Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Suricata Missing Rule Signatures

    Scheduled Pinned Locked Moved IDS/IPS
    7 Posts 2 Posters 1.0k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • N
      newUser2pfSense
      last edited by newUser2pfSense

      I installed a fresh version of pfSense 2.4.5-RELEASE (amd64). I installed Suricata, at the time I believe was 5.0.x.; I'm now on 5.0.2_2. I noticed I was being pinged by the following rule signatures:

      ET COMPROMISED Known Compromised or Hostile Host Traffic group 30
      ET COMPROMISED Known Compromised or Hostile Host Traffic group 31

      I went to Services > Suricata > Interfaces tab and opened the interface. I went to the Available Rules Categories section > Category > Active Rules and found the offending rule signatures. I then dropped them. Some time later, I checked the Active Rules again and noticed that the two rule signatures are no longer there. Is this normal? Any ideas why they went missing? Thank you.

      1 Reply Last reply Reply Quote 0
      • bmeeksB
        bmeeks
        last edited by bmeeks

        IF you disabled them, then they will not show up in Active Rules. That's the whole point of disabling them.

        Another question would be why did you disable them? Those rules are composed of lists of IP addresses of known compromised hosts (in other words, usually bad guys up to no good). You would usually want to see those alerts, especially if a LAN host is talking to an IP on one of those lists.

        If you want to see those rules, you should go to the CATEGORIES tab for the interface, find the correct category (probably ET-CIARMY or ET-DSHIELD) and you should find the SIDs and the rule text in one of those.

        The "Active Rules" category is actually on the INTERFACES > RULES tab and represents the entire list of currently loading Suricata rules (meaning those that are active in RAM and being used to scan traffic).

        1 Reply Last reply Reply Quote 0
        • N
          newUser2pfSense
          last edited by

          I'm not sure if we are using the same terminology or not but I chose to "DROP" the rule from here -
          drop rule.png

          It was my understanding that if I chose drop as the rule action, the packets on that interface would be dropped [the Alerts tab] -
          drop triggered.pngI have an example of this that actually works. Every signature that I chose to drop is highlighted in red except for a sporadic signature from a Category that pops up now and again.

          I thought maybe when Suricata updated itself, it removed those two rule signatures. Just a guess though.

          bmeeksB 1 Reply Last reply Reply Quote 0
          • bmeeksB
            bmeeks @newUser2pfSense
            last edited by bmeeks

            @newUser2pfSense said in Suricata Missing Rule Signatures:

            I'm not sure if we are using the same terminology or not but I chose to "DROP" the rule from here -
            drop rule.png

            It was my understanding that if I chose drop as the rule action, the packets on that interface would be dropped [the Alerts tab] -
            drop triggered.pngI have an example of this that actually works. Every signature that I chose to drop is highlighted in red except for a sporadic signature from a Category that pops up now and again.

            I thought maybe when Suricata updated itself, it removed those two rule signatures. Just a guess though.

            Suricata itself will not remove rules, but the rules vendors (Snort Subscriber Rules team or the Emerging Threats team) can and do frequently update individual rules in their packages. They may remove rules, edit their content, or add new rules. They may also decide to leave a given rule in their package but comment it out so that it is not "enabled". Perhaps that happened with the rules you are asking about. You can get the SID from previous alerts (if you still have access to them in the log) and look up the SID on the vendor's site. The rules you mentioned would have come from Emerging Threats.

            Reading your post again leads me to think maybe you are asking me another question. Did you, in the recent past, make a change to the action for these rules? From your description I could also theorize that you may have a second "zombie" Suricata process running on that interface. If so, that instance would not be controllable from the GUI and thus any changes made to rules would not impact that zombie process. But the zombie process can still generate alerts. If this is your issue, then you will need to stop Suricata using the GUI icons on the INTERFACES tab. Then open a shell prompt on the firewall and issue the following command to see if any running Suricata process still shows up --

            ps -ax | grep suricata
            

            If you still see a running process, note its process ID <pid> and kill it using this command --

            kill -9 <pid>
            

            Then go to the GUI and restart your Suricata process from there.

            1 Reply Last reply Reply Quote 0
            • N
              newUser2pfSense
              last edited by

              I can see the rules vendors updating their rules which I would guess is why those two signatures were removed.

              As far as a zombie Suricata process running, I'm running Suricata on three interfaces and I get the following from the command:

              Ss 0:18.26 /usr/local/bin/suricata --netmap -D -c /usr/local/etc/s
              Ss 0:18.60 /usr/local/bin/suricata --netmap -D -c /usr/local/etc/s
              S 0:00.00 sh -c ps -ax | grep suricata 2>&1
              S 0:00.00 grep suricata
              Ss 0:17.41 /usr/local/bin/suricata --netmap -D -c /usr/local/etc/s

              It looks like Suricata is running on three interfaces; no zombie Suricata processes.

              bmeeksB 1 Reply Last reply Reply Quote 0
              • bmeeksB
                bmeeks @newUser2pfSense
                last edited by

                @newUser2pfSense said in Suricata Missing Rule Signatures:

                I can see the rules vendors updating their rules which I would guess is why those two signatures were removed.

                As far as a zombie Suricata process running, I'm running Suricata on three interfaces and I get the following from the command:

                Ss 0:18.26 /usr/local/bin/suricata --netmap -D -c /usr/local/etc/s
                Ss 0:18.60 /usr/local/bin/suricata --netmap -D -c /usr/local/etc/s
                S 0:00.00 sh -c ps -ax | grep suricata 2>&1
                S 0:00.00 grep suricata
                Ss 0:17.41 /usr/local/bin/suricata --netmap -D -c /usr/local/etc/s

                It looks like Suricata is running on three interfaces; no zombie Suricata processes.

                Correct. If you are running Suricata on three interfaces you can expect to find three running Suricata instances. A "zombie" would have shown up as a complete duplicate line of one of those, so for example two identical lines. In that case you would know you have a "zombie". Those can happen in some rare situations due to the way some events can cause pfSense to issue several "restart all packages" commands in quick succession.

                1 Reply Last reply Reply Quote 0
                • N
                  newUser2pfSense
                  last edited by

                  Thanks for the great explanations Bill. I appreciate your time.

                  1 Reply Last reply Reply Quote 0
                  • First post
                    Last post
                  Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.