• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

[Solved] Snort GPLv2 Community Rules - Unable to download checksum file

Scheduled Pinned Locked Moved IDS/IPS
41 Posts 9 Posters 7.5k Views
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • B
    bmeeks @DefenderLLC
    last edited by Aug 1, 2023, 1:36 PM

    @DefenderLLC said in [Solved] Snort GPLv2 Community Rules - Unable to download checksum file:

    The good news is that your suppression lists should also work too since they seem to use the same format.

    Correct. The format is exactly the same and you can simply copy and paste the text from your Snort lists into Suricata.

    F 1 Reply Last reply Aug 1, 2023, 2:26 PM Reply Quote 2
    • F
      fireodo @bmeeks
      last edited by fireodo Aug 1, 2023, 1:58 PM Aug 1, 2023, 1:49 PM

      @bmeeks

      Thank you very much, Bill, I bookmarked your explanation! (for the future when it becomes necessary - because I doubt that someone will do the work for Snort 3.0)

      Kettop Mi4300YL CPU: i5-4300Y @ 1.60GHz RAM: 8GB Ethernet Ports: 4
      SSD: SanDisk pSSD-S2 16GB (ZFS) WiFi: WLE200NX
      pfsense 2.8.0 CE
      Packages: Apcupsd Cron Iftop Iperf LCDproc Nmap pfBlockerNG RRD_Summary Shellcmd Snort Speedtest System_Patches.

      1 Reply Last reply Reply Quote 0
      • F
        fireodo @bmeeks
        last edited by fireodo Aug 1, 2023, 2:27 PM Aug 1, 2023, 2:26 PM

        @bmeeks said in [Solved] Snort GPLv2 Community Rules - Unable to download checksum file:

        @DefenderLLC said in [Solved] Snort GPLv2 Community Rules - Unable to download checksum file:

        The good news is that your suppression lists should also work too since they seem to use the same format.

        Correct. The format is exactly the same and you can simply copy and paste the text from your Snort lists into Suricata.

        Is there somewhere a file (maybe) where all the "User Forced Disabled Rules" reside? (Not the suppression list)

        Kettop Mi4300YL CPU: i5-4300Y @ 1.60GHz RAM: 8GB Ethernet Ports: 4
        SSD: SanDisk pSSD-S2 16GB (ZFS) WiFi: WLE200NX
        pfsense 2.8.0 CE
        Packages: Apcupsd Cron Iftop Iperf LCDproc Nmap pfBlockerNG RRD_Summary Shellcmd Snort Speedtest System_Patches.

        B 1 Reply Last reply Aug 1, 2023, 2:31 PM Reply Quote 0
        • B
          bmeeks @fireodo
          last edited by Aug 1, 2023, 2:31 PM

          @fireodo said in [Solved] Snort GPLv2 Community Rules - Unable to download checksum file:

          Is there somewhere a file (maybe) where all the "User Forced Disabled Rules" reside? (Not the suppression list)

          No, those live as encoded strings within the config.xml file of pfSense in the <packages><snort> section. And even the Suppress List resides there, but it does get written out as plaintext each time Snort is started. And it is visible as plaintext on the Suppress List edit tab, so it can easily be copied.

          Suricata stores its information the same way. So, if you are handy with recognizing how the XML configuration file of pfSense works, you can do a manual port of those settings.

          F 1 Reply Last reply Aug 1, 2023, 2:34 PM Reply Quote 0
          • F
            fireodo @bmeeks
            last edited by fireodo Aug 1, 2023, 2:44 PM Aug 1, 2023, 2:34 PM

            @bmeeks said in [Solved] Snort GPLv2 Community Rules - Unable to download checksum file:

            @fireodo said in [Solved] Snort GPLv2 Community Rules - Unable to download checksum file:

            Is there somewhere a file (maybe) where all the "User Forced Disabled Rules" reside? (Not the suppression list)

            No, those live as encoded strings within the config.xml file of pfSense in the <packages><snort> section. And even the Suppress List resides there, but it does get written out as plaintext each time Snort is started. And it is visible as plaintext on the Suppress List edit tab, so it can easily be copied.

            Suricata stores its information the same way. So, if you are handy with recognizing how the XML configuration file of pfSense works, you can do a manual port of those settings.

            Aha, OK Thanks - I guess others are also interested in these Informations!

            I found in the config.xml at the coresponding interface:
            <rule_sid_off>{lots of sids}</rule_sid_off>
            I guess thats the place.

            Kettop Mi4300YL CPU: i5-4300Y @ 1.60GHz RAM: 8GB Ethernet Ports: 4
            SSD: SanDisk pSSD-S2 16GB (ZFS) WiFi: WLE200NX
            pfsense 2.8.0 CE
            Packages: Apcupsd Cron Iftop Iperf LCDproc Nmap pfBlockerNG RRD_Summary Shellcmd Snort Speedtest System_Patches.

            1 Reply Last reply Reply Quote 0
            • S
              slu @bmeeks
              last edited by Aug 1, 2023, 2:41 PM

              @bmeeks said in [Solved] Snort GPLv2 Community Rules - Unable to download checksum file:

              At that point Suricata will be the IDS/IPS package on pfSense unless someone else steps up to provide a Snort3 package.

              The problem with Suricata was the missing OpenAppID function, or I'm not up-to-date and there is a solution?

              pfSense Gold subscription

              D B 2 Replies Last reply Aug 1, 2023, 2:47 PM Reply Quote 0
              • D
                DefenderLLC @slu
                last edited by DefenderLLC Aug 1, 2023, 2:51 PM Aug 1, 2023, 2:47 PM

                @slu said in [Solved] Snort GPLv2 Community Rules - Unable to download checksum file:

                @bmeeks said in [Solved] Snort GPLv2 Community Rules - Unable to download checksum file:

                At that point Suricata will be the IDS/IPS package on pfSense unless someone else steps up to provide a Snort3 package.

                The problem with Suricata was the missing OpenAppID function, or I'm not up-to-date and there is a solution?

                Suricata does not have layer 7 capabilities. You will lose OpenAppID functionality if you move away from Snort. This is the only reason I use Snort. I have Snort IPS configured with the "Security" role on the WAN and IDS on the LAN just to see the app flow. The OpenAppID rules don't really get updated all that often, so it's not going to be aware of newer app patterns. I'll keep using Snort until they stop developing subscriber rules for v2.9.

                1 Reply Last reply Reply Quote 0
                • B
                  bmeeks @slu
                  last edited by bmeeks Aug 1, 2023, 5:26 PM Aug 1, 2023, 5:24 PM

                  @slu said in [Solved] Snort GPLv2 Community Rules - Unable to download checksum file:

                  The problem with Suricata was the missing OpenAppID function, or I'm not up-to-date and there is a solution?

                  Suricata does not have an exact analog of OpenAppID. However, there are several rule options in Suricata that could potentially help you duplicate some of the OpenAppID functionality. These rule options (keywords and modifiers) are not present in Snort.

                  The headache with Snort3 is that everything in it has changed from the ground up. It is written in a different programming language, and the internal APIs are all different. That would mean totally rewriting from the ground up the custom blocking module used for Legacy Mode operation on pfSense. The configuration parameters are also quite a bit different now as everything moved to LUA and there is no seamless "transition path" to easily migrate pfSense legacy Snort package settings over to the new Snort3 binary. Not saying it's impossible, but doing so is a ton of work. Most likely a Snort3 package for pfSense would require you to do a green field install without migrating any existing Snort 2.9.x settings.

                  After wrestling with all of the above, I realized that the ONLY thing Snort3 had that Suricata did not was OpenAppID. But in Suricata's favor it offers detailed TLS signature detection, extensive logging, visibility into DNS transactions, and much more. At the end of the day it made more sense to me to continue support for Suricata and not move forward with Snort3.

                  S 1 Reply Last reply Aug 1, 2023, 5:35 PM Reply Quote 1
                  • S
                    slu @bmeeks
                    last edited by Aug 1, 2023, 5:35 PM

                    @bmeeks said in [Solved] Snort GPLv2 Community Rules - Unable to download checksum file:

                    However, there are several rule options in Suricata that could potentially help you duplicate some of the OpenAppID functionality. These rule options (keywords and modifiers) are not present in Snort.

                    Is it possible to post one example?

                    @bmeeks said in [Solved] Snort GPLv2 Community Rules - Unable to download checksum file:

                    At the end of the day it made more sense to me to continue support for Suricata and not move forward with Snort3.

                    In this case it make sense to me moving forward to Suricata.

                    pfSense Gold subscription

                    B 1 Reply Last reply Aug 1, 2023, 5:39 PM Reply Quote 0
                    • B
                      bmeeks @slu
                      last edited by bmeeks Aug 1, 2023, 5:41 PM Aug 1, 2023, 5:39 PM

                      @slu:
                      Here are some links I found on Google that describe using the SSL/TLS keywords:

                      https://forum.suricata.io/t/understanding-tls-sni-rules/1323

                      https://docs.suricata.io/en/suricata-6.0.13/rules/tls-keywords.html

                      You can basically create your own rules (or perhaps find someone offering a downloadable archive) that examine the SNI header for insight into the site the traffic is originating from or destined for. This is fundamentally what the OpenAppID feature in Snort does.

                      1 Reply Last reply Reply Quote 1
                      • D
                        DefenderLLC
                        last edited by DefenderLLC Aug 1, 2023, 9:08 PM Aug 1, 2023, 9:04 PM

                        The community rules are back: https://www.snort.org/downloads#rules

                        8605de56-d4d6-4bcf-96c9-7f5c69e34db9-image.png

                        69f04bea-f17a-43e5-806d-659d0ca1d198-image.png

                        1 Reply Last reply Reply Quote 0
                        41 out of 41
                        • First post
                          41/41
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
                          This community forum collects and processes your personal information.
                          consent.not_received