Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Suricata-6.0.0_11 auto-enable by SID Mgmt conf files don't work properly

    Scheduled Pinned Locked Moved IDS/IPS
    8 Posts 4 Posters 1.2k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • J
      juliokele
      last edited by

      @bmeeks
      Auto-enable by SID Mgmt conf files "Feodo Tracker Botnet C2 IP Rules" and "ABUSE.ch SSL Blacklist Rules" don't work properly, auto-enabled checks are missing.

      Added "feodotracker" and "sslblacklist_tls_cert" to enablesid.conf, Interface SID Management List Assignments LAN Rebuild checked, save.

      LAN - Categories.PNG
      SID Auto-Management List Editor.PNG
      SID Management Config.PNG
      Interface SID Management List Assignments.PNG

      1 Reply Last reply Reply Quote 0
      • bmeeksB
        bmeeks
        last edited by

        I've verified this issue. I will get it fixed in the next package update. In the meantime, you can simply go to the CATEGORIES tab and enable those categories if you want to use them.

        1 Reply Last reply Reply Quote 0
        • J
          jm1384
          last edited by

          Same thing with others categorys, for exemple : dns-event or something elses.

          enablesid.conf by sid auto-management doesn't work properly but
          disablesid.conf and dropsid.conf working good.

          Thank you bmeeks for the next package update.

          bmeeksB 1 Reply Last reply Reply Quote 0
          • bmeeksB
            bmeeks @jm1384
            last edited by

            @jm1384 said in Suricata-6.0.0_11 auto-enable by SID Mgmt conf files don't work properly:

            Same thing with others categorys, for exemple : dns-event or something elses.

            enablesid.conf by sid auto-management doesn't work properly but
            disablesid.conf and dropsid.conf working good.

            Thank you bmeeks for the next package update.

            Yes, I found that issue as well. It was due to only looking for rules filenames with the prefixes "emerging-" or "snort-" instead of all rules rules. It will be fixed in an upcoming release. Snort suffered from the same issue, and I will fix that as well.

            The new Suricata package is ready, but I am waiting a bit while working with the upstream Suricata binary team to see if we can identify and fix an issue in the 6.0.3 binary. I would love to update the pfSense package to use 6.0.3, but at the moment netmap under any 6.x version will work for a short period of time and then freeze - halting all traffic on the interface.

            N 1 Reply Last reply Reply Quote 1
            • N
              NRgia @bmeeks
              last edited by NRgia

              @bmeeks said in Suricata-6.0.0_11 auto-enable by SID Mgmt conf files don't work properly:

              e new Suricata package is ready, but I am waiting a bit while working with the upstream Suricata binary team to see if we can identify and fix an issue in the 6.0.3

              If you are referring to this defect https://redmine.openinfosecfoundation.org/issues/4478 raised by you...I would like to thank you for taking care of Suricata, by documenting this issues.

              I don't know what happened with Suricata team during 6.0 version.
              I'm speaking about this defect https://redmine.openinfosecfoundation.org/issues/4443 also

              I'm starting to think that FreeBSD is a 3rd class citizen compared to Linux, by the means of implementation, integration and testing

              Also please note that the defect was moved to be fixed in 6.0.4 https://redmine.openinfosecfoundation.org/versions/169

              Thank you again

              bmeeksB 1 Reply Last reply Reply Quote 0
              • bmeeksB
                bmeeks @NRgia
                last edited by

                @NRgia:
                Yes, I was primarily speaking of the defect I raised about Netmap hanging. Another user chimed in with a similar hanging issue, but he is not using Netmap. So perhaps something else is wrong within Suricata's threading logic. There were lots of changes there in the move from 5.x to 6.x.

                I am working via email with the developer assigned to the Redmine issue I submitted. He can reproduce it, but only randomly. Same on my end now. It takes longer for the "hang" to happen. I can reliably reproduce it if I let my test machines run overnight. So this is a very puzzling defect.

                One good outcome from this problem is that I've learned an awful lot about the internals of netmap. And I believe I have found some subtle bugs in the current Suricata implementation of netmap. I am proposing some fixes for these as I work with the Suricata developer. Hopefully this all winds up producing a better performing Suricata package on pfSense in the future.

                1 Reply Last reply Reply Quote 2
                • bmeeksB
                  bmeeks
                  last edited by

                  The fix for this issue has been posted in the latest Suricata package update under review by the pfSense developer team. I've asked them to update the package in all pfSense CE and pfSense+ branches. It may take a couple of days for the update to post.

                  Here is the Pull Request containing the fixes: https://github.com/pfsense/FreeBSD-ports/pull/1085.

                  J 1 Reply Last reply Reply Quote 2
                  • J
                    juliokele @bmeeks
                    last edited by juliokele

                    @bmeeks
                    thanx, it's working fine now...

                    1 Reply Last reply Reply Quote 0
                    • First post
                      Last post
                    Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.