Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Suricata Won't Auto Start

    Scheduled Pinned Locked Moved IDS/IPS
    18 Posts 3 Posters 825 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • P
      ProperCactus Rebel Alliance @bmeeks
      last edited by

      @bmeeks said in Suricata Won't Auto Start:

      You can manually create a HOME_NET list using the PASS LIST tab, and then assign your custom list on the INTERFACE SETTINGS tab. That would hard-code the values and thus Suricata would not go out upon startup and ask pfSense for the interface values.

      I think I will have to do that

      bmeeksB 1 Reply Last reply Reply Quote 0
      • bmeeksB
        bmeeks @ProperCactus
        last edited by bmeeks

        @propercactus said in Suricata Won't Auto Start:

        @bmeeks said in Suricata Won't Auto Start:

        You can manually create a HOME_NET list using the PASS LIST tab, and then assign your custom list on the INTERFACE SETTINGS tab. That would hard-code the values and thus Suricata would not go out upon startup and ask pfSense for the interface values.

        I think I will have to do that

        That should work. Can you share what IP address you believe would go where the bogus "Array" entry is located? Is it perhaps an IPv6 address for either the LAN or OP1 interface?

        P 1 Reply Last reply Reply Quote 0
        • P
          ProperCactus Rebel Alliance @bmeeks
          last edited by

          @bmeeks said in Suricata Won't Auto Start:

          Is it perhaps an IPv6 address for either the LAN or OP1 interface?

          I disabled ipv6 so I don't even know why it's getting ipv6 addresses at all!

          P bmeeksB 2 Replies Last reply Reply Quote 0
          • P
            ProperCactus Rebel Alliance @ProperCactus
            last edited by

            @propercactus

            Except maybe I didn't... hmmmm

            
            igb0: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> metric 0 mtu 1500
            	description: RED
            	options=8100b8<VLAN_MTU,VLAN_HWTAGGING,JUMBO_MTU,VLAN_HWCSUM,VLAN_HWFILTER>
            	ether 00:e0:67:26:3f:68
            	inet6 fe80::2e0:67ff:fe26:3f68%igb0 prefixlen 64 scopeid 0x1
            	inet 192.168.1.4 netmask 0xffffff00 broadcast 192.168.1.255
            	media: Ethernet autoselect (1000baseT <full-duplex>)
            	status: active
            	nd6 options=21<PERFORMNUD,AUTO_LINKLOCAL>
            igb1: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> metric 0 mtu 1500
            	description: GREEN
            	options=8100b8<VLAN_MTU,VLAN_HWTAGGING,JUMBO_MTU,VLAN_HWCSUM,VLAN_HWFILTER>
            	ether 00:e0:67:26:3f:69
            	inet6 fe80::2e0:67ff:fe26:3f69%igb1 prefixlen 64 scopeid 0x2
            	inet 192.168.2.1 netmask 0xffffff00 broadcast 192.168.2.255
            	media: Ethernet autoselect (1000baseT <full-duplex>)
            	status: active
            	nd6 options=21<PERFORMNUD,AUTO_LINKLOCAL>
            igb2: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> metric 0 mtu 1500
            	description: BLUE
            	options=8100b8<VLAN_MTU,VLAN_HWTAGGING,JUMBO_MTU,VLAN_HWCSUM,VLAN_HWFILTER>
            	ether 00:e0:67:26:3f:6a
            	inet6 fe80::2e0:67ff:fe26:3f6a%igb2 prefixlen 64 scopeid 0x3
            	inet 192.168.3.1 netmask 0xffffff00 broadcast 192.168.3.255
            	media: Ethernet autoselect
            	status: no carrier
            	nd6 options=21<PERFORMNUD,AUTO_LINKLOCAL>
            igb3: flags=8802<BROADCAST,SIMPLEX,MULTICAST> metric 0 mtu 1500
            	options=e507bb<RXCSUM,TXCSUM,VLAN_MTU,VLAN_HWTAGGING,JUMBO_MTU,VLAN_HWCSUM,TSO4,TSO6,LRO,VLAN_HWFILTER,VLAN_HWTSO,RXCSUM_IPV6,TXCSUM_IPV6>
            	ether 00:e0:67:26:3f:6b
            	media: Ethernet autoselect
            	status: no carrier
            	nd6 options=21<PERFORMNUD,AUTO_LINKLOCAL>
            enc0: flags=41<UP,RUNNING> metric 0 mtu 1536
            	groups: enc
            	nd6 options=21<PERFORMNUD,AUTO_LINKLOCAL>
            lo0: flags=8049<UP,LOOPBACK,RUNNING,MULTICAST> metric 0 mtu 16384
            	options=680003<RXCSUM,TXCSUM,LINKSTATE,RXCSUM_IPV6,TXCSUM_IPV6>
            	inet6 ::1 prefixlen 128
            	inet6 fe80::1%lo0 prefixlen 64 scopeid 0x6
            	inet 127.0.0.1 netmask 0xff000000
            	inet 10.255.255.254 netmask 0xffffffff
            	groups: lo
            	nd6 options=21<PERFORMNUD,AUTO_LINKLOCAL>
            pflog0: flags=100<PROMISC> metric 0 mtu 33160
            	groups: pflog
            pfsync0: flags=0<> metric 0 mtu 1500
            	groups: pfsync
            
            
            1 Reply Last reply Reply Quote 0
            • bmeeksB
              bmeeks @ProperCactus
              last edited by

              @propercactus said in Suricata Won't Auto Start:

              @bmeeks said in Suricata Won't Auto Start:

              Is it perhaps an IPv6 address for either the LAN or OP1 interface?

              I disabled ipv6 so I don't even know why it's getting ipv6 addresses at all!

              Those are the default Link-Local addresses the operating system adds by default.

              For some reason, pfSense is returning an unexpected value when Suricata queries it for interface IP address info during startup. The most likely scenario, in my mind, is that the particular interface has not finished "coming up" at the time Suricata asks pfSense about it. Of course that's just an educated guess. Looking at the HOME_NET list shown in the log, do you see an IP that is missing? The default HOME_NET should include all the locally-attached interface subnets, except on the WAN it will only include the firewall's public WAN IP (and not the whole WAN subnet you are connected into on your ISP's side).

              P 1 Reply Last reply Reply Quote 0
              • P
                ProperCactus Rebel Alliance @bmeeks
                last edited by

                @bmeeks said in Suricata Won't Auto Start:

                @propercactus said in Suricata Won't Auto Start:

                @bmeeks said in Suricata Won't Auto Start:

                Is it perhaps an IPv6 address for either the LAN or OP1 interface?

                I disabled ipv6 so I don't even know why it's getting ipv6 addresses at all!

                Those are the default Link-Local addresses the operating system adds by default.

                For some reason, pfSense is returning an unexpected value when Suricata queries it for interface IP address info during startup. The most likely scenario, in my mind, is that the particular interface has not finished "coming up" at the time Suricata asks pfSense about it. Of course that's just an educated guess. Looking at the HOME_NET list shown in the log, do you see an IP that is missing? The default HOME_NET should include all the locally-attached interface subnets, except on the WAN it will only include the firewall's public WAN IP (and not the whole WAN subnet you are connected into on your ISP's side).

                I reckon it's the wireguard tun_wg0 because on reboot ther routes to the gateway don't get set properly either

                bmeeksB cmcdonaldC 2 Replies Last reply Reply Quote 0
                • bmeeksB
                  bmeeks @ProperCactus
                  last edited by

                  @propercactus said in Suricata Won't Auto Start:

                  I reckon it's the wireguard tun_wg0 because on reboot ther routes to the gateway don't get set properly either

                  I would agree. I'm not a wireguard user, but if that tunnel is not completely up at the time Suricata is starting, then pfSense could very well return unexpected information to Suricata when queried about it.

                  1 Reply Last reply Reply Quote 0
                  • cmcdonaldC
                    cmcdonald Netgate Developer @ProperCactus
                    last edited by cmcdonald

                    @propercactus Suricata + WireGuard is something that needs testing, I personally haven't tested it.

                    WireGuard interfaces are created as early as possible (there is an earlyshellcmd that kicks this off, and it's pushed to the very top of the earlyshellcmd list just to be extra certain it's ran first).

                    If I'm understanding correctly, Suricata isn't starting even though it isn't configured to monitor tun_wg0?

                    Need help fast? https://www.netgate.com/support

                    1 Reply Last reply Reply Quote 0
                    • P
                      ProperCactus Rebel Alliance
                      last edited by

                      @bmeeks yea that was it, when I removed the wireguard S2S it works now on reboot. Gunna have to revert to IPsec S2S I think.

                      @theonemcdonald said in Suricata Won't Auto Start:

                      If I'm understanding correctly, Suricata isn't starting even though it isn't configured to monitor tun_wg0?

                      Exactly yes, it's trying to get an ipv6 address from tun_wg0 to add to HOME_NET and it sticks a dummy value called "Array" in the list instead which breaks the Suricata config.

                      1 Reply Last reply Reply Quote 0
                      • bmeeksB
                        bmeeks
                        last edited by

                        Suricata, when starting or regenerating the suricata.yaml configuration file for an interface, will ask pfSense for a list of all local interfaces so that it can generate a default HOME_NET variable that includes the IP subnets for all the locally-attached interfaces. As I mentioned before, for the WAN side, it will only include the actual public WAN IP (so a /32 subnet mask). For the other local interfaces, it will ask pfSense for the mask info.

                        cmcdonaldC 1 Reply Last reply Reply Quote 0
                        • cmcdonaldC
                          cmcdonald Netgate Developer @bmeeks
                          last edited by cmcdonald

                          @ProperCactus what if you as a test assign an IPv6 address to your tun_wg0 interface. Just so it doesn't return an empty array?

                          Need help fast? https://www.netgate.com/support

                          P 2 Replies Last reply Reply Quote 0
                          • P
                            ProperCactus Rebel Alliance @cmcdonald
                            last edited by

                            @theonemcdonald that might do it coz currently it's this:

                            tun_wg0: flags=80c1<UP,RUNNING,NOARP,MULTICAST> metric 0 mtu 1420
                            	options=80000<LINKSTATE>
                            	inet 10.128.128.1 netmask 0xffffff00
                            	groups: wg WireGuard
                            	nd6 options=101<PERFORMNUD,NO_DAD>
                            

                            I will try with the ipv6 but first i'm trying to understand what I do gateway wise as it doesn't seem right to create static routes out a gateway that is not connected to the tunnel like you suggest?

                            1 Reply Last reply Reply Quote 0
                            • P
                              ProperCactus Rebel Alliance @cmcdonald
                              last edited by ProperCactus

                              @theonemcdonald

                              tun_wg0: flags=80c1<UP,RUNNING,NOARP,MULTICAST> metric 0 mtu 1500
                              	description: WREGRD
                              	options=80000<LINKSTATE>
                              	inet 10.128.128.1 netmask 0xffffffff
                              	inet6 fd1f:c547:3e98:b32f:: prefixlen 64
                              	groups: wg WireGuard
                              	nd6 options=101<PERFORMNUD,NO_DAD>
                              

                              Gave it a local link ipv6 but the issue persists.

                              If I delete the tun_wg0 the issue goes away.

                              1 Reply Last reply Reply Quote 0
                              • First post
                                Last post
                              Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.