Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Snort 3

    Scheduled Pinned Locked Moved IDS/IPS
    38 Posts 9 Posters 9.7k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • L
      l0rdraiden @bmeeks
      last edited by

      @bmeeks

      Do you think it will be posible to create IDS policies and apply them to firewall rules like in the commercial firewalls?

      Basically you can create a policy with a personalized configuration and rules and apply this policy to a fw rule, so the traffic of that firewall rule is the only affected by that IDS policy.
      THis can be to a firewall rule or to a port, or host.

      bmeeksB 1 Reply Last reply Reply Quote 0
      • bmeeksB
        bmeeks @l0rdraiden
        last edited by bmeeks

        @l0rdraiden said in Snort 3:

        @bmeeks

        Do you think it will be posible to create IDS policies and apply them to firewall rules like in the commercial firewalls?

        Basically you can create a policy with a personalized configuration and rules and apply this policy to a fw rule, so the traffic of that firewall rule is the only affected by that IDS policy.
        THis can be to a firewall rule or to a port, or host.

        No, that is not something that I predict is on the horizon. The packet filter firewall used by pfSense is totally unaware of the presence of any installed IDS/IPS package and any policies defined in the IDS/IPS. Today the IDS/IPS component sits completely outside of the firewall. Changing that would require substantially reworking the internal network plumbing of the FreeBSD kernel used beneath pfSense.

        1 Reply Last reply Reply Quote 0
        • P
          Paych3ck
          last edited by

          I was just curious if there was any update to this. I am very interested in using Snort 3 with Pfsense. Thanks!

          bmeeksB 1 Reply Last reply Reply Quote 0
          • bmeeksB
            bmeeks @Paych3ck
            last edited by bmeeks

            @Paych3ck said in Snort 3:

            I was just curious if there was any update to this. I am very interested in using Snort 3 with Pfsense. Thanks!

            Snort3 will likely be a long time in coming -- if ever. I started working on a package for it, but the effort got to be very frustrating because so much is different from Snort 2.9.x. Migrating an existing pfSense Snort 2.9.x configuration over to Snort3 proved to be a tough challenge. That's one of the reasons I put the package development back into mothballs. I never did get a working system going with Snort3 on pfSense. The binary part is not really the issue. The difficulties are in the PHP GUI code and all the gymnastics required to create the LUA configuration file for the binary to use.

            Anybody is free to take up the challenge and work on a Snort3 package if they desire, but my enthusiasm for it has evaporated for now.

            P 1 Reply Last reply Reply Quote 1
            • P
              Paych3ck @bmeeks
              last edited by

              @bmeeks Thank you for the update.

              1 Reply Last reply Reply Quote 0
              • P
                posix
                last edited by

                @Paych3ck I am not a developer nor have any vested interest in snort. But like you was curious and I came across this thread. Kinda bummed out that at this time no further development was going to be done and to be fair it is a large task at hand. But I wanted to offer others some context who are like us curious as about snort 3.

                Checking the official snort blog:
                https://blog.snort.org/
                -https://blog.snort.org/2018/08/snort-3-beta-available-now.html -8/2018 beta released

                Other points from the snort download page:
                -Up to now its been receiving updates (still beta stage)
                -2.9.16 is still listed as stable but not 3.0

                So I dunno maybe another reason is that the dust hasn't settled.

                1 Reply Last reply Reply Quote 0
                • I
                  Impatient
                  last edited by

                  According to twitter snort3 is on it's final beta with release later this year.

                  1 Reply Last reply Reply Quote 0
                  • T
                    talaverde
                    last edited by talaverde

                    As the OP of this thread, I sorta felt bad because I lost interest. This is because I ended up installing Suricata, even if only just to try it out. Surprisingly, I was able to significantly drop the RAM used by my pfSense (VMs) and even noticed a slight improvement in speeds. I may have just had things mis-configured with Snort, but I'm happy at the moment. While I'll almost definitely try out Snort 3 when it's available, I'm not anxiously waiting, like I was before.

                    I have noticed many more alerts with Suricata, than with Snort. I don't know that that means more protection or more false alarms. It may be a little of both.

                    1 Reply Last reply Reply Quote 0
                    • B
                      beachbum2021
                      last edited by

                      any updates on snort 3.0? Single Threading is killing my use of it but their rule sets are far and away cheaper than suricata. Single threading kill throughput to the point it's pointless to even use the package on higher end network speeds.

                      bmeeksB 1 Reply Last reply Reply Quote 0
                      • bmeeksB
                        bmeeks @beachbum2021
                        last edited by

                        @beachbum2021 said in Snort 3:

                        any updates on snort 3.0? Single Threading is killing my use of it but their rule sets are far and away cheaper than suricata. Single threading kill throughput to the point it's pointless to even use the package on higher end network speeds.

                        No more progress, and I have no plans at present to resume work on a Snort3 package. If someone else wishes to tackle that project, they are welcome to do so.

                        B 1 Reply Last reply Reply Quote 1
                        • B
                          beachbum2021 @bmeeks
                          last edited by

                          @bmeeks thanks for the update

                          1 Reply Last reply Reply Quote 0
                          • First post
                            Last post
                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.