Hi all!
I am fairly new to Suricata, i was using it on pfSense for a short while but i’ve decided to challenge myself and build a firewall with Almalinux, nftables, unbound, kea-dhcp, openvpn, … and offcourse suricata 7.0.8.
I must note to this I first was using Suricata 7.0.7 provided with by the system repository but changed this to the repository in the manual, the version upgraded without any problems, i mention this because there might be slight differences but i’m not sure.
All goes well for now, the only question/problem that I am having is that i want to configure a drop.conf, i know for sure that single rules based on SID are working because i can see the drop in the fast.log.
However, i want to disable whole groups but this does not seem to work;
My drop.conf list is as follow:
group:emerging-3coresec
group:emerging-ciarmy
group:emerging-compromised
group:emerging-current_events
group:emerging-drop
group:emerging-dshield
group:emerging-dns
group:emerging-botcc
group:emerging-malware
group:emerging-tor
group:emerging-trojan
group:emerging-scan
group:feodotracker
group:sslblacklist_tls_cert# ET INFO Request to Hidden Environment File - Inbound
# 1:2031502# ET WEB_SERVER WebShell Generic - wget http - POST
# 1:2016683# ET EXPLOIT Apache HTTP Server 2.4.49 - Path Traversal Attempt (CVE-2021-41773) M2
# 1:2034125# ET WEB_SERVER /bin/sh In URI Possible Shell Command Execution Attempt
# 1:2011465
all the rules with “group:” as a prefix are not working or not “dropping/blocking”, the single ones with the SID are working or at least that’s what I think if i see the fast.log:
EDIT: while posting this I also notice that rules with # in front are executed?
example single SID above:
Line 1217: 12/23/2024-01:26:09.845835 [wDrop] [] [1:2031502:3] ET INFO Request to Hidden Environment File - Inbound [] [Classification: Misc activity] [Priority: 3] {TCP} 69.16.200.181:65153 → 172.16.1.248:80
However; this one is part of the emerging-scan group and is dropped.
12/23/2024-20:22:42.071227 [wDrop] [] [1:2029054:3] ET SCAN Zmap User-Agent (Inbound) [] [Classification: Detection of a Network Scan] [Priority: 3] {TCP} 172.169.191.217:51478 → 172.16.1.248:443
This one is from the 3CORESec group and is not dropped ?
12/23/2024-19:05:47.197592 [] [1:2525006:1153] ET 3CORESec Poor Reputation IP group 7 [] [Classification: Misc Attack] [Priority: 2] {TCP} 46.19.138.234:42745 → 172.16.1.248:80
I have already run suricata-update and restarted it couple of times without any result, i do see that rules are taking in account to be dropped.
output suricata-update:
23/12/2024 – 20:57:10 - – Loading /etc/suricata/update.yaml
23/12/2024 – 20:57:10 - – Using data-directory /var/lib/suricata.
23/12/2024 – 20:57:10 - – Using Suricata configuration /etc/suricata/suricata.yaml
23/12/2024 – 20:57:10 - – Using /usr/share/suricata/rules for Suricata provided rules.
23/12/2024 – 20:57:10 - – Found Suricata version 7.0.8 at /usr/sbin/suricata.
23/12/2024 – 20:57:10 - – Loading /etc/suricata/disable.conf.
23/12/2024 – 20:57:10 - – Loading /etc/suricata/drop.conf.
23/12/2024 – 20:57:10 - – Loading /etc/suricata/suricata.yaml
23/12/2024 – 20:57:10 - – Disabling rules for protocol pgsql
23/12/2024 – 20:57:10 - – Disabling rules for protocol modbus
23/12/2024 – 20:57:10 - – Disabling rules for protocol dnp3
23/12/2024 – 20:57:10 - – Disabling rules for protocol enip
23/12/2024 – 20:57:10 - – Fetching https://sslbl.abuse.ch/blacklist/ja3_fingerprints.tar.gz.
100% - 3508/3508
23/12/2024 – 20:57:10 - – Done.
23/12/2024 – 20:57:10 - – Fetching https://urlhaus.abuse.ch/downloads/urlhaus_suricata.tar.gz.
100% - 1713078/1713078
23/12/2024 – 20:57:11 - – Done.
23/12/2024 – 20:57:11 - – Fetching https://github.com/travisbgreen/hunting-rules/raw/master/hunting.rule s.tar.gz.
100% - 12007/12007
23/12/2024 – 20:57:11 - – Done.
23/12/2024 – 20:57:11 - – Fetching https://openinfosecfoundation.org/rules/trafficid/trafficid.rules.
100% - 9855/9855
23/12/2024 – 20:57:11 - – Done.
23/12/2024 – 20:57:11 - – Checking https://rules.emergingthreats.net/open/suricata-7.0.8/emerging.rules. tar.gz.md5.
23/12/2024 – 20:57:12 - – Remote checksum has not changed. Not fetching.
23/12/2024 – 20:57:12 - – Fetching https://sslbl.abuse.ch/blacklist/sslipblacklist.tar.gz.
100% - 1442/1442
23/12/2024 – 20:57:12 - – Done.
23/12/2024 – 20:57:12 - – Fetching https://sslbl.abuse.ch/blacklist/sslblacklist_tls_cert.tar.gz.
100% - 397155/397155
23/12/2024 – 20:57:12 - – Done.
23/12/2024 – 20:57:12 - – Fetching https://feodotracker.abuse.ch/downloads/feodotracker.tar.gz.
100% - 305/305
23/12/2024 – 20:57:13 - – Done.
23/12/2024 – 20:57:13 - – Loading distribution rule file /usr/share/suricata/rules/app-layer-events.rules
23/12/2024 – 20:57:13 - – Loading distribution rule file /usr/share/suricata/rules/decoder-events.rules
23/12/2024 – 20:57:13 - – Loading distribution rule file /usr/share/suricata/rules/dhcp-events.rules
23/12/2024 – 20:57:13 - – Loading distribution rule file /usr/share/suricata/rules/dnp3-events.rules
23/12/2024 – 20:57:13 - – Loading distribution rule file /usr/share/suricata/rules/dns-events.rules
23/12/2024 – 20:57:13 - – Loading distribution rule file /usr/share/suricata/rules/files.rules
23/12/2024 – 20:57:13 - – Loading distribution rule file /usr/share/suricata/rules/http2-events.rules
23/12/2024 – 20:57:13 - – Loading distribution rule file /usr/share/suricata/rules/http-events.rules
23/12/2024 – 20:57:13 - – Loading distribution rule file /usr/share/suricata/rules/ipsec-events.rules
23/12/2024 – 20:57:13 - – Loading distribution rule file /usr/share/suricata/rules/kerberos-events.rules
23/12/2024 – 20:57:13 - – Loading distribution rule file /usr/share/suricata/rules/modbus-events.rules
23/12/2024 – 20:57:13 - – Loading distribution rule file /usr/share/suricata/rules/mqtt-events.rules
23/12/2024 – 20:57:13 - – Loading distribution rule file /usr/share/suricata/rules/nfs-events.rules
23/12/2024 – 20:57:13 - – Loading distribution rule file /usr/share/suricata/rules/ntp-events.rules
23/12/2024 – 20:57:13 - – Loading distribution rule file /usr/share/suricata/rules/quic-events.rules
23/12/2024 – 20:57:13 - – Loading distribution rule file /usr/share/suricata/rules/rfb-events.rules
23/12/2024 – 20:57:13 - – Loading distribution rule file /usr/share/suricata/rules/smb-events.rules
23/12/2024 – 20:57:13 - – Loading distribution rule file /usr/share/suricata/rules/smtp-events.rules
23/12/2024 – 20:57:13 - – Loading distribution rule file /usr/share/suricata/rules/ssh-events.rules
23/12/2024 – 20:57:13 - – Loading distribution rule file /usr/share/suricata/rules/stream-events.rules
23/12/2024 – 20:57:13 - – Loading distribution rule file /usr/share/suricata/rules/tls-events.rules
23/12/2024 – 20:57:13 - – Ignoring file 029f98278a177b2c54e8d37841dc5528/rules/emerging-deleted.rules
23/12/2024 – 20:57:20 - – Loaded 139946 rules.
23/12/2024 – 20:57:51 - – Disabled 378 rules.
23/12/2024 – 20:57:51 - – Enabled 0 rules.
23/12/2024 – 20:57:51 - – Modified 0 rules.
23/12/2024 – 20:57:51 - – Dropped 26983 rules.
23/12/2024 – 20:57:52 - – Enabled 136 rules for flowbit dependencies.
23/12/2024 – 20:57:52 - – Backing up current rules.
23/12/2024 – 20:58:01 - – Writing rules to /var/lib/suricata/rules/suricata.rules: total: 139946; enabled: 125631; added: 465; removed 291; modified: 0
23/12/2024 – 20:58:01 - – Writing /var/lib/suricata/rules/classification.config
23/12/2024 – 20:58:02 - – Testing with suricata -T.
I am a bit lost here searching for a solution, hope anyone could point me at my mistake.
Regards,
Steven