OK I tested those other two realtek cards and same problem.
Further verified when I quickly switch my PC’s connection from one interface to another it seems to mess with the unbound service so I think that might be unrelated.
When running speed test and interface becomes unresponsive, on the NIC itself it still shows LINK but no flashing ACT light. Looked at pfsense system log and suricata log and can’t see anything. I’ll post a bit of each.
However my suricata log does have some warnings/errors related to rules when starting up, this shouldn’t be a problem right? As mentioned I can disable all the rules (even built in suricata rules) and the problem still occurs with no rules set.
Here’s some of my system log. Log was cleared, then speed test webpage was loaded at around 18:50. Note the DHCP and ARP errors, I don’t usually see those, I think those are because just before this I was switching the cable to a different interface. I ran the speed test at 22:19. No message at all when it stalled out. After that I disconnect from OPT2 and connect to LAN.
Dec 24 22:21:07 |
php-fpm |
97667 |
/rc.linkup: Hotplug event detected for LAN(lan) static IP (192.168.1.1 ) |
Dec 24 22:21:06 |
kernel |
|
re2: link state changed to UP |
Dec 24 22:21:06 |
check_reload_status |
420 |
Linkup starting re2 |
Dec 24 22:21:05 |
check_reload_status |
420 |
Reloading filter |
Dec 24 22:21:05 |
php-fpm |
381 |
/rc.linkup: Hotplug event detected for OPT2(opt2) static IP (192.168.6.1 ) |
Dec 24 22:21:04 |
kernel |
|
re0: link state changed to DOWN |
Dec 24 22:21:04 |
check_reload_status |
420 |
Linkup starting re0 |
Dec 24 22:18:55 |
dhcpleases |
43615 |
Could not deliver signal HUP to process 13848: No such process. |
Dec 24 22:18:51 |
php-fpm |
382 |
/status_logs_settings.php: The command ‘/usr/sbin/arp -s ‘192.168.1.41’ ‘e4:5f:01:2b:8e:51’’ returned exit code ‘1’, the output was ‘arp: writing to routing socket: Cannot allocate memory’ |
Dec 24 22:18:50 |
syslogd |
|
kernel boot file is /boot/kernel/kernel |
Here is the suricata log. This is at a different time. But after stalling the interface, I connected to a different interface to check the suricata log. This is all it showed, all of this was during suricata startup and after it says engine started then nothing else logged for the crash.
24/12/2022 – 22:22:57 - – This is Suricata version 6.0.4 RELEASE running in SYSTEM mode
24/12/2022 – 22:22:57 - – CPUs/cores online: 16
24/12/2022 – 22:22:57 - – HTTP memcap: 671088640
24/12/2022 – 22:22:57 - – Netmap: Setting IPS mode
24/12/2022 – 22:22:57 - – fast output device (regular) initialized: alerts.log
24/12/2022 – 22:22:57 - – http-log output device (regular) initialized: http.log
24/12/2022 – 22:22:57 - – stats output device (regular) initialized: stats.log
24/12/2022 – 22:22:57 - – Syslog output initialized
24/12/2022 – 22:23:07 - – [ERRCODE: SC_ERR_INVALID_SIGNATURE(39)] - previous keyword has a fast_pattern:only; set. Can’t have relative keywords around a fast_pattern only content
24/12/2022 – 22:23:07 - – [ERRCODE: SC_ERR_INVALID_SIGNATURE(39)] - error parsing signature “drop tcp $EXTERNAL_NET $HTTP_PORTS → $HOME_NET any (msg:“MALWARE-OTHER Win.Trojan.Zeus Spam 2013 dated zip/exe HTTP Response - potential malware download”; flow:to_client,established; content:”-2013.zip|0D 0A|“; fast_pattern:only; content:”-2013.zip|0D 0A|“; http_header; content:”-“; within:1; distance:-14; http_header; file_data; content:”-2013.exe"; content:“-”; within:1; distance:-14; metadata:impact_flag red, policy balanced-ips drop, policy max-detect-ips drop, policy security-ips drop, ruleset community, service http; reference:url,VirusTotal; classtype:trojan-activity; sid:26470; rev:2;)" from file /usr/local/etc/suricata/suricata_47420_re0/rules/suricata.rules at line 31620
24/12/2022 – 22:23:08 - – [ERRCODE: SC_ERR_INVALID_SIGNATURE(39)] - depth or urilen 11 smaller than content len 17
24/12/2022 – 22:23:08 - – [ERRCODE: SC_ERR_INVALID_SIGNATURE(39)] - error parsing signature “drop tcp $HOME_NET any → $EXTERNAL_NET $HTTP_PORTS (msg:“MALWARE-CNC Win.Trojan.Scranos variant outbound connection”; flow:to_server,established; content:”/fb/apk/index.php"; fast_pattern:only; http_uri; urilen:<10; metadata:impact_flag red, policy balanced-ips drop, policy max-detect-ips drop, policy security-ips drop, service http; reference:url,VirusTotal; classtype:trojan-activity; sid:50525; rev:1;)" from file /usr/local/etc/suricata/suricata_47420_re0/rules/suricata.rules at line 37242
24/12/2022 – 22:23:08 - – [ERRCODE: SC_ERR_INVALID_SIGNATURE(39)] - “http_header” keyword seen with a sticky buffer still set. Reset sticky buffer with pkt_data before using the modifier.
24/12/2022 – 22:23:08 - – [ERRCODE: SC_ERR_INVALID_SIGNATURE(39)] - error parsing signature “drop tcp $EXTERNAL_NET $HTTP_PORTS → $HOME_NET any (msg:“MALWARE-CNC Osx.Trojan.Janicab runtime traffic detected”; flow:to_client,established; file_data; content:“content=|22|just something i made up for fun, check out my website at”; fast_pattern:only; content:“X-YouTube-Other-Cookies:”; nocase; http_header; metadata:impact_flag red, policy balanced-ips drop, policy max-detect-ips drop, policy security-ips drop, service http; reference:cve,2012-0158; reference:url,VirusTotal; classtype:trojan-activity; sid:27544; rev:3;)” from file /usr/local/etc/suricata/suricata_47420_re0/rules/suricata.rules at line 37834
24/12/2022 – 22:23:08 - – [ERRCODE: SC_ERR_INVALID_SIGNATURE(39)] - previous keyword has a fast_pattern:only; set. Can’t have relative keywords around a fast_pattern only content
24/12/2022 – 22:23:08 - – [ERRCODE: SC_ERR_INVALID_SIGNATURE(39)] - error parsing signature “drop tcp $HOME_NET any → $EXTERNAL_NET $HTTP_PORTS (msg:“MALWARE-CNC Win.Trojan.IcedId outbound connection”; flow:to_server,established; content:“Cookie: __gads”; fast_pattern:only; content:”__gads=“; http_cookie; content:”|3B| _gat=“; distance:0; http_cookie; content:”|3B| _ga=“; distance:0; http_cookie; content:”|3B| _u=“; distance:0; http_cookie; content:”|3B| __io=“; distance:0; http_cookie; content:”|3B| _gid=“; distance:0; http_cookie; metadata:impact_flag red, policy balanced-ips drop, policy max-detect-ips drop, policy security-ips drop, service http; reference:url,VirusTotal; classtype:trojan-activity; sid:58835; rev:1;)” from file /usr/local/etc/suricata/suricata_47420_re0/rules/suricata.rules at line 38042
24/12/2022 – 22:23:08 - – [ERRCODE: SC_ERR_UNKNOWN_REGEX_MOD(131)] - unknown regex modifier ‘K’
24/12/2022 – 22:23:08 - – [ERRCODE: SC_ERR_INVALID_SIGNATURE(39)] - error parsing signature “drop tcp $HOME_NET any → $EXTERNAL_NET $HTTP_PORTS (msg:“MALWARE-CNC Win.Backdoor.TreeTrunk outbound connection”; flow:to_server,established; urilen:10; content:”/index.jsp"; fast_pattern:only; http_uri; pcre:“/^([0-9A-F]{2}-){5}[0-9A-F]{2}$/K”; metadata:impact_flag red, policy balanced-ips drop, policy max-detect-ips drop, policy security-ips drop, service http; reference:url,VirusTotal; classtype:trojan-activity; sid:60270; rev:1;)" from file /usr/local/etc/suricata/suricata_47420_re0/rules/suricata.rules at line 38109
24/12/2022 – 22:23:08 - – [ERRCODE: SC_ERR_INVALID_SIGNATURE(39)] - “http_client_body” keyword seen with a sticky buffer still set. Reset sticky buffer with pkt_data before using the modifier.
24/12/2022 – 22:23:08 - – [ERRCODE: SC_ERR_INVALID_SIGNATURE(39)] - error parsing signature “drop tcp $HOME_NET any → $EXTERNAL_NET $HTTP_PORTS (msg:“MALWARE-CNC Win.Trojan.HannabiGrabber info stealer outbound communication”; flow:to_server,established; file_data; content:“Hannabi Grabber”; fast_pattern:only; http_client_body; content:”```fix|5C|nPCName:“; http_client_body; content:“GB|5C|nAntivirus:”; within:1000; http_client_body; metadata:impact_flag red, policy balanced-ips drop, policy max-detect-ips drop, policy security-ips drop, service http; reference:url,VirusTotal; classtype:trojan-activity; sid:60728; rev:1;)” from file /usr/local/etc/suricata/suricata_47420_re0/rules/suricata.rules at line 38173
24/12/2022 – 22:23:08 - – [ERRCODE: SC_ERR_NO_FILES_FOR_PROTOCOL(285)] - protocol tls doesn’t support file matching
24/12/2022 – 22:23:08 - – [ERRCODE: SC_ERR_INVALID_SIGNATURE(39)] - error parsing signature “drop tcp $HOME_NET any → $EXTERNAL_NET 443 (msg:“PUA-OTHER Authedmine TLS client hello attempt”; flow:to_server,established; file_data; ssl_state:client_hello; content:“authedmine.com”; fast_pattern:only; metadata:policy balanced-ips drop, policy max-detect-ips drop, policy security-ips drop, service http; classtype:misc-attack; sid:45952; rev:2;)” from file /usr/local/etc/suricata/suricata_47420_re0/rules/suricata.rules at line 39687
24/12/2022 – 22:23:08 - – [ERRCODE: SC_ERR_INVALID_SIGNATURE(39)] - Can’t use file_data with flow:to_server or flow:from_client with http.
24/12/2022 – 22:23:08 - – [ERRCODE: SC_ERR_INVALID_SIGNATURE(39)] - error parsing signature “drop tcp $EXTERNAL_NET any → $HOME_NET 8500 (msg:“SERVER-OTHER Hashicorp Consul services API remote code execution attempt”; flow:to_server,established; content:”/v1/agent/service/register"; fast_pattern:only; http_uri; content:“PUT”; http_method; file_data; content:“check”; content:“script”; within:25; metadata:policy balanced-ips drop, policy max-detect-ips drop, policy security-ips drop, service http; reference:url,Hashicorp Consul Remote Command Execution via Services API; classtype:attempted-admin; sid:49670; rev:2;)" from file /usr/local/etc/suricata/suricata_47420_re0/rules/suricata.rules at line 39783
24/12/2022 – 22:23:08 - – [ERRCODE: SC_ERR_INVALID_SIGNATURE(39)] - “http_uri” keyword seen with a sticky buffer still set. Reset sticky buffer with pkt_data before using the modifier.
24/12/2022 – 22:23:08 - – [ERRCODE: SC_ERR_INVALID_SIGNATURE(39)] - error parsing signature “drop tcp $EXTERNAL_NET any → $HOME_NET $HTTP_PORTS (msg:“SERVER-OTHER VMWare vSphere log4shell exploit attempt”; flow:to_server,established; content:“Content-Disposition”; nocase; http_client_body; content:“RelyingPartyEntityId”; distance:0; nocase; http_client_body; content:”|0D 0A 0D 0A|“; distance:0; http_client_body; base64_decode:bytes 64,relative; base64_data; pcre:”/\x24\x7b(jndi|[^\x7d]?\x24\x7b[^\x7d]?\x3a[^\x7d]?\x7d)/i"; content:“/websso/SAML2/SSOSSL/”; fast_pattern:only; http_uri; metadata:policy balanced-ips drop, policy max-detect-ips drop, policy security-ips drop, service http; reference:cve,2021-44228; reference:cve,2021-44832; reference:cve,2021-45046; reference:cve,2021-45105; classtype:attempted-user; sid:58812; rev:3;)" from file /usr/local/etc/suricata/suricata_47420_re0/rules/suricata.rules at line 39951
24/12/2022 – 22:23:08 - – [ERRCODE: SC_ERR_RULE_KEYWORD_UNKNOWN(102)] - unknown rule keyword ‘http_raw_cookie’.
24/12/2022 – 22:23:08 - – [ERRCODE: SC_ERR_INVALID_SIGNATURE(39)] - error parsing signature “drop tcp $EXTERNAL_NET any → $HOME_NET $HTTP_PORTS (msg:“SERVER-WEBAPP Multiple products DVR admin password leak attempt”; flow:to_server,established; content:”/device.rsp"; fast_pattern:only; http_uri; content:“uid=”; http_raw_cookie; content:“cmd=list”; http_client_body; metadata:policy balanced-ips drop, policy max-detect-ips drop, policy security-ips drop, service http; reference:cve,2018-9995; classtype:web-application-attack; sid:55839; rev:1;)" from file /usr/local/etc/suricata/suricata_47420_re0/rules/suricata.rules at line 39991
24/12/2022 – 22:23:08 - – [ERRCODE: SC_ERR_INVALID_SIGNATURE(39)] - depth or urilen 4 smaller than content len 10
24/12/2022 – 22:23:08 - – [ERRCODE: SC_ERR_INVALID_SIGNATURE(39)] - error parsing signature “drop tcp $EXTERNAL_NET any → $HOME_NET $HTTP_PORTS (msg:“SERVER-WEBAPP Grandstream UCM6202 series SQL injection attempt”; flow:to_server,established; content:“user_name=”; fast_pattern:only; http_uri; urilen:4; content:”/cgi"; nocase; http_uri; pcre:"/[?&]user_name=[^&]?([\x27\x22\x3b\x23\x28]|\x2f\x2a|\x2d\x2d)/Ui"; metadata:policy balanced-ips drop, policy max-detect-ips drop, policy security-ips drop, service http; reference:cve,2020-5722; classtype:web-application-attack; sid:53858; rev:2;)" from file /usr/local/etc/suricata/suricata_47420_re0/rules/suricata.rules at line 40019
24/12/2022 – 22:23:09 - – [ERRCODE: SC_ERR_RULE_KEYWORD_UNKNOWN(102)] - unknown rule keyword ‘http_raw_cookie’.
24/12/2022 – 22:23:09 - – [ERRCODE: SC_ERR_INVALID_SIGNATURE(39)] - error parsing signature “drop tcp $EXTERNAL_NET any → $HOME_NET $HTTP_PORTS (msg:“SERVER-WEBAPP Multiple products DVR admin password leak attempt”; flow:to_server,established; content:”/device.rsp"; fast_pattern:only; http_uri; content:“uid=”; http_raw_cookie; content:“cmd=list”; http_uri; metadata:policy balanced-ips drop, policy max-detect-ips drop, policy security-ips drop, service http; reference:cve,2018-9995; classtype:web-application-attack; sid:46825; rev:2;)" from file /usr/local/etc/suricata/suricata_47420_re0/rules/suricata.rules at line 40116
24/12/2022 – 22:23:09 - – [ERRCODE: SC_ERR_INVALID_SIGNATURE(39)] - Can’t use file_data with flow:to_server or flow:from_client with http.
24/12/2022 – 22:23:09 - – [ERRCODE: SC_ERR_INVALID_SIGNATURE(39)] - error parsing signature “drop tcp $EXTERNAL_NET any → $HOME_NET $FILE_DATA_PORTS (msg:“SERVER-WEBAPP Pulse Connect Secure template injection attempt”; flow:to_server,established; content:”/dana-admin/auth/custompage.cgi"; fast_pattern:only; http_uri; file_data; content:“LoginPage.thtml”; metadata:policy balanced-ips drop, policy max-detect-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2020-8243; reference:url,Ivanti Community; classtype:attempted-admin; sid:57452; rev:1;)" from file /usr/local/etc/suricata/suricata_47420_re0/rules/suricata.rules at line 40366
24/12/2022 – 22:23:09 - – 2 rule files processed. 40932 rules successfully loaded, 13 rules failed
24/12/2022 – 22:23:09 - – Threshold config parsed: 0 rule(s) found
24/12/2022 – 22:23:09 - – 40935 signatures processed. 2097 are IP-only rules, 4933 are inspecting packet payload, 27964 inspect application layer, 108 are decoder event only
24/12/2022 – 22:23:09 - – [ERRCODE: SC_WARN_FLOWBIT(306)] - flowbit ‘file.zip&file.silverlight’ is checked but not set. Checked in 28582 and 2 other sigs
24/12/2022 – 22:23:09 - – [ERRCODE: SC_WARN_FLOWBIT(306)] - flowbit ‘file.pdf&file.ttf’ is checked but not set. Checked in 28585 and 1 other sigs
24/12/2022 – 22:23:09 - – [ERRCODE: SC_WARN_FLOWBIT(306)] - flowbit ‘file.xls&file.ole’ is checked but not set. Checked in 30990 and 1 other sigs
24/12/2022 – 22:24:13 - – Using 2 live device(s).
24/12/2022 – 22:24:13 - – devname [fd: 8] netmap:re0/R re0 opened
24/12/2022 – 22:24:13 - – devname [fd: 11] netmap:re0^/T re0^ opened
24/12/2022 – 22:24:13 - – devname [fd: 12] netmap:re0^/R re0^ opened
24/12/2022 – 22:24:13 - – devname [fd: 13] netmap:re0/T re0 opened
24/12/2022 – 22:24:13 - – all 18 packet processing threads, 4 management threads initialized, engine started.