Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Snort Package Updates Available

    Scheduled Pinned Locked Moved IDS/IPS
    14 Posts 6 Posters 1.1k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • N
      nagel @turker
      last edited by nagel

      @turker did pfSense update the MD5 Signature Date field on the tab update? For me it states "Not Downloaded"

      Starting rules update...  Time: 2018-11-06 18:15:40
              Downloading Snort Subscriber rules md5 file snortrules-snapshot-29120.tar.gz.md5...
              Checking Snort Subscriber rules md5 file...
              Snort Subscriber rules are up to date.
              Downloading Snort OpenAppID detectors md5 file snort-openappid.tar.gz.md5...
              Checking Snort OpenAppID detectors md5 file...
              There is a new set of Snort OpenAppID detectors posted.
              Downloading file 'snort-openappid.tar.gz'...
              Done downloading rules file.
              Downloading Snort OpenAppID RULES detectors md5 file appid_rules.tar.gz.md5...
              Checking Snort OpenAppID RULES detectors md5 file...
              There is a new set of Snort OpenAppID RULES detectors posted.
              Downloading file 'appid_rules.tar.gz'...
              Done downloading rules file.
              Downloading Snort GPLv2 Community Rules md5 file community-rules.tar.gz.md5...
              Checking Snort GPLv2 Community Rules md5 file...
              There is a new set of Snort GPLv2 Community Rules posted.
              Downloading file 'community-rules.tar.gz'...
              Done downloading rules file.
              Downloading Emerging Threats Open rules md5 file emerging.rules.tar.gz.md5...
              Checking Emerging Threats Open rules md5 file...
              There is a new set of Emerging Threats Open rules posted.
              Downloading file 'emerging.rules.tar.gz'...
              Done downloading rules file.
              Extracting and installing Snort OpenAppID detectors...
              Installation of Snort OpenAppID detectors completed.
              Extracting and installing Snort OpenAppID detectors...
              Installation of Snort OpenAppID detectors completed.
              Extracting and installing Snort GPLv2 Community Rules...
              Installation of Snort GPLv2 Community Rules completed.
              Extracting and installing Emerging Threats Open rules...
              Installation of Emerging Threats Open rules completed.
              Copying new config and map files...
              Updating rules configuration for: WAN ...
              Updating rules configuration for: LAN ...
              Updating rules configuration for: WLAN ...
              Restarting Snort to activate the new set of rules...
              Snort has restarted with your new set of rules.
      The Rules update has finished.  Time: 2018-11-06 18:16:05
      

      Is this a bug? How can I check the rules are updated and in use ?

      Futhermore it turned out snort was eating all the 8 GB of RAM. I just have stopped the service and removed the package.

      1 Reply Last reply Reply Quote 0
      • bmeeksB
        bmeeks
        last edited by

        The "Not Downloaded" text is a cosmetic error. The upstream Snort team changed the way the rules archive file is named with this latest version, and that change throws off some of the automatic stuff in the GUI package. I fixed two issues, but apparently missed this one. You can be confident the new file versions are downloaded and in use by looking at the Update Log file (you posted its contents). See how it says in there the 29120 file was downloaded and installed?

        N 1 Reply Last reply Reply Quote 1
        • N
          nagel @bmeeks
          last edited by

          @bmeeks said in Snort Package Updates Available:

          The "Not Downloaded" text is a cosmetic error. The upstream Snort team changed the way the rules archive file is named with this latest version, and that change throws off some of the automatic stuff in the GUI package. I fixed two issues, but apparently missed this one. You can be confident the new file versions are downloaded and in use by looking at the Update Log file (you posted its contents). See how it says in there the 29120 file was downloaded and installed?

          And what about the RAM eating of snort any experience?

          bmeeksB 1 Reply Last reply Reply Quote 0
          • bmeeksB
            bmeeks @nagel
            last edited by

            @nagel
            I have no idea about the RAM usage increase. I've noticed no change on my own firewall running Snort.

            N 1 Reply Last reply Reply Quote 0
            • S
              Simbad
              last edited by

              I don't see any block from Snort rules, only from ET.

              bmeeksB 1 Reply Last reply Reply Quote 0
              • bmeeksB
                bmeeks @Simbad
                last edited by

                @simbad said in Snort Package Updates Available:

                I don't see any block from Snort rules, only from ET.

                Depending on which rules you have enabled, that can be perfectly normal. I'm a safe browser, so I see pretty much no alerts from anything except the handful of known malicious IP lists I run from the ET feed. I run those on my WAN just to generate some alerts to look at. The traffic from those IP addresses is blocked by my default WAN rules anyway. With a properly tuned rule set, you should expect to see very few alerts unless you have an actual security problem inside your perimeter.

                1 Reply Last reply Reply Quote 0
                • bmeeksB
                  bmeeks
                  last edited by bmeeks

                  For those of you seeing the "Not Downloaded" message on the UPDATES tab for the Snort Subscriber Rules, that is only a cosmetic problem. I will submit a fix for it, but in the meantime if you want to correct the issue yourself you can make the following edit to the listed file.

                  File: /usr/local/www/snort/snort_download_updates.php

                  Open that file in an editor (you can use the DIAGNOSTICS -> EDIT function of pfSense).
                  Locate this area of code near the top of the file:

                  /* Define some locally required variables from Snort constants */
                  $snortdir = SNORTDIR;
                  $snortbinver = SNORT_BIN_VERSION;
                  $snortbinver = str_replace(".", "", $snortbinver);
                  

                  Paste the following code immediately underneath it.

                  // Make sure the rules version is at least 5 characters in length
                  // by adding trailing zeros if required.
                  if (strlen($snortbinver) < 5) {
                  	$snortbinver = str_pad($snortbinver, 5, '0', STR_PAD_RIGHT);
                  }
                  
                  

                  Save the change and that's it. Here is how the fixed code should look after you finish:

                  /* Define some locally required variables from Snort constants */
                  $snortdir = SNORTDIR;
                  $snortbinver = SNORT_BIN_VERSION;
                  $snortbinver = str_replace(".", "", $snortbinver);
                  
                  // Make sure the rules version is at least 5 characters in length
                  // by adding trailing zeros if required.
                  if (strlen($snortbinver) < 5) {
                  	$snortbinver = str_pad($snortbinver, 5, '0', STR_PAD_RIGHT);
                  }
                  
                  

                  Update: a pull request containing this fix has been posted for the pfSense team to review and merge. The request can be viewed here.

                  1 Reply Last reply Reply Quote 2
                  • T
                    turker
                    last edited by

                    Fixed with update. Thanks

                    1 Reply Last reply Reply Quote 0
                    • N
                      nagel @bmeeks
                      last edited by

                      @bmeeks said in Snort Package Updates Available:

                      @nagel
                      I have no idea about the RAM usage increase. I've noticed no change on my own firewall running Snort.

                      Back to normal. Changed the version and the matching to "AC" without -"BNFA"

                      bmeeksB 1 Reply Last reply Reply Quote 0
                      • bmeeksB
                        bmeeks @nagel
                        last edited by

                        @nagel said in Snort Package Updates Available:

                        @bmeeks said in Snort Package Updates Available:

                        @nagel
                        I have no idea about the RAM usage increase. I've noticed no change on my own firewall running Snort.

                        Back to normal. Changed the version and the matching to "AC" without -"BNFA"

                        So do you mean that after the version change you altered the Fast Pattern Matching algorithm to "AC"? If so, that would definitely have been the problem. I really should take out all of the other options as nothing works better than "AC-BNFA" for the Pattern Matcher. All of the other settings just eat up RAM like crazy for essentially zero performance benefit.

                        1 Reply Last reply Reply Quote 1
                        • L
                          lindsay
                          last edited by

                          Working nice here, the alerts i see is from wan side as i use SCAN and DROP rules from ET.

                          I did a week or 2 get from LAN side though but i am not sure if it was because of microsoft store or it was malware on that computer.

                          I did run antispyware and it found trackers not actually malware.

                          Anyway i hope snort will soon or in 2019/20 support/run on all cores.
                          This alpha stage has been going on for ages.

                          Fiberline 500/500Mbps
                          Intel(R) Xeon(R) CPU E5-2620 v4 @ 2.10GHz

                          1 Reply Last reply Reply Quote 0
                          • First post
                            Last post
                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.