Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    snort crash

    Scheduled Pinned Locked Moved IDS/IPS
    13 Posts 3 Posters 1.7k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • NogBadTheBadN
      NogBadTheBad
      last edited by

      What makes you think its a snort issue ?

      https://github.com/ezyang/csrf-magic

      Andy

      1 x Netgate SG-4860 - 3 x Linksys LGS308P - 1 x Aruba InstantOn AP22

      V 1 Reply Last reply Reply Quote 0
      • V
        v0id
        last edited by

        @v0id said in snort crash:

        https//192.168.1.1/snort/snort_rules.php

        Hmmm.. when I run snort interfaces > Wan Rules and select active rules from drop down menĂ¹ (loads https//192.168.1.1/snort/snort_rules.php) and I land on a white page, that produce the crash I've posted... I really don't know what it depends on, just added more space on swap, but didn't solved the problem...

        1 Reply Last reply Reply Quote 0
        • V
          v0id @NogBadTheBad
          last edited by

          @NogBadTheBad Is it just a protection to csrf? Can I fix the problem someways without disable it?

          1 Reply Last reply Reply Quote 0
          • NogBadTheBadN
            NogBadTheBad
            last edited by NogBadTheBad

            Oh ignore what I mentioned, just noticed I have that code too, but I don't see the crashes.

            It's quite old code, thats what made me think it was something you'd installed.

            Andy

            1 x Netgate SG-4860 - 3 x Linksys LGS308P - 1 x Aruba InstantOn AP22

            1 Reply Last reply Reply Quote 0
            • bmeeksB
              bmeeks
              last edited by

              @v0id :
              Do you have any other packages installed such as Squid, pfBlockerNG, DNSBL, etc? That error indicates that something is chewing up all of the allocated PHP memory. If you have 4GB of RAM, you should not be swapping out to disk (swap memory).

              Lastly, what version of pfSense are you running? There were some changes made to the csrf-magic code over in the pfSense-2.5-DEVEL snapshot late last week. However, to my knowledge none of those were applied to RELEASE.

              V 1 Reply Last reply Reply Quote 0
              • V
                v0id @bmeeks
                last edited by

                @bmeeks Have installed just pfBlocker (TLD enabled) and snort in not blocking mode. Actually swapped out of disk and encrypted it, is it bad?

                I'm running pfsense 2.4.4 stable

                bmeeksB 1 Reply Last reply Reply Quote 0
                • bmeeksB
                  bmeeks @v0id
                  last edited by

                  @v0id said in snort crash:

                  @bmeeks Have installed just pfBlocker (TLD enabled) and snort in not blocking mode. Actually swapped out of disk and encrypted it, is it bad?

                  I'm running pfsense 2.4.4 stable

                  What do you mean by "swapped out of disk and encrypted it, is it bad?"? That statement makes no sense to me. What did you swap out of the disk and what is encrypted?

                  Do you perhaps mean you swapped out the disk drive itself? But I still can't make sense out of the encrypted part.

                  V 2 Replies Last reply Reply Quote 0
                  • V
                    v0id @bmeeks
                    last edited by v0id

                    This post is deleted!
                    1 Reply Last reply Reply Quote 0
                    • V
                      v0id @bmeeks
                      last edited by

                      @bmeeks Meant I've extended swap space using space from root partition and after create the swap space used these commands for encrypt it
                      dd if=/dev/random of=/root/en.swap0 bs=1m count=64
                      mdconfig -a -t vnode -f /root/en.swap0
                      geom eli init md0
                      geli restore /var/backups/md0.eli md0

                      Attach md0, enter:
                      geom eli attach md0

                      Turn on encrpted swap file:
                      swapon /dev/md0.eli||

                      bmeeksB 1 Reply Last reply Reply Quote 0
                      • bmeeksB
                        bmeeks @v0id
                        last edited by bmeeks

                        @v0id
                        There is no reason, in my view, to encrypt swap space.

                        You also need to determine why memory usage is so high. Extending swap space is a band aid covering up the core problem.

                        V 1 Reply Last reply Reply Quote 0
                        • V
                          v0id @bmeeks
                          last edited by

                          @bmeeks Think the core problem is too many hosts in pfBlocker and TLD option activated. 4GB of ram should be not enough for 6 milion hosts

                          bmeeksB 1 Reply Last reply Reply Quote 0
                          • bmeeksB
                            bmeeks @v0id
                            last edited by bmeeks

                            @v0id said in snort crash:

                            @bmeeks Think the core problem is too many hosts in pfBlocker and TLD option activated. 4GB of ram should be not enough for 6 milion hosts

                            That's one reason I'm not a fan of loading up tons of IP blocklists. It chews up a ton of CPU processing time and uses valuable RAM. There are more efficient ways to have a secure system in my opinion.

                            If you really want to run all this stuff on your firewall, then you need more horsepower (larger CPU and lots more RAM). Then you will need to customize the php.ini file settings for maximum memory allocated to PHP processes. Just be aware that any change you make to that file will be automatically overwritten each time you update pfSense. Again, lots of trouble for not much gain in my view.

                            If you want to block ads on your network, look at something like pi hole running on a virtual machine. Just let your firewall do its normal thing by blocking all unsolicited inbound traffic. But don't bog it down maintaining huge IP block lists. Just my humble $0.02 worth.

                            1 Reply Last reply Reply Quote 0
                            • First post
                              Last post
                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.