Problem with NORD-VPN-Client and Suricata
-
@bmeeks Thank you for your reply.
Rules like this?
pass ip 192.168.1.39 any <> any any
pass any any <> ip 192.168.1.39 anyI will give it a try, thanks again.
-
@Bob-Dig said in Problem with NORD-VPN-Client and Suricata:
@bmeeks Thank you for your reply.
Rules like this?
pass ip 192.168.1.39 any <> any any
pass any any <> ip 192.168.1.39 anyI will give it a try, thanks again.
Those rules should suffice, but there is a typo in your second rule. The protocol (in this case, "ip") always goes immediately after the action. So the second rule needs to read this way:
pass ip any any <> 192.168.1.39 any
-
@bmeeks Thanks again, Bill. Seems to work fine now!
-
@Bob-Dig said in Problem with NORD-VPN-Client and Suricata:
@bmeeks Thanks again, Bill. Seems to work fine now!
Glad it works for you. PASS rules are evaluated first, and if traffic matches a PASS rule, no further inspection is done by Suricata. The packet is unconditionally allowed if it matches a PASS rule. So be careful with those kinds of rules because it is easy to unintentionally render Suricata "toothless" if you were, for example, to construct a PASS rule that was too broad in which IP addresses it permitted.
-
I saw this today
although I had made exceptions
Did I missed something?
-
Also Suricata randomly(?) stops. But it is the first time I installed the Snort free Registered User rules (-29141)...
-
@Bob-Dig said in Problem with NORD-VPN-Client and Suricata:
I saw this today
although I had made exceptions
Did I missed something?
I am going to assume those 192.168.1.x addresses are from a locally-attached subnet and thus form your LAN or another local network. If true, they were not blocked because of the default Pass List.
With Legacy Mode blocking (which I see you are using), you really can't use PASS rules like that. That's because the traffic (even when passed) still routes through the logging plugins and the custom blocking module used on pfSense registers as a logging plugin. So it will see the traffic and potentially can block.
To do what you want, you need to switch your Legacy Mode option to "Block DROPS Only". That's a checkbox in the Blocking Configuration section of the INTERFACE SETTINGS tab. Then you need to implement a SID MGMT tab strategy to change the rules you want to block to DROP and leave others as ALERT. In that mode, the custom blocking module will only block for rules which have DROP as the rule action.
-
@Bob-Dig said in Problem with NORD-VPN-Client and Suricata:
Also Suricata randomly(?) stops. But it is the first time I installed the Snort free Registered User rules (-29141)...
Check the system log and the
suricata.log
file. Thesuricata.log
file can be viewed on the LOGS VIEW tab. There should be something in one of those logs to offer a hint. Don't restart Suricata until you check the log files. Thesuricata.log
file is overwritten each time Suricata starts.Make sure you do NOT use the Service Watchdog package with Suricata (nor with Snort). That package does not understand how to properly monitor the IDS/IPS packages on multiple interfaces and it does not correctly account for automatic restarts performed by the IDS/IPS packages upon rules updates. In short, just DO NOT use Service Watchdog with Suricata or Snort. You may not be doing that, but I mention it because I've run across folks doing that many times in the past.
-
@bmeeks said in Problem with NORD-VPN-Client and Suricata:
I am going to assume those 192.168.1.x addresses are from a locally-attached subnet and thus form your LAN or another local network. If true, there were not blocked because of the default Pass List.
With Legacy Mode blocking (which I see you are using), you really can't use PASS rules like that. That's because the traffic (even when passed) still routes through the logging plugins and the custom blocking module used on pfSense registers as a logging plugin. So it will see the traffic and potentially can block.
To do what you want, you need to switch your Legacy Mode option to "Block DROPS Only". That's a checkbox in the Blocking Configuration section of the INTERFACE SETTINGS tab. Then you need to implement a SID MGMT tab strategy to change the rules you want to block to DROP and leave others as ALERT. In that mode, the custom blocking module will only block for rules which have DROP as the rule action.
Ok, that looks to complicate for me.
Don't restart Suricata until you check the log files. The suricata.log file is overwritten each time >Suricata starts.
I will have a closer look next time, thanks as always.
-
@Bob-Dig said in Problem with NORD-VPN-Client and Suricata:
Ok, that looks to complicate for me.
It's not that hard, but in your case an easier solution would be to disable those ET User-Agent rules. Or at least disable those particular ones triggering on the Microsoft traffic. Lots of those rule categories are going to generate false positives. This is particularly true in a home network. And even with most small business networks those kinds of rules serve to generate more trouble than protection.
Look at the alerts you posted in the screen capture. They are just from normal Microsoft telemetry data the OS sends home to the mothership. All in all it's harmless. You can attempt to block it, but it's going to cause issues and likely break stuff in strange ways within Windows.