I have suricata running on a couple of linux systems. I decided that it should be possible to have it run on an OS/X system as well. I installeded suricata as shown at https://macappstore.org/suricata/, all of which worked as expected. “suricata -V” displays its version (yay!) 6.0.4. Its build-info shows that only IPFW is enabled.
For the linux systems there are number of steps to prep the firewall for working with suricata. Is there a tutorial (or similar) about how to set up and run suricata on an OS/X system?
I do not know about that script you ran on that page but what I did is install with homebrew by running this.
brew install suricata
Then run ifconfig in terminal
after you find out what adapter you are using like en0 for your wifi if its the same an mine
Then you have to open this file.
/usr/local/etc/suricata/suricata.yaml
search for the word interface and replace the interface in the config with en0 if it says en0
make sure you have the proper IP range for your home network.
Then update
sudo suricata-update
List all the sources and lists
suricata-update list-sources
Add a list like this
sudo suricata-update enable-source malsilo/win-malware
Now you should check in the log
cat /usr/local/var/log/suricata/fast.log
and you should see an alert if it is working properly. I hope helped you let me know if you need some more help
You can even type
suricata -h
Into the terminal and see all the different things you can do if you run it with -D you can run it as a daemon like this
sudo /usr/local/Cellar/suricata/7.0.1/libexec/bin/suricata -c /usr/local/etc/suricata/suricata.yaml -s signatures.rules -i en0 -D
Thank you and I suppose we could add a few more things here like the drop.conf
The enable drop.conf actually drops traffic on the rule rather than alert you
located /usr/local/Cellar/suricata/7.0.2/lib/suricata/python/suricata/update/configs/drop.conf
There is an enable.conf as well for enabling more rules it uses the same syntax if you use the same list below you will enable everything possible but you will get some errors for some rules that can not be enabled. the enable.conf is located at
Then save the file and you can update and call on the drop.conf and enable.conf
And then do an update referencing your new config files. You will now have the rules enabled and set to drop traffic next time you update as listed below.
These are template files that generally should not be edited, as they will be overwritten on a Suricata-Update. Instead create the files enable.conf, drop.conf, etc in whatever the Brew equivalent of /etc/suricata/ would be.