Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Snort version 3.2.9.5_1 Regression ?

    Scheduled Pinned Locked Moved IDS/IPS
    8 Posts 4 Posters 890 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • chudakC Offline
      chudak
      last edited by

      After updating to snort version 3.2.9.5_1 status for WAN is always shown as stopped via Services/Snort/Interfaces

      See https://redmine.pfsense.org/issues/7866#change-33929

      Anybody else has seen this ?

      1 Reply Last reply Reply Quote 0
      • DerelictD Offline
        Derelict LAYER 8 Netgate
        last edited by

        How about waiting for a response here and a consensus before opening a bug report.

        What is in your snort logs when you try to start WAN? That is the first place you should look.

        Chattanooga, Tennessee, USA
        A comprehensive network diagram is worth 10,000 words and 15 conference calls.
        DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
        Do Not Chat For Help! NO_WAN_EGRESS(TM)

        1 Reply Last reply Reply Quote 0
        • chudakC Offline
          chudak
          last edited by

          @Derelict:

          How about waiting for a response here and a consensus before opening a bug report.

          What is in your snort logs when you try to start WAN? That is the first place you should look.

          This is all I can see https://pastebin.com/QH7e7A61

          Does
          "Sep 16 14:20:08 snort  40961  FATAL ERROR: /usr/local/etc/snort/snort_12131_igb0/rules/snort.rules(424) Unknown rule option: 'sd_pattern'."
          mean anything to you?

          Thx

          1 Reply Last reply Reply Quote 0
          • D Offline
            doktornotor Banned
            last edited by

            You'll need to wait until someone upstream fixes the broken rule, or find the offending rule (see the file/line referenced in the error message) and disable it on WAN. This has nothing to do with the package update.

            If you want to avoid IDS failing due to a single broken rule (broken by design), I'd suggest to use Suricata.

            1 Reply Last reply Reply Quote 0
            • chudakC Offline
              chudak
              last edited by

              Ok thx,  I wanted to communicate the issue, it might be minor but still was working fine before the last point update.
              Will wait !

              1 Reply Last reply Reply Quote 0
              • bmeeksB Offline
                bmeeks
                last edited by

                @chudak:

                Ok thx,  I wanted to communicate the issue, it might be minor but still was working fine before the last point update.
                Will wait !

                Here is the broken rule clue:

                
                FATAL ERROR: /usr/local/etc/snort/snort_12131_igb0/rules/snort.rules(424) Unknown rule option: 'sd_pattern'.
                
                

                It is a problem in a sensitive data rule, and specifically it is the rule on line 424 in the file /usr/local/etc/snort/snort_12131_igb0/rules/snort.rules.  You can use an editor such as vi to find that line and see which rule SID number it is, and then disable that rule.  As mentioned above, the problem is within the rules package itself and not with the Snort package on pfSense.

                Bill

                1 Reply Last reply Reply Quote 0
                • chudakC Offline
                  chudak
                  last edited by

                  @bmeeks:

                  @chudak:

                  Ok thx,  I wanted to communicate the issue, it might be minor but still was working fine before the last point update.
                  Will wait !

                  Here is the broken rule clue:

                  
                  FATAL ERROR: /usr/local/etc/snort/snort_12131_igb0/rules/snort.rules(424) Unknown rule option: 'sd_pattern'.
                  
                  

                  It is a problem in a sensitive data rule, and specifically it is the rule on line 424 in the file /usr/local/etc/snort/snort_12131_igb0/rules/snort.rules.  You can use an editor such as vi to find that line and see which rule SID number it is, and then disable that rule.  As mentioned above, the problem is within the rules package itself and not with the Snort package on pfSense.

                  Bill

                  Thx for the answer.
                  The only interesting question remains - why this rule problem was unmasked by a snort version upgrade?

                  1 Reply Last reply Reply Quote 0
                  • bmeeksB Offline
                    bmeeks
                    last edited by

                    @chudak:

                    Thx for the answer.
                    The only interesting question remains - why this rule problem was unmasked by a snort version upgrade?

                    It wasn't.  I've never seen that error in any of my test virtual machines nor in my personal firewall, and I've upgraded along with every version release.  It is likely a product of the particular rule sets you have enabled.  To be specific, the error is caused by not having the Sensitive Data preprocessor enabled while having an enabled rule that contains a sensitive-date preprocessor keyword (that "sd_pattern" keyword).

                    Does Snort now not run at all, or did it just fail to automatically restart following the initial update?

                    If you can, open the referenced file in the error message using the vi editor and go to line 424.  Paste the entire contents of that line back here so I can examine the failing rule.

                    Bill

                    1 Reply Last reply Reply Quote 0
                    • First post
                      Last post
                    Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.