• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

Suricata is blocking LAN and WAN IPs

Scheduled Pinned Locked Moved IDS/IPS
75 Posts 4 Posters 16.8k Views
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • B
    bmeeks
    last edited by Feb 7, 2020, 9:13 PM

    You should also check in the suricata.log file to see if any kinds of errors are being posted. Might be that something is corrupt in your default pass list. You can view the log files for an interface by going to the LOGS VIEW tab.

    Note that the suricata.log file is overwritten each time Suricata starts, so to catch an error you will need to look at the file before restarting Suricata.

    Z 2 Replies Last reply Feb 7, 2020, 10:09 PM Reply Quote 0
    • Z
      zachtywebb @bmeeks
      last edited by Feb 7, 2020, 10:09 PM

      @bmeeks After a fresh install and completely setting everything back up, I am still seeing pass list and home net IPs getting blocked. Here is my suricata.log file if it helps, but I'm not seeing anything concerning. suricata.log.txt

      1 Reply Last reply Reply Quote 0
      • Z
        zachtywebb @bmeeks
        last edited by zachtywebb Feb 7, 2020, 10:26 PM Feb 7, 2020, 10:24 PM

        @bmeeks Here is a line item from the block log from one of these instances:

        02/07/2020-14:17:02.668595 [Block Src] [] [1:2007994:21] ET INFO Suspicious User-Agent (1 space) [] [Classification: Unknown Traffic] [Priority: 3] {TCP} 192.168.1.139:55537
        02/07/2020-14:17:02.668595 [Block Dst] [] [1:2007994:21] ET INFO Suspicious User-Agent (1 space) [] [Classification: Unknown Traffic] [Priority: 3] {TCP} 172.217.3.195:80

        And here is the corresponding line item from the http log:

        02/07/2020-14:17:02.668595 connectivitycheck.gstatic.com[]/generate_204[][]<no referer>[]HEAD[]HTTP/1.1[]204[]0 bytes[]192.168.1.139:55537 -> 172.217.3.195:80

        1 Reply Last reply Reply Quote 0
        • B
          bmeeks
          last edited by bmeeks Feb 7, 2020, 10:35 PM Feb 7, 2020, 10:33 PM

          Post up what your default pass list contains. You can view and copy/paste its contents by going to the INTERFACE SETTINGS tab for an interface and clicking the View button beside the Pass List drop-down selector towards the bottom of the page.

          Suricata's internal pass list engine for the firewall interfaces appears to be working properly as evidenced by these lines from suricata.log showing the firewall's interface IP addresses being added to the internal automatic pass list.

          7/2/2020 -- 13:52:30 - <Info> -- alert-pf -> Received notification of IP address change on interface em0.
          7/2/2020 -- 13:52:30 - <Info> -- alert-pf -> deleted address 192.168.1.1 from automatic firewall interface IP Pass List.
          7/2/2020 -- 13:52:30 - <Info> -- alert-pf -> Received notification of IP address change on interface em0.
          7/2/2020 -- 13:52:30 - <Info> -- alert-pf -> deleted address 10.10.10.1 from automatic firewall interface IP Pass List.
          7/2/2020 -- 13:52:34 - <Info> -- alert-pf -> Received notification of IP address change on interface em0.
          7/2/2020 -- 13:52:34 - <Info> -- alert-pf -> added address 192.168.1.1 to automatic firewall interface IP Pass List.
          7/2/2020 -- 13:52:34 - <Info> -- alert-pf -> Received notification of IP address change on interface em0.
          7/2/2020 -- 13:52:34 - <Info> -- alert-pf -> added address 10.10.10.1 to automatic firewall interface IP Pass List.
          7/2/2020 -- 13:52:39 - <Info> -- alert-pf -> Received notification of IP address change on interface em0.
          7/2/2020 -- 13:52:39 - <Info> -- alert-pf -> deleted address 192.168.1.1 from automatic firewall interface IP Pass List.
          7/2/2020 -- 13:52:39 - <Info> -- alert-pf -> Received notification of IP address change on interface em0.
          7/2/2020 -- 13:52:39 - <Info> -- alert-pf -> deleted address 10.10.10.1 from automatic firewall interface IP Pass List.
          7/2/2020 -- 13:52:39 - <Info> -- alert-pf -> Received notification of IP address change on interface em0.
          7/2/2020 -- 13:52:39 - <Info> -- alert-pf -> added address 192.168.1.1 to automatic firewall interface IP Pass List.
          7/2/2020 -- 13:52:39 - <Info> -- alert-pf -> Received notification of IP address change on interface em0.
          7/2/2020 -- 13:52:39 - <Info> -- alert-pf -> added address 10.10.10.1 to automatic firewall interface IP Pass List.
          

          You should see the network for your LAN listed in the default pass list (for example, 192.168.1.0/24 or something similar). Do you see that?

          BTW, it is curious that in the suricata.log you can see this parsing of firewall interfaces happening twice. It's like your interfaces bounced again as Suricata was starting. What's up with that? The engine monitors the firewall interface IPs using a subscription to pfSense (FreeBSD) routing messages.

          Z 1 Reply Last reply Feb 7, 2020, 10:41 PM Reply Quote 0
          • Z
            zachtywebb @bmeeks
            last edited by zachtywebb Feb 7, 2020, 10:42 PM Feb 7, 2020, 10:41 PM

            @bmeeks I do see that listed. Below is what is in my default pass list:

            10.10.10.1/32
            192.168.0.0/24
            192.168.1.0/24
            xxx.xxx.240.1/32
            xxx.xxx.243.208/32
            127.0.0.1/32
            2001:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:e430/128
            2601:xxxx:xxxx:xxxx::/64
            ::1/128
            fe80::1/128
            fe80::1:1/128
            fe80::xxxx:xxxx:xxxx:a244/128

            I saw the interface parsing twice as well and thought that was weird, but wasn't really sure if that was an issue or not. As far as I'm aware my interfaces didn't bounce.

            1 Reply Last reply Reply Quote 0
            • B
              bmeeks
              last edited by Feb 7, 2020, 10:57 PM

              The logs you posted are all for physical interface em0. Are there any VLANs defined on that interface or just a single LAN?

              Also, have you verified that the IP address 192.168.1.139 is showing on the BLOCKS tab?

              I'm thinking it must be something within your configuration because if this were a widespread problem I would expect to see a lot of posts recently about this.

              Z 1 Reply Last reply Feb 7, 2020, 11:11 PM Reply Quote 0
              • Z
                zachtywebb @bmeeks
                last edited by Feb 7, 2020, 11:11 PM

                @bmeeks There are no defined VLANs; just a single LAN. And yes, I see the 192.168.1.139 IP listed on the block tab and can confirm it does in fact stop working once placed on the block tab.

                I am not willing to retest at the moment, but the configuration on my WAN interface was blocking my external WAN IPv4 address causing my entire internet to get blocked, which is how I stumbled into this gem of an issue. Took me a while to track down what was causing my internet to not work. The only thing that has changed recently is that I updated the Suricata package 2 days before I stumbled into the WAN IP being blocked.

                1 Reply Last reply Reply Quote 0
                • B
                  bmeeks
                  last edited by Feb 8, 2020, 2:46 PM

                  I am unable to reproduce your problem. Here is a test I did using a pfSense virtual machine running the current Suricata-4.1.6_3 package.

                  I have a Kali Linux virtual machine on the same network as the pfSense VM. I used nmap on the Kali Linux machine to scan the WAN IP address of the pfSense virtual machine. That WAN IP is 192.168.10.21 in the images that follow. 192.168.10.23 is the Kali Linux virtual machine.

                  Here are the alerts on the WAN interface from pfSense that resulted from the Kali Linux scan:

                  Alerts.png

                  And here are the results from the BLOCKS tab showing the Kali Linux host being blocked but not the pfSense firewall's WAN IP.

                  Blocks.png

                  And finally, here is the Default Pass List existing on the pfSense virtual machine. Notice the WAN IP is listed and that IP is not blocked in the scan alerts while the IP of the Kali Linux malicious host is blocked. Everything is working as designed on my end.

                  Default Pass List.png

                  Z 1 Reply Last reply Feb 8, 2020, 4:05 PM Reply Quote 0
                  • Z
                    zachtywebb @bmeeks
                    last edited by Feb 8, 2020, 4:05 PM

                    @bmeeks Alright, well I guess at least it's for sure not an issue with the update. I am out of ideas at the moment, but will keep poking at it. Thanks for all your help.

                    B 1 Reply Last reply Feb 8, 2020, 8:51 PM Reply Quote 0
                    • B
                      bmeeks @zachtywebb
                      last edited by bmeeks Feb 8, 2020, 8:55 PM Feb 8, 2020, 8:51 PM

                      @zachtywebb said in Suricata is blocking LAN and WAN IPs:

                      @bmeeks Alright, well I guess at least it's for sure not an issue with the update. I am out of ideas at the moment, but will keep poking at it. Thanks for all your help.

                      Those extra lines in your suricata.log file about adding the firewall interface IPs to the automatic internal pass list are strange. Normally those lines should appear just once in the log unless an interface IP changes sometime later after startup has completed. Usually that only happens due to a DHCP release/renew cycle or a PPPoE connection dropping and then being re-established.

                      When Suricata starts, the custom blocking plugin on pfSense grabs all the existing firewall interface IP addresses and puts them in the internal automatic pass list. It also subscribes to kernel routing messages so that it can see any future interface IP changes. So that first set of log messages about adding IP addresses to the automatic internal pass list are expected and normal.

                      In your log, however, there is another cycle interface IPs being removed and then added back just a second or two after the initial startup scan was completed. That is unusual. I would focus my investigations there to determine why that is happening. What is making your interfaces essentially come up and then go down and then come up again with a few seconds?

                      Z 2 Replies Last reply Feb 9, 2020, 5:22 PM Reply Quote 0
                      • Z
                        zachtywebb @bmeeks
                        last edited by Feb 9, 2020, 5:22 PM

                        @bmeeks So, I did find this line in my pfBlockerNG IP block log and I do have kill states enabled on there. Not sure if this is related but the timestamp on this is directly between the initial start of Suricata in the previous log and the interface reset. This is on the WAN so it would be weird for it to be the cause of the LAN (em0) to bounce.

                        Feb 7 13:52:17,1770007928,igb0,WAN,block,4,6,TCP-S,194.26.69.105,xxx.xxx.243.208,58964,2431,in,RU,pfB_Top_v4,194.26.69.0/24,pfB_Top_v4,Unknown,wan,null,+

                        1 Reply Last reply Reply Quote 0
                        • Z
                          zachtywebb @bmeeks
                          last edited by Feb 9, 2020, 6:03 PM

                          @bmeeks I may have figured this one out. Not sure how this issue just popped up but I saw another of your posts where something similar was happening to someone else and I checked some settings that you had suggested and I had not disabled hardware checksum offloading. After doing this and rebooting I am not seeing home net or pass list IPs being blocked. I will keep an eye on it but so far this seems to have done the trick.

                          B 1 Reply Last reply Feb 9, 2020, 6:53 PM Reply Quote 1
                          • B
                            bmeeks @zachtywebb
                            last edited by Feb 9, 2020, 6:53 PM

                            @zachtywebb said in Suricata is blocking LAN and WAN IPs:

                            @bmeeks I may have figured this one out. Not sure how this issue just popped up but I saw another of your posts where something similar was happening to someone else and I checked some settings that you had suggested and I had not disabled hardware checksum offloading. After doing this and rebooting I am not seeing home net or pass list IPs being blocked. I will keep an eye on it but so far this seems to have done the trick.

                            That's strange. Glad it's working for you now, but I would not have expected that to make a difference in blocking HOME_NET or not blocking it.

                            Z 1 Reply Last reply Feb 9, 2020, 7:25 PM Reply Quote 1
                            • Z
                              zachtywebb @bmeeks
                              last edited by Feb 9, 2020, 7:25 PM

                              @bmeeks Yeah, I was thinking the same thing and was expecting it to not work, but at that point I was grasping at straws. I am still not convinced that was the root cause, but I am no longer showing the duplicate weirdness in the Suricata logs and none of the pass list IPs are being blocked. What I am thinking actually happened is whatever was making Suricata upset finally cleared on this most recent reboot.

                              1 Reply Last reply Reply Quote 0
                              • X
                                xm4rcell0x
                                last edited by xm4rcell0x Sep 30, 2021, 10:17 AM Sep 30, 2021, 9:40 AM

                                I have the exact same problem. Suricata blocks my LAN IPs.
                                With SNORT i don't have this strange problem and i don't know why.
                                Already tried to reboot, to stop suricata on each interface and check for zombies processes but nothing.
                                I have a setup with legacy blocking and Block on Drop only (even without block on drop only i have this problem) and i have VLAN on ix0 interface (but i only have the lan in suricata) . I really don't know what to do .

                                Here my default passlist and the suricata.log and block.log

                                
                                10.10.10.1/32
                                10.10.20.0/24
                                10.10.20.254/32
                                10.39.156.0/25
                                WANIP/32
                                127.0.0.1/32
                                172.168.69.0/24
                                192.168.1.0/24
                                192.168.57.0/24
                                192.168.70.0/24
                                192.168.100.0/24
                                195.43.166.12/32
                                ::1/128
                                fe80::92e2:baff:fe4c:c1b4/128
                                fe80::e9d:92ff:fe5b:cab5/128
                                fe80::e9d:92ff:fe5b:cab6/128
                                

                                suricata.log alerts.log blocks.log

                                P.s. i don't find any similar type of logs in snort, maybe it could

                                B 1 Reply Last reply Sep 30, 2021, 2:40 PM Reply Quote 0
                                • X
                                  xm4rcell0x
                                  last edited by xm4rcell0x Sep 30, 2021, 2:39 PM Sep 30, 2021, 2:26 PM

                                  That's a newer suricata.log.lan made after a fresh install of suricata.

                                  Update: just set up the wan on suricata with legacy block-block on drop only-block both SRC&DST and with this interface i don't have problems with passlist! It blocks only the external IPs!
                                  suricata.log.wan

                                  B 1 Reply Last reply Sep 30, 2021, 2:43 PM Reply Quote 0
                                  • B
                                    bmeeks @xm4rcell0x
                                    last edited by Sep 30, 2021, 2:40 PM

                                    @xm4rcell0x said in Suricata is blocking LAN and WAN IPs:

                                    I have the exact same problem. Suricata blocks my LAN IPs.
                                    With SNORT i don't have this strange problem and i don't know why.
                                    Already tried to reboot, to stop suricata on each interface and check for zombies processes but nothing.
                                    I have a setup with legacy blocking and Block on Drop only (even without block on drop only i have this problem) and i have VLAN on ix0 interface (but i only have the lan in suricata) . I really don't know what to do .

                                    Here my default passlist and the suricata.log and block.log

                                    
                                    10.10.10.1/32
                                    10.10.20.0/24
                                    10.10.20.254/32
                                    10.39.156.0/25
                                    WANIP/32
                                    127.0.0.1/32
                                    172.168.69.0/24
                                    192.168.1.0/24
                                    192.168.57.0/24
                                    192.168.70.0/24
                                    192.168.100.0/24
                                    195.43.166.12/32
                                    ::1/128
                                    fe80::92e2:baff:fe4c:c1b4/128
                                    fe80::e9d:92ff:fe5b:cab5/128
                                    fe80::e9d:92ff:fe5b:cab6/128
                                    

                                    suricata.log alerts.log blocks.log

                                    P.s. i don't find any similar type of logs in snort, maybe it could

                                    From the suricata.log file accompanying your post --

                                    30/9/2021 -- 10:36:16 - <Info> -- alert-pf -> Pass List /usr/local/etc/suricata/suricata_13894_ix0/passlist parsed: 0 IP addresses loaded.
                                    

                                    So Suricata did not load any local IP addresses into the passlist. Notice the "0 IP addresses loaded" part. The other entries in the log where it mentions "automatic IP interface Pass List" are not the same thing. Those are actual firewall interface IPs. The regular Pass List is where LAN hosts would reside.

                                    So in this instance, blocking of local LAN hosts would certainly occur.

                                    1 Reply Last reply Reply Quote 1
                                    • B
                                      bmeeks @xm4rcell0x
                                      last edited by Sep 30, 2021, 2:43 PM

                                      @xm4rcell0x said in Suricata is blocking LAN and WAN IPs:

                                      That's a newer suricata.log.lan made after a fresh install of suricata.

                                      Update: just set up the wan on suricata with legacy block-block on drop only-block both SRC&DST and with this interface i don't have problems with passlist! It blocks only the external IPs!
                                      suricata.log.wan

                                      Now look at the suricata.log file where it tells you how many IP addresses it loaded from the passed Pass List file:

                                      30/9/2021 -- 14:45:47 - <Info> -- alert-pf -> Pass List /usr/local/etc/suricata/suricata_57062_ix0/passlist parsed: 16 IP addresses loaded.
                                      

                                      There it found and loaded 16 IP addresses and/or subnets.

                                      X 1 Reply Last reply Sep 30, 2021, 2:45 PM Reply Quote 1
                                      • X
                                        xm4rcell0x @bmeeks
                                        last edited by Sep 30, 2021, 2:45 PM

                                        @bmeeks yes :)
                                        But Suricata still blocks internal IPs on this interface and i really don't know why
                                        On WAN no problems.

                                        B 1 Reply Last reply Sep 30, 2021, 3:23 PM Reply Quote 0
                                        • B
                                          bmeeks @xm4rcell0x
                                          last edited by Sep 30, 2021, 3:23 PM

                                          @xm4rcell0x said in Suricata is blocking LAN and WAN IPs:

                                          @bmeeks yes :)
                                          But Suricata still blocks internal IPs on this interface and i really don't know why
                                          On WAN no problems.

                                          Are you running VLANs on that interface? If so, what are all of the VLAN subnets defined on that interface?

                                          Also post the content of this file: /usr/local/etc/suricata/suricata_57062_ix0/passlist back here.

                                          X 1 Reply Last reply Sep 30, 2021, 3:32 PM Reply Quote 0
                                          • First post
                                            Last post
                                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
                                            This community forum collects and processes your personal information.
                                            consent.not_received