It has become prone to false positives of late.

                  Bill

                  1 Reply Last reply Reply Quote 0
                  • B
                    Beerman
                    last edited by

                    @bmeeks:

                    As far as the blocking module is concerned, there is no difference between rule alerts and preprocessor alerts – they are the same.

                    Is your WAN IP always assigned from the same subnet?  If so, you could create an Alias with that subnet and assign the alias to the "ignore scanners" setting for the portscan preprocessor.  There is also nothing wrong with simply turning off the portscan preprocessor.  It has become prone to false positives of late.

                    Bill

                    No, I think from different subnets… I turned off the portscan preprocessor for now.

                    Just a workaround, but i hope the WAN IP won´t be blocked for a long time...  ;-D

                    Thank you, for your support!  :)

                    1 Reply Last reply Reply Quote 0
                    • bmeeksB
                      bmeeks
                      last edited by

                      @Beerman:

                      @bmeeks:

                      As far as the blocking module is concerned, there is no difference between rule alerts and preprocessor alerts – they are the same.

                      Is your WAN IP always assigned from the same subnet?  If so, you could create an Alias with that subnet and assign the alias to the "ignore scanners" setting for the portscan preprocessor.  There is also nothing wrong with simply turning off the portscan preprocessor.  It has become prone to false positives of late.

                      Bill

                      No, I think from different subnets… I turned off the portscan preprocessor for now.

                      Just a workaround, but i hope the WAN IP won´t be blocked for a long time...  ;-D

                      Thank you, for your support!  :)

                      I bet the bug I fixed today for nanoBSD installs could also be a problem for you.  That bug prevented the "save configuration" function from running when called automatically by pfSense during reboots or during IP address changes.  That function not getting called would cause the PASS LIST to not get auto-update when your IP changed and Snort was restarted.

                      Update to the latest v3.1.5 version of the GUI package, turn the preprocessor back on, and see if things behave better.  You can simply go to the INSTALLED PACKAGES tab and click the XML icon beside the Snort package.  No need to reboot or uninstall/reinstall.

                      Bill

                      1 Reply Last reply Reply Quote 0
                      • RonpfSR
                        RonpfS
                        last edited by

                        I tried the XML reinstall … but it fails

                        Removing snort components...
                        Menu items... done.
                        Services... done.
                        Loading package instructions...
                        Deinstall commands... done.
                        Removing package instructions...done.
                        Auxiliary files... done.
                        Package XML... done.
                        Configuration... done.
                        Beginning package installation for snort .
                        Downloading package configuration file... done.
                        Saving updated package information... done.
                        Downloading snort and its dependencies... 
                        Checking for package installation... Loading package configuration... done.
                        Configuring package components...
                        Additional files... snort_edit_hat_data.php failed.
                        Removing package...
                        Starting package deletion for snort-2.9.6.2-i386...done.
                        Removing snort components...
                        Menu items... done.
                        Services... done.
                        Loading package instructions...
                        Deinstall commands... done.
                        Removing package instructions...done.
                        Auxiliary files... done.
                        Package XML... done.
                        Configuration... done.
                        done.
                        Failed to install package.
                        
                        Package reinstallation failed.
                        

                        I then reinstalled the package.

                        2.4.5-RELEASE-p1 (amd64)
                        Intel Core2 Quad CPU Q8400 @ 2.66GHz 8GB
                        Backup 0.5_5, Bandwidthd 0.7.4_4, Cron 0.3.7_5, pfBlockerNG-devel 3.0.0_16, Status_Traffic_Totals 2.3.1_1, System_Patches 1.2_5

                        1 Reply Last reply Reply Quote 0
                        • B
                          Beerman
                          last edited by

                          @bmeeks:

                          I bet the bug I fixed today for nanoBSD installs could also be a problem for you.  That bug prevented the "save configuration" function from running when called automatically by pfSense during reboots or during IP address changes.  That function not getting called would cause the PASS LIST to not get auto-update when your IP changed and Snort was restarted.

                          Update to the latest v3.1.5 version of the GUI package, turn the preprocessor back on, and see if things behave better.  You can simply go to the INSTALLED PACKAGES tab and click the XML icon beside the Snort package.  No need to reboot or uninstall/reinstall.

                          Bill

                          I will test it. Thx!

                          1 Reply Last reply Reply Quote 0
                          • bmeeksB
                            bmeeks
                            last edited by

                            @RonpfS:

                            I tried the XML reinstall … but it fails

                            Removing snort components...
                            Menu items... done.
                            Services... done.
                            Loading package instructions...
                            Deinstall commands... done.
                            Removing package instructions...done.
                            Auxiliary files... done.
                            Package XML... done.
                            Configuration... done.
                            Beginning package installation for snort .
                            Downloading package configuration file... done.
                            Saving updated package information... done.
                            Downloading snort and its dependencies... 
                            Checking for package installation... Loading package configuration... done.
                            Configuring package components...
                            Additional files... snort_edit_hat_data.php failed.
                            Removing package...
                            Starting package deletion for snort-2.9.6.2-i386...done.
                            Removing snort components...
                            Menu items... done.
                            Services... done.
                            Loading package instructions...
                            Deinstall commands... done.
                            Removing package instructions...done.
                            Auxiliary files... done.
                            Package XML... done.
                            Configuration... done.
                            done.
                            Failed to install package.
                            
                            Package reinstallation failed.
                            

                            I then reinstalled the package.

                            That error indicates you lost connectivity to the pfSense Packages Repository server (like maybe it got blocked by Snort or there was a network issue).  Just for grins, stop Snort and clear all blocks before attempting the update.

                            Bill

                            1 Reply Last reply Reply Quote 0
                            • B
                              Beerman
                              last edited by

                              OK, until now no further blocking of my WAN IP.

                              I can see some preprocessor alerts (portscan), but no blocking of my WAN IP.

                              v3.1.5 seems to solve my problem!  :)

                              Thx, again!  :)

                              1 Reply Last reply Reply Quote 0
                              • bmeeksB
                                bmeeks
                                last edited by

                                @Beerman:

                                OK, until now no further blocking of my WAN IP.

                                I can see some preprocessor alerts (portscan), but no blocking of my WAN IP.

                                v3.1.5 seems to solve my problem!  :)

                                Thx, again!  :)

                                Thank you for the feedback.  Glad it fixed your problem.

                                Bill

                                1 Reply Last reply Reply Quote 0
                                • M
                                  Mr. Jingles
                                  last edited by

                                  I had the same problem, so I wil do the XML-reinstall as you said, Bill, to see if it fixes anything.

                                  (Disabling portscan preprocessors and rebooting did not solve anything).

                                  What is weird in my case is: it only happens on WAN1 (VDSL), not on WAN2 (Cable);

                                  And, of course, being the noob that I am, I have no clue why my WAN1-IP would be detected as doing a port scan on some remote IP at all.

                                  And, something even more weirder:

                                  Source: 122.225.97.66
                                  Destination: 81.x.x.x. => my WAN
                                  SID: 136:1 ((spp_reputation) packets blacklisted)

                                  And then my WAN gets blocked by Snort, and not the 122.225.97.66  ???

                                  6 and a half billion people know that they are stupid, agressive, lower life forms.

                                  1 Reply Last reply Reply Quote 0
                                  • bmeeksB
                                    bmeeks
                                    last edited by

                                    @Hollander:

                                    I had the same problem, so I wil do the XML-reinstall as you said, Bill, to see if it fixes anything.

                                    (Disabling portscan preprocessors and rebooting did not solve anything).

                                    What is weird in my case is: it only happens on WAN1 (VDSL), not on WAN2 (Cable);

                                    And, of course, being the noob that I am, I have no clue why my WAN1-IP would be detected as doing a port scan on some remote IP at all.

                                    And, something even more weirder:

                                    Source: 122.225.97.66
                                    Destination: 81.x.x.x. => my WAN
                                    SID: 136:1 ((spp_reputation) packets blacklisted)

                                    And then my WAN gets blocked by Snort, and not the 122.225.97.66  ???

                                    The update to 3.1.5 should fix the WAN IP getting blocked.  The bug fixed in that update causes Snort to ignore the new WAN IP change, so that means your new WAN IP does not get put into the default automatic PASS LIST.  As for portscan sensitivity, I have a noticed a few more than I used to get many months ago.  The GUI package code I maintain has nothing to do with that, however.  That is something triggered by the Snort binary that comes from the snort.org folks.

                                    Bill

                                    1 Reply Last reply Reply Quote 0
                                    • First post
                                      Last post
                                    Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.