Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Important Snort and Suricata Package Announcement -- probable bug in Legacy Blocking Module

    Scheduled Pinned Locked Moved IDS/IPS
    82 Posts 15 Posters 18.4k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • Bob.DigB
      Bob.Dig LAYER 8 @bmeeks
      last edited by Bob.Dig

      @bmeeks Checked. The only thing of note, I block only for 15 mins, so right now there are "only" 33 blocks and no snort-rules.
      suricata 7.0.2

      Cool_CoronaC Bob.DigB 2 Replies Last reply Reply Quote 1
      • Cool_CoronaC
        Cool_Corona @Bob.Dig
        last edited by

        @Bob-Dig Run it "infinete" and you will see :)

        1 Reply Last reply Reply Quote 0
        • Bob.DigB
          Bob.Dig LAYER 8 @Bob.Dig
          last edited by Bob.Dig

          @Bob-Dig said in Important Snort and Suricata Package Announcement -- probable bug in Legacy Blocking Module:

          I block only for 15 mins, so right now there are "only" 33 blocks and no snort-rules.
          suricata 7.0.2

          Run it over night, still no problem, will stop it now.

          fireodoF 1 Reply Last reply Reply Quote 0
          • fireodoF
            fireodo @Bob.Dig
            last edited by

            @Bob-Dig said in Important Snort and Suricata Package Announcement -- probable bug in Legacy Blocking Module:

            Run it over night, still no problem, will stop it now.

            Probably, in your case, the second condition (kill states is the main one) is not occurring (considering Bill Meeks theory) so there is no crash ... 🤔

            Kettop Mi4300YL CPU: i5-4300Y @ 1.60GHz RAM: 8GB Ethernet Ports: 4
            SSD: SanDisk pSSD-S2 16GB (ZFS) WiFi: WLE200NX
            pfsense 2.8.0 CE
            Packages: Apcupsd, Cron, Iftop, Iperf, LCDproc, Nmap, pfBlockerNG, RRD_Summary, Shellcmd, Snort, Speedtest, System_Patches.

            Bob.DigB 1 Reply Last reply Reply Quote 0
            • Bob.DigB
              Bob.Dig LAYER 8 @fireodo
              last edited by

              @fireodo My theory is, it is a snort problem, not suricata. Let's see.

              fireodoF 1 Reply Last reply Reply Quote 0
              • fireodoF
                fireodo @Bob.Dig
                last edited by

                @Bob-Dig said in Important Snort and Suricata Package Announcement -- probable bug in Legacy Blocking Module:

                @fireodo My theory is, it is a snort problem, not suricata. Let's see.

                👍

                Kettop Mi4300YL CPU: i5-4300Y @ 1.60GHz RAM: 8GB Ethernet Ports: 4
                SSD: SanDisk pSSD-S2 16GB (ZFS) WiFi: WLE200NX
                pfsense 2.8.0 CE
                Packages: Apcupsd, Cron, Iftop, Iperf, LCDproc, Nmap, pfBlockerNG, RRD_Summary, Shellcmd, Snort, Speedtest, System_Patches.

                G 1 Reply Last reply Reply Quote 0
                • S
                  slu @bmeeks
                  last edited by

                  @bmeeks

                  don't see such an issue on my two 2.7.0 CE boxes:
                  2.7.0 CE
                  Snort 4.1.6_13
                  Legacy Mode
                  Kill States enabled

                  pfSense Gold subscription

                  1 Reply Last reply Reply Quote 0
                  • G
                    Gblenn @fireodo
                    last edited by Gblenn

                    I have Suricata running in Legacy mode at two different sites, (2.7.0 and 23.09). Both with Kill States enabled and no problems whatsoever...

                    Bob.DigB 1 Reply Last reply Reply Quote 0
                    • Bob.DigB
                      Bob.Dig LAYER 8 @Gblenn
                      last edited by

                      @slu Do you have actually blocks?

                      G S 3 Replies Last reply Reply Quote 0
                      • G
                        Gblenn @Bob.Dig
                        last edited by Gblenn

                        @Bob-Dig Yes I do, and I have the Remove Blocked Hosts Interval set to 1h but could change it to something higher if that would have an effect?
                        Up until a few days ago I have had the 23.09 site set up with Block on DROP Only NOT being checked. Meaning I had every single Alert resulting in a Block and basically having built up a Passlist that works for me. As a result I would usually see quite a long list in the Blocks tab. Most of them ET INFO actually, but still blocks.
                        The 2.7.0 site is also set up this way, but it's for our vacation home so not much going on there at the moment.

                        1 Reply Last reply Reply Quote 0
                        • S
                          slu @Bob.Dig
                          last edited by

                          @Bob-Dig
                          good point, no, not at the moment.

                          pfSense Gold subscription

                          G 1 Reply Last reply Reply Quote 0
                          • G
                            Gblenn @slu
                            last edited by

                            @slu said in Important Snort and Suricata Package Announcement -- probable bug in Legacy Blocking Module:

                            @Bob-Dig
                            good point, no, not at the moment.

                            😊 Ah, that was a question to you obviously...

                            1 Reply Last reply Reply Quote 0
                            • S
                              slu @Bob.Dig
                              last edited by

                              @Bob-Dig said in Important Snort and Suricata Package Announcement -- probable bug in Legacy Blocking Module:

                              @slu Do you have actually blocks?

                              You are right, searching in the logs and found it:

                              Nov 15 06:47:55 	kernel 		pid 44159 (snort), jid 0, uid 0: exited on signal 11 (core dumped)
                              

                              pfSense Gold subscription

                              Bob.DigB 1 Reply Last reply Reply Quote 0
                              • Bob.DigB
                                Bob.Dig LAYER 8 @slu
                                last edited by Bob.Dig

                                @slu said in Important Snort and Suricata Package Announcement -- probable bug in Legacy Blocking Module:

                                You are right, searching in the logs and found it:

                                👍

                                I didn't searched in the logs. I think, it will disable IPS on that interface and is easy to spot in the GUI? At least I hope.

                                1 Reply Last reply Reply Quote 0
                                • J
                                  johnpitton
                                  last edited by

                                  I have a few Netgate 7100 units all running 23.09 with Snort VRT rules in legacy Blocking mode and Kill State enabled with 7 days blocking set.
                                  They've been at this 23.09 ver for almost a week now and stable.
                                  All of them have active blocks listed.
                                  I checked and verified SNORT rulesets have been updating successfully.
                                  I don't see in any of the logs any signal 11 core dumps logged.

                                  bmeeksB 1 Reply Last reply Reply Quote 0
                                  • bmeeksB
                                    bmeeks @johnpitton
                                    last edited by bmeeks

                                    @johnpitton said in Important Snort and Suricata Package Announcement -- probable bug in Legacy Blocking Module:

                                    I have a few Netgate 7100 units all running 23.09 with Snort VRT rules in legacy Blocking mode and Kill State enabled with 7 days blocking set.
                                    They've been at this 23.09 ver for almost a week now and stable.
                                    All of them have active blocks listed.
                                    I checked and verified SNORT rulesets have been updating successfully.
                                    I don't see in any of the logs any signal 11 core dumps logged.

                                    What version of the Snort package is installed on your box? Look under SYSTEM > PACKAGE MANAGER and post back the version shown there. There has been an issue with the package builder for 23.09, so my understanding is that some of the most recent package updates have not been deployed in that branch.

                                    J 1 Reply Last reply Reply Quote 0
                                    • J
                                      johnpitton @bmeeks
                                      last edited by

                                      @bmeeks
                                      Screenshot 2023-11-16 at 09.37.23.png

                                      bmeeksB 1 Reply Last reply Reply Quote 0
                                      • bmeeksB
                                        bmeeks @johnpitton
                                        last edited by bmeeks

                                        @johnpitton said in Important Snort and Suricata Package Announcement -- probable bug in Legacy Blocking Module:

                                        @bmeeks
                                        Screenshot 2023-11-16 at 09.37.23.png

                                        Yes, that is the older version of the package. Current is now 4.1.6_13 for the GUI and 2.9.20_5 for the associated binary. The newer package is held up currently for 23.09 because of a different problem with the package builder backend. In your case, I would advise sticking with the version you have until we find and squash the bug introduced in the newest package.

                                        Thank you for this data point. It is helpful in my troubleshooting to isolate the new bug. The code change which appears to have introduced the bug happened with the 2.9.20_4 version of the Snort binary.

                                        1 Reply Last reply Reply Quote 0
                                        • bmeeksB
                                          bmeeks
                                          last edited by bmeeks

                                          I think I may have found the Signal 11 core dump bug. If I am correct, it's actually in the FreeBSD libpfctl library and not directly in the Snort code. I'm waiting on the Netgate kernel developer I'm working with to either confirm my finding or show me where I went off track analyzing the library code ☺.

                                          fireodoF 1 Reply Last reply Reply Quote 4
                                          • fireodoF
                                            fireodo @bmeeks
                                            last edited by

                                            @bmeeks said in Important Snort and Suricata Package Announcement -- probable bug in Legacy Blocking Module:

                                            If I am correct, it's actually in the FreeBSD libpfctl library and not directly in the Snort code.

                                            Just out of curiosity: that could be corrected by rebuilding and replacing that library or there would be necessary a new pfsense revision?

                                            Kettop Mi4300YL CPU: i5-4300Y @ 1.60GHz RAM: 8GB Ethernet Ports: 4
                                            SSD: SanDisk pSSD-S2 16GB (ZFS) WiFi: WLE200NX
                                            pfsense 2.8.0 CE
                                            Packages: Apcupsd, Cron, Iftop, Iperf, LCDproc, Nmap, pfBlockerNG, RRD_Summary, Shellcmd, Snort, Speedtest, System_Patches.

                                            bmeeksB 1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.