Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    (RESOLVED!!!) WARNING!! Emerging Threats Dshield rule set is now empty inside Snort and on Emerging Threats official website

    Scheduled Pinned Locked Moved IDS/IPS
    41 Posts 5 Posters 3.8k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • JonathanLeeJ
      JonathanLee
      last edited by JonathanLee

      Has anyone else noticed that the Emerging Threats Dshield rules are now empty on their website and inside of Snort when it updates?

      Screenshot 2022-12-29 at 12.40.46 PM.png

      Does anyone know what happened to the IDS IPS rules?

      Make sure to upvote

      JonathanLeeJ S 3 Replies Last reply Reply Quote 0
      • JonathanLeeJ
        JonathanLee @JonathanLee
        last edited by

        @jonathanlee

        Screenshot 2022-12-29 at 12.42.47 PM.png

        Make sure to upvote

        JonathanLeeJ 1 Reply Last reply Reply Quote 0
        • JonathanLeeJ
          JonathanLee @JonathanLee
          last edited by

          @jonathanlee

          Screenshot 2022-12-29 at 12.43.32 PM.png

          Is there some issue with their server?

          Make sure to upvote

          JonathanLeeJ 1 Reply Last reply Reply Quote 0
          • JonathanLeeJ
            JonathanLee @JonathanLee
            last edited by

            @jonathanlee I have enabled CIARMY rules as a replacement ruleset for dshield if anyone else used this rule as a primary IPS/IDS rule

            Screenshot 2022-12-29 at 12.50.38 PM.png

            Make sure to upvote

            JonathanLeeJ 1 Reply Last reply Reply Quote 0
            • JonathanLeeJ
              JonathanLee @JonathanLee
              last edited by JonathanLee

              @jonathanlee
              WARNING!!
              Please note this is also now seen when you visit the ruleset website !! Could be a false positive.

              Screenshot 2022-12-29 at 12.56.59 PM.png
              (Image: ClamAV sees a tool packed for ET website hosting the Dshield ruleset)

              Screenshot 2022-12-29 at 12.59.45 PM.png
              (Image: Virus total check)

              Make sure to upvote

              1 Reply Last reply Reply Quote 0
              • S
                SteveITS Galactic Empire @JonathanLee
                last edited by

                @jonathanlee pfBlockerNG has it under the ISC_Block name, which has content: https://isc.sans.edu/block.txt. That file also references URL http://feeds.dshield.org/block.txt.

                Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
                Upvote 👍 helpful posts!

                JonathanLeeJ 1 Reply Last reply Reply Quote 1
                • JonathanLeeJ
                  JonathanLee @SteveITS
                  last edited by

                  @steveits said in WARNING!! Emerging Threats Dshield rule set is now empty inside Snort and on Emerging Threats official website:

                  http://feeds.dshield.org/block.txt

                  Thanks for the reply,

                  Do you know how do I change the url referenced automagically by Snort?

                  Make sure to upvote

                  S 1 Reply Last reply Reply Quote 0
                  • S
                    SteveITS Galactic Empire @JonathanLee
                    last edited by

                    @jonathanlee I do not, sorry. For block lists we use pfBlocker and hence firewall rules instead of packet matching.

                    Side note: running on WAN, Snort will inspect every arriving packet even if disallowed by the firewall. On LAN it will also show LAN device IPs in alerts.

                    Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                    When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
                    Upvote 👍 helpful posts!

                    JonathanLeeJ 1 Reply Last reply Reply Quote 1
                    • JonathanLeeJ
                      JonathanLee @SteveITS
                      last edited by JonathanLee

                      @steveits I found a way

                      custom is hidden at the bottom of the rulesets

                      be226ea8-e412-4299-a8bd-703ddfdb2210-image.png

                      Just copy and paste in the rules needed. Again, the ones that are no longer listed are emergining-dshield rulesets. Your list is the default block list that is a different ruleset.

                      00a6ad56-4bfa-44a5-8d91-7b225eddf2b8-image.png
                      (Image useable ruleset that does not load automatically)

                      1b9dc390-df00-4bbf-adab-ef6359e79444-image.png
                      (Image plugged in)

                      5e2f8c5a-850f-4c9b-8e65-c1ae6c441495-image.png

                      http://rules.emergingthreats.net/blockrules/

                      There are many rulesets categories that are not loading you can add to custom if needed.

                      I learn something new every day on this thing.

                      Make sure to upvote

                      JonathanLeeJ S 2 Replies Last reply Reply Quote 0
                      • bmeeksB
                        bmeeks
                        last edited by bmeeks

                        Suricata also allows you to enter an unlimited number of custom rules download URLs on the GLOBAL SETTINGS tab. So, you can easily enter the complete rule download URL there and they will be constantly updated by the cron task just like the other already included rules.

                        You don't have to use the Custom Rules option for this, but you can if you want to.

                        JonathanLeeJ 1 Reply Last reply Reply Quote 1
                        • JonathanLeeJ
                          JonathanLee @JonathanLee
                          last edited by JonathanLee

                          @jonathanlee

                          0634a284-bb62-4b9a-8cf1-5008d6e3457f-image.png

                          (Image: Custom Rules now generating alerts)

                          ced836fc-0d37-4eb3-a0cd-2356da25da38-image.png
                          (Image: Custom Rules not generating blocks)

                          581bbd87-4721-476d-955b-865c5c28fc5f-image.png
                          (Image: Ruleset source is inside of the custom rules that were just loaded)

                          3CORESEC OPEN RULES LOADED:
                          This was loaded via custom option inside Snort for Pfsense

                          Make sure to upvote

                          1 Reply Last reply Reply Quote 0
                          • S
                            SteveITS Galactic Empire @JonathanLee
                            last edited by

                            @jonathanlee Did you already email support@emergingthreats.net from the feed file?

                            Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                            When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
                            Upvote 👍 helpful posts!

                            JonathanLeeJ 2 Replies Last reply Reply Quote 1
                            • JonathanLeeJ
                              JonathanLee @bmeeks
                              last edited by

                              @bmeeks I wonder if Snort has a URL option that you can use inside of the custom area.

                              Make sure to upvote

                              bmeeksB 1 Reply Last reply Reply Quote 0
                              • bmeeksB
                                bmeeks @JonathanLee
                                last edited by

                                @jonathanlee said in WARNING!! Emerging Threats Dshield rule set is now empty inside Snort and on Emerging Threats official website:

                                @bmeeks I wonder if Snort has a URL option that you can use inside of the custom area.

                                No, Snort does not currently have a custom URL option like Suricata.

                                1 Reply Last reply Reply Quote 0
                                • JonathanLeeJ
                                  JonathanLee @SteveITS
                                  last edited by JonathanLee

                                  @steveits Yes I emailed the yesterday, they may have disabled that ruleset for some unknown reason. If not, I did email them that it is blank, they might have moved it to pro.

                                  f5371a69-ab93-4f75-b8e9-107a745683b9-image.png

                                  Make sure to upvote

                                  1 Reply Last reply Reply Quote 0
                                  • JonathanLeeJ
                                    JonathanLee @SteveITS
                                    last edited by

                                    @steveits

                                    They have just replied, they are looking into the issue,

                                    dc85ccd6-3ddf-4e83-a0fd-c975b5c9cca4-image.png

                                    I guess it was not the intention to disable that feed. I am glad they are looking into it. I wonder what happened? Some rulesets have been blank for some time now I started wondering about it when the alarms stopped coming in.

                                    Make sure to upvote

                                    1 Reply Last reply Reply Quote 0
                                    • JonathanLeeJ
                                      JonathanLee @JonathanLee
                                      last edited by

                                      @jonathanlee

                                      This is officially resolved per Emerging Threats Support ETA next release

                                      Screenshot 2022-12-30 at 10.45.38 AM.png

                                      Make sure to upvote

                                      M 1 Reply Last reply Reply Quote 1
                                      • M
                                        michmoor LAYER 8 Rebel Alliance @JonathanLee
                                        last edited by

                                        @jonathanlee Nice !
                                        Curious, why not use pfblocker for the IP blocking you need?

                                        Firewall: NetGate,Palo Alto-VM,Juniper SRX
                                        Routing: Juniper, Arista, Cisco
                                        Switching: Juniper, Arista, Cisco
                                        Wireless: Unifi, Aruba IAP
                                        JNCIP,CCNP Enterprise

                                        JonathanLeeJ 1 Reply Last reply Reply Quote 0
                                        • JonathanLeeJ
                                          JonathanLee @michmoor
                                          last edited by JonathanLee

                                          @michmoor I like Snort's IDS (Intrusion Detection System) and IPS (Intrusion Prevention System) software. I had snort software as a kid when it was a wireless scanner software much like Wireshark, it has much improved over the days of the late 90s early 2000s. It use to be called AirSnort!!

                                          Screenshot 2022-12-30 at 11.39.02 AM.png

                                          Anyway fast forward to today. I like that it will scan and use emerging threats and has auto updated rule sets. I use Squid Proxy it just works well, it even stops Nmap scans cold in their tracks. I have never used pfblocker, with HTTPS over 443 DoH all over the place total reliance on a DNS based version kind of worries me. With use of Squid it uses HTTP headers so you can see if something is port jumping to a new DoH server. Plus I have it working with HTTPS for SSL so Clam Av works for HTTP and HTTPS on it. It did take me some time to get to working with the configuration, however it blocks and protects now. I can see in the logs huge lists of items blocked or viruses stopped over the proxy.

                                          I have never used pfBlocker why do you like that one? Got any screen shots?

                                          Screenshot 2022-12-30 at 11.45.19 AM.png

                                          (Image: 50 items over the last 1 hour blocked)

                                          Screenshot 2022-12-30 at 11.46.12 AM.png

                                          (Image: Caches UDP scans even)

                                          Screenshot 2022-12-30 at 11.47.28 AM.png

                                          Screenshot 2022-12-30 at 11.50.15 AM.png

                                          (Image: ClamAV viruses caught last couple days over HTTPS)

                                          Yes they have some false positives, again that means it is working. The fine tuning takes some time. I have never seen pfBlocking yet, I should check it out.

                                          Make sure to upvote

                                          S 1 Reply Last reply Reply Quote 0
                                          • bmeeksB
                                            bmeeks
                                            last edited by bmeeks

                                            For just plain IP blocking, a package such as pfBlockerNG-devel is more efficient than Snort or Suricata. For content inspection, you must use an IDS/IPS package. But remember that end-to-end encryption can severely cripple an IDS/IPS. That being said, some features of IDS/IPS are still useable to some degree -- for example, the OpenAppID feature of Snort.

                                            And if you do MITM SSL termination, then an IDS/IPS can be very useful for payload inspection. But there is quite a bit of extra work involved with MITM setup.

                                            I will say, that for IP-only rules, Suricata can also be quite efficient. That's because when it identifies and sorts rules based on that criteria, there is very limited packet inspection. It simply checks the IP address and makes a quick decision. So, for IP-only rules, Suricata will be nearly as efficient as the firewall itself. An IP-only rule is one where there is no payload content matching specified in the rule.

                                            JonathanLeeJ M 2 Replies Last reply Reply Quote 1
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.