• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

Possible Snort IPS/IDS Fail because of a bad Open ET ruleset issue again

Scheduled Pinned Locked Moved IDS/IPS
4 Posts 2 Posters 446 Views
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • J
    JonathanLee
    last edited by Apr 1, 2024, 5:11 AM

    Is anyone else seeing this again?

    Could not initialize the payload_group_full_366 client app element: [string ""]:352: bad argument #1 to 'ipairs' (table expected, got nil)

    Last time this occurred was on Dec 25th

    Make sure to upvote

    1 Reply Last reply Reply Quote 0
    • J
      JonathanLee
      last edited by Apr 1, 2024, 5:24 AM

      @JonathanLee said in Possible Snort IPS/IDS Fail because of a bad Open ET ruleset issue again:

      352

      Line 352

      alert ( msg: "DCE2_EVENT__SMB_CHAIN_OPEN_CLOSE"; sid: 25; gid: 133; rev: 2; metadata: policy max-detect-ips drop, rule-type preproc, service dcerpc ; classtype: bad-unknown; reference:url,msdn.microsoft.com/en-us/library/cc201989.aspx; )

      Make sure to upvote

      1 Reply Last reply Reply Quote 0
      • J
        JonathanLee
        last edited by JonathanLee Jun 29, 2024, 5:58 AM Apr 1, 2024, 5:32 AM

        Screenshot 2024-03-31 at 22.31.07.png

        Make sure to upvote

        1 Reply Last reply Reply Quote 0
        • B
          bmeeks
          last edited by bmeeks Apr 5, 2024, 2:23 AM Apr 5, 2024, 2:21 AM

          The "352" is not a line number in the active rules file in this case. Instead, it is alerting you to an error in the Lua scripting for your OpenAppID rules. Something is wrong in OpenAppID, not in the ET Open ruleset.

          And remember that the Snort binary will always FAIL TO START when it encounters any type of error parsing the supplied rules. This is just the way it was engineered. Suricata will print errors, skip the offending rule, and keep loading the things that are okay. Snort will NOT do that. When it encounters any kind of error, it exits.

          1 Reply Last reply Reply Quote 1
          1 out of 4
          • First post
            1/4
            Last post
          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
            This community forum collects and processes your personal information.
            consent.not_received