Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Suricata Not Blocking legacy mode

    Scheduled Pinned Locked Moved IDS/IPS
    76 Posts 5 Posters 19.0k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • bmeeksB
      bmeeks
      last edited by bmeeks

      I just got these blocks in my test virtual machine. Notice that it blocked the DST IP on the WAN. The IP shown happens to be the Link-Local IP, but it was the destination address of the packet that triggered the rule. I am in the U.S. Eastern Time Zone, so my dates and times are obviously different than yours (by an entire day almost).

      SuricataDST_IP_Blocks.png

      and here is the BLOCKS tab showing that blocked destination IP address along with the source IP.

      SuricataDST_IP_BLOCKS_tab.png

      So from this I have to conclude the code is working as it should. There has to be something astray in your configuration that you are overlooking.

      everfreeE 1 Reply Last reply Reply Quote 0
      • everfreeE
        everfree
        last edited by

        20/8/2019 -- 13:15:06 - <Info> -- alert-pf output initialized, pf-table=snort2c  block-ip=both  kill-state=on  block-drops-only=off
        
        bmeeksB 1 Reply Last reply Reply Quote 0
        • bmeeksB
          bmeeks @everfree
          last edited by bmeeks

          @everfree said in Suricata Not Blocking legacy mode:

          20/8/2019 -- 13:15:06 - <Info> -- alert-pf output initialized, pf-table=snort2c  block-ip=both  kill-state=on  block-drops-only=off
          

          Have you modified anything in your HOME_NET or EXTERNAL_NET variables? Have you checked for any duplicate Suricata processes? I would certainly first check for a duplicate process using this shell command:

          ps -ax | grep suricata
          

          You should see only a single running instance of Suricata for each configured interface. If you see any duplicate processes, you need to stop all Suricata processes in the GUI, open a command-line shell and repeat the above command to see if any Suricata process is still running. If you see one, kill it with this shell command:

          kill -9 <pid>
          

          where <pid> is the process ID of the remaining Suricata process. At this point I don't know what else to suggest. The Suricata code is working for me, and I installed it fresh on this VMware virtual machine this morning (it is now 10:12 PM in the evening here). As you can see in my screen shots, the blocking is working for both directions (source and destination IPs). There is nothing in Suricata that would change simply based on the rules category.

          1 Reply Last reply Reply Quote 0
          • everfreeE
            everfree @bmeeks
            last edited by

            @bmeeks If i don't select any passlist, My IPS show the same screen.

            bmeeksB 1 Reply Last reply Reply Quote 0
            • bmeeksB
              bmeeks @everfree
              last edited by

              @everfree said in Suricata Not Blocking legacy mode:

              @bmeeks If i don't select any passlist, My IPS show the same screen.

              Just making sure you realize that anytime you change the Pass List or the blocking mode, you must restart Suricata on that interface in order for the change to become effective. Suricata only reads its configuration at startup. It does not "live update" any configuration setting. The only "live update" it can do is reload the rules.

              1 Reply Last reply Reply Quote 0
              • bmeeksB
                bmeeks
                last edited by bmeeks

                And just to be complete, my virtual machine just recorded these IPv4 DST IP blocks:
                SuricataDST_IPv4_Blocks.png
                So it's not just IPv6 addresses that block, the IPv4 addresses are blocking as well. Since Legacy Mode puts the interface in promiscuous mode, it is seeing all of my local LAN traffic on the VM's WAN interface because the WAN of this virtual machine is connected to my LAN.

                1 Reply Last reply Reply Quote 0
                • everfreeE
                  everfree
                  last edited by everfree

                  when i remove my passlist, it show below...
                  6.jpg5.jpg
                  6.jpg

                  bmeeksB 1 Reply Last reply Reply Quote 0
                  • bmeeksB
                    bmeeks @everfree
                    last edited by bmeeks

                    @everfree said in Suricata Not Blocking legacy mode:

                    when i remove my passlist, it show below...
                    6.jpg5.jpg

                    Then your Pass List is too broad. It is whitelisting more IP address space than you think. The default Pass List will include your WAN IP address (just the actual IP, not the whole subnet), your LAN subnet, your DNS server IPs (if defined on the firewall setup), your WAN gateway IP, any VPN addresses and any Virtual IP addresses.

                    You need to examine the actual contents of the Pass List you had assigned to see what's up. I suspect a subnet is defined too large and is thus adding a lot of extra unintended IP space to the Pass List. Click the View List button beside Pass List to see what addresses are in the default list, then assign your custom Pass List and click View List for it to see what's different.

                    I think your last screen shot proves what I said several posts earlier. Your configuration is not exactly how you believed it to be. In this case, I suspect your Pass List is overly broad and thus whitelisting a large chunk of IP space (and therefore you get no blocks on those IPs as is proper when an IP address is covered by a Pass List entry).

                    1 Reply Last reply Reply Quote 0
                    • everfreeE
                      everfree
                      last edited by everfree

                      I modify my passlist it only

                      127.0.0.1/32
                      163.22.0.0/16
                      ::1/128
                      

                      7.jpg
                      it still not works.

                      bmeeksB 1 Reply Last reply Reply Quote 0
                      • bmeeksB
                        bmeeks @everfree
                        last edited by bmeeks

                        @everfree said in Suricata Not Blocking legacy mode:

                        I modify my passlist it only

                        127.0.0.1/32
                        163.22.0.0/16
                        ::1/128
                        

                        7.jpg
                        it still not works.

                        Post the content of your Pass List. Assign it on the INTERFACE SETTINGS tab and then click the View List button. Paste the content of that modal dialog back here to the forum. Better yet, post the content of both the default list and your custom list so we can examine the differences.

                        Since it works when you set the Pass List to "default", that means the underlying binary code works fine. Something is incorrect within your custom Pass List. At least that is the best theory I have.

                        1 Reply Last reply Reply Quote 0
                        • everfreeE
                          everfree
                          last edited by everfree

                          8.jpg
                          NTCT_HOME

                          127.0.0.1/32
                          163.22.0.0/16
                          ::1/128
                          

                          default

                          !127.0.0.1/32
                          !163.22.0.0/16
                          !::1/128
                          
                          bmeeksB 1 Reply Last reply Reply Quote 0
                          • bmeeksB
                            bmeeks @everfree
                            last edited by bmeeks

                            @everfree said in Suricata Not Blocking legacy mode:

                            8.jpg
                            NTCT_HOME

                            127.0.0.1/32
                            163.22.0.0/16
                            ::1/128
                            

                            default

                            !127.0.0.1/32
                            !163.22.0.0/16
                            !::1/128
                            

                            Those values appear incorrect for the "default" Pass List. That appears to be the content of your EXTERNAL_NET variable perhaps and not the Pass List. The default Pass List would never contain the negation (!) symbol. However, the default definition of EXTERNAL_NET would contain the negation symbol.

                            The default Pass List should contain your WAN IP address with a /32 netmask, your WAN gateway IP with a /32 netmask, and the IP address or addresses of any DNS servers you have configured on the General Setup screen of pfSense.

                            1 Reply Last reply Reply Quote 0
                            • everfreeE
                              everfree
                              last edited by everfree

                              So the next step what can i do??

                              The default Pass List should contain your WAN IP address with a /32 netmask, your WAN gateway IP with a /32 netmask, and the IP address or addresses of any DNS servers you have configured on the General Setup screen of pfSense.
                              

                              the default list i uncheck WAN IP and gateway

                              bmeeksB 2 Replies Last reply Reply Quote 0
                              • bmeeksB
                                bmeeks @everfree
                                last edited by

                                @everfree said in Suricata Not Blocking legacy mode:

                                So the next step what can i do??

                                If what you posted is actually your Pass List (and default Pass List) content, then you have a seriously messed up config.xml file section for the Suricata package. Either that, or you posted the wrong information.

                                1 Reply Last reply Reply Quote 0
                                • bmeeksB
                                  bmeeks @everfree
                                  last edited by bmeeks

                                  @everfree said in Suricata Not Blocking legacy mode:

                                  So the next step what can i do??

                                  The default Pass List should contain your WAN IP address with a /32 netmask, your WAN gateway IP with a /32 netmask, and the IP address or addresses of any DNS servers you have configured on the General Setup screen of pfSense.
                                  

                                  the default list i uncheck WAN IP and gateway

                                  You really should not do that. In fact, there is seldom any reason to modify the default values of a Pass List. The only useful modification is to add additional address space to the list using the alias option at the bottom of the edit dialog. There is really no good reason to remove an IP from the default Pass List.

                                  Change you Pass List back to "default" and don't bother it. Why would you want to Suricata to block your WAN gateway IP anyway? That would totally kill all connectivity for your box. Same thing with your DNS servers.

                                  1 Reply Last reply Reply Quote 0
                                  • everfreeE
                                    everfree
                                    last edited by

                                    default

                                    !8.8.4.4/32
                                    !8.8.8.8/32
                                    !127.0.0.1/32
                                    !163.22.0.0/16
                                    !163.22.49.26/32
                                    !163.22.49.28/32
                                    !163.22.168.0/24
                                    !168.95.1.1/32
                                    !168.95.192.1/32
                                    !::1/128
                                    !fe80::21b:21ff:fe94:dc94/128
                                    !fe80::21b:21ff:fe94:dc95/128
                                    !fe80::f603:43ff:fe5c:88b4/128
                                    
                                    bmeeksB 1 Reply Last reply Reply Quote 0
                                    • bmeeksB
                                      bmeeks @everfree
                                      last edited by bmeeks

                                      @everfree said in Suricata Not Blocking legacy mode:

                                      default

                                      !8.8.4.4/32
                                      !8.8.8.8/32
                                      !127.0.0.1/32
                                      !163.22.0.0/16
                                      !163.22.49.26/32
                                      !163.22.49.28/32
                                      !163.22.168.0/24
                                      !168.95.1.1/32
                                      !168.95.192.1/32
                                      !::1/128
                                      !fe80::21b:21ff:fe94:dc94/128
                                      !fe80::21b:21ff:fe94:dc95/128
                                      !fe80::f603:43ff:fe5c:88b4/128
                                      

                                      If that is your PASS LIST, then it is completely wrong. Pass Lists should NEVER contain the negation symbol (that exclamation point means "not in this IP range"). So basically that list would tell Suricata to never block on any IP address unless it was within the range listed. In effect, with the ! negation symbol, your Pass List is backwards.

                                      I really can't believe this is the content of your default Pass List. It looks instead to be the content of maybe your default EXTERNAL_NET list. Are you absolutely positive you are clicking the correct View List button immediately to the right of the Pass List drop-down selector?

                                      everfreeE 1 Reply Last reply Reply Quote 0
                                      • everfreeE
                                        everfree @bmeeks
                                        last edited by everfree

                                        @bmeeks said in Suricata Not Blocking legacy mode:

                                        @everfree said in Suricata Not Blocking legacy mode:

                                        default

                                        !8.8.4.4/32
                                        !8.8.8.8/32
                                        !127.0.0.1/32
                                        !163.22.0.0/16
                                        !163.22.49.26/32
                                        !163.22.49.28/32
                                        !163.22.168.0/24
                                        !168.95.1.1/32
                                        !168.95.192.1/32
                                        !::1/128
                                        !fe80::21b:21ff:fe94:dc94/128
                                        !fe80::21b:21ff:fe94:dc95/128
                                        !fe80::f603:43ff:fe5c:88b4/128
                                        

                                        If that is your PASS LIST, then it is completely wrong. Pass Lists should NEVER contain the negation symbol (that exclamation point means "not in this IP range"). So basically that list would tell Suricata to never block on any IP address unless it was within the range listed. In effect, with the ! negation symbol, your Pass List is backwards.

                                        I really can't believe this is the content of your default Pass List. It looks instead to be the content of maybe your default EXTERNAL_NET list. Are you absolutely positive you are clicking the correct View List button immediately to the right of the Pass List drop-down selector?

                                        this is passlist default

                                        8.8.4.4/32
                                        8.8.8.8/32
                                        127.0.0.1/32
                                        163.22.49.26/32
                                        163.22.49.28/32
                                        163.22.168.0/24
                                        168.95.1.1/32
                                        168.95.192.1/32
                                        ::1/128
                                        fe80::21b:21ff:fe94:dc94/128
                                        fe80::21b:21ff:fe94:dc95/128
                                        fe80::f603:43ff:fe5c:88b4/128
                                        

                                        this is External Net default

                                        !8.8.4.4/32
                                        !8.8.8.8/32
                                        !127.0.0.1/32
                                        !163.22.0.0/16
                                        !163.22.49.26/32
                                        !163.22.49.28/32
                                        !163.22.168.0/24
                                        !168.95.1.1/32
                                        !168.95.192.1/32
                                        !::1/128
                                        !fe80::21b:21ff:fe94:dc94/128
                                        !fe80::21b:21ff:fe94:dc95/128
                                        !fe80::f603:43ff:fe5c:88b4/128
                                        

                                        my custom passlist is

                                        8.8.4.4/32
                                        8.8.8.8/32
                                        59.120.208.208/32
                                        59.120.235.235/32
                                        59.120.242.111/32
                                        59.125.1.114/32
                                        59.125.1.115/32
                                        59.125.14.1/32
                                        59.125.86.119/32
                                        59.126.9.231/32
                                        59.126.182.150/32
                                        61.56.0.0/20
                                        61.56.4.0/24
                                        61.56.8.0/21
                                        61.57.32.0/19
                                        61.57.54.0/23
                                        61.57.56.0/23
                                        61.60.20.0/24
                                        61.60.21.0/24
                                        61.60.22.0/24
                                        61.60.29.0/24
                                        61.60.32.0/23
                                        61.60.34.0/24
                                        61.60.92.0/24
                                        61.60.93.0/24
                                        61.60.94.0/23
                                        61.60.96.0/24
                                        61.60.97.0/24
                                        61.60.122.0/23
                                        61.67.64.0/19
                                        61.67.93.0/24
                                        61.67.94.0/24
                                        61.67.95.0/24
                                        61.221.80.11/32
                                        66.249.64.0/19
                                        117.56.0.0/16
                                        117.56.6.0/24
                                        117.56.30.0/24
                                        117.56.79.0/24
                                        117.56.104.0/23
                                        117.56.106.0/23
                                        117.56.108.0/24
                                        117.56.110.0/24
                                        117.56.111.0/24
                                        117.56.112.0/24
                                        117.56.113.0/24
                                        117.56.118.0/23
                                        117.56.152.0/23
                                        117.56.161.0/24
                                        117.56.238.0/24
                                        117.56.239.0/24
                                        117.56.244.0/23
                                        118.163.8.90/32
                                        118.163.209.137/32
                                        120.96.0.0/11
                                        124.199.64.0/19
                                        124.199.96.0/20
                                        124.199.108.0/23
                                        124.199.110.0/23
                                        125.227.186.86/32
                                        127.0.0.1/32
                                        134.208.0.0/16
                                        140.109.0.0/16
                                        140.110.0.0/15
                                        140.110.141.23/32
                                        140.111.64.0/18
                                        140.112.0.0/12
                                        140.112.57.111/32
                                        140.112.65.202/32
                                        140.112.65.206/32
                                        140.113.0.0/12
                                        140.114.0.0/12
                                        140.115.0.0/12
                                        140.116.0.0/12
                                        140.116.221.36/32
                                        140.116.221.37/32
                                        140.116.221.38/32
                                        140.116.221.39/32
                                        140.117.0.0/16
                                        140.119.0.0/16
                                        140.128.0.0/13
                                        140.136.0.0/15
                                        140.138.0.0/16
                                        163.13.0.0/16
                                        163.14.0.0/15
                                        163.15.0.0/16
                                        163.16.0.0/13
                                        163.17.0.0/19
                                        163.18.0.0/16
                                        163.19.0.0/16
                                        163.20.0.0/16
                                        163.21.0.0/19
                                        163.22.0.0/16
                                        163.22.0.0/19
                                        163.22.49.26/32
                                        163.22.49.28/32
                                        163.22.168.0/24
                                        163.23.0.0/16
                                        163.24.0.0/14
                                        163.25.0.0/18
                                        163.26.0.0/16
                                        163.27.0.0/16
                                        163.28.0.0/16
                                        163.29.0.0/16
                                        163.30.0.0/15
                                        163.32.0.0/16
                                        168.95.1.1/32
                                        168.95.192.1/32
                                        175.183.83.82/32
                                        175.183.91.163/32
                                        192.192.0.0/16
                                        202.169.169.32/32
                                        203.64.0.0/16
                                        203.68.0.0/16
                                        203.71.0.0/16
                                        203.72.0.0/16
                                        203.74.121.45/32
                                        210.59.0.0/17
                                        210.60.0.0/16
                                        210.61.91.43/32
                                        210.61.91.44/32
                                        210.62.64.0/19
                                        210.62.224.0/20
                                        210.62.240.0/21
                                        210.62.247.0/24
                                        210.67.248.0/21
                                        210.69.0.0/16
                                        210.69.61.0/24
                                        210.70.0.0/16
                                        210.70.125.132/32
                                        210.71.0.0/17
                                        210.71.213.29/32
                                        210.240.0.0/16
                                        210.241.0.0/17
                                        210.241.57.0/24
                                        210.241.90.0/24
                                        210.241.91.0/24
                                        210.241.96.0/24
                                        210.241.110.0/24
                                        210.243.0.0/18
                                        210.243.49.81/32
                                        211.20.66.150/32
                                        211.21.2.211/32
                                        211.21.204.80/32
                                        211.21.204.82/32
                                        211.75.165.114/32
                                        211.75.194.79/32
                                        211.79.113.33/32
                                        211.79.128.0/19
                                        211.79.136.0/24
                                        211.79.137.0/24
                                        211.79.153.0/24
                                        211.79.154.0/24
                                        211.79.160.0/19
                                        211.79.163.0/24
                                        211.79.184.0/23
                                        211.79.189.0/24
                                        220.132.30.215/32
                                        220.134.59.158/32
                                        223.200.0.0/16
                                        ::1/128
                                        fe80::21b:21ff:fe94:dc94/128
                                        fe80::21b:21ff:fe94:dc95/128
                                        fe80::f603:43ff:fe5c:88b4/128
                                        
                                        bmeeksB 1 Reply Last reply Reply Quote 0
                                        • bmeeksB
                                          bmeeks @everfree
                                          last edited by bmeeks

                                          @everfree said in Suricata Not Blocking legacy mode:

                                          @bmeeks said in Suricata Not Blocking legacy mode:

                                          @everfree said in Suricata Not Blocking legacy mode:

                                          default

                                          !8.8.4.4/32
                                          !8.8.8.8/32
                                          !127.0.0.1/32
                                          !163.22.0.0/16
                                          !163.22.49.26/32
                                          !163.22.49.28/32
                                          !163.22.168.0/24
                                          !168.95.1.1/32
                                          !168.95.192.1/32
                                          !::1/128
                                          !fe80::21b:21ff:fe94:dc94/128
                                          !fe80::21b:21ff:fe94:dc95/128
                                          !fe80::f603:43ff:fe5c:88b4/128
                                          

                                          If that is your PASS LIST, then it is completely wrong. Pass Lists should NEVER contain the negation symbol (that exclamation point means "not in this IP range"). So basically that list would tell Suricata to never block on any IP address unless it was within the range listed. In effect, with the ! negation symbol, your Pass List is backwards.

                                          I really can't believe this is the content of your default Pass List. It looks instead to be the content of maybe your default EXTERNAL_NET list. Are you absolutely positive you are clicking the correct View List button immediately to the right of the Pass List drop-down selector?

                                          this is passlist default

                                          8.8.4.4/32
                                          8.8.8.8/32
                                          127.0.0.1/32
                                          163.22.49.26/32
                                          163.22.49.28/32
                                          163.22.168.0/24
                                          168.95.1.1/32
                                          168.95.192.1/32
                                          ::1/128
                                          fe80::21b:21ff:fe94:dc94/128
                                          fe80::21b:21ff:fe94:dc95/128
                                          fe80::f603:43ff:fe5c:88b4/128
                                          

                                          this is External Net default

                                          !8.8.4.4/32
                                          !8.8.8.8/32
                                          !127.0.0.1/32
                                          !163.22.0.0/16
                                          !163.22.49.26/32
                                          !163.22.49.28/32
                                          !163.22.168.0/24
                                          !168.95.1.1/32
                                          !168.95.192.1/32
                                          !::1/128
                                          !fe80::21b:21ff:fe94:dc94/128
                                          !fe80::21b:21ff:fe94:dc95/128
                                          !fe80::f603:43ff:fe5c:88b4/128
                                          

                                          Those look correct, and you posted earlier a screen shot showing blocking working as it should when you selected the default Pass List. So unless that post was wrong, then I stand by what I said earlier. Your NTCT_HOME custom pass list is incorrect. Take my advice and just use the default pass list. Don't change it. Set Pass List to "default", save the change, then restart Suricata on the interface. Things should work then.

                                          And looking at the content of your custom pass list, no wonder you are not getting blocks. You have entire swaths of the Internet on your pass list. An IP on a Pass List will never get blocked. You need to seriously cut down on that Pass List. At the very least you need to be changing some netmasks. Why would you need to whitelist so many network blocks? You have a very large Pass List in terms of IP address space that it is whitelisting.

                                          1 Reply Last reply Reply Quote 0
                                          • everfreeE
                                            everfree
                                            last edited by everfree

                                            My IPS is transparent mode firewall, I must use custom passlist. This is 3G realtime and 800000 session.

                                            bmeeksB 1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.