-
Version2.4.60 Installation MethodSecurity Onion ISO image Descriptionconfiguration Installation TypeDistributed Locationairgap Hardware SpecsExceeds minimum requirements CPU16 RAM256 Storage for /6 TB Storage for /nsm4 TB Network Traffic Collectionspan port Network Traffic Speedsmore than 10Gbps StatusYes, all services on all nodes are running OK Salt StatusNo, there are no failures LogsNo, there are no additional clues DetailHello, I am encountering an issue on our new 2.4 build. I wasn't the one to install this current build, however we previously have always used airgapped builds. In the past, we'd drop our ruleset we obtained from an external server, then drop it into our managers nsm/rules directory as emering-all.rules. We'd then run so-rule-update and it'd do the job. However I an running into an issue at this moment as I am not sure why when we run so-rule-update, it's attempting to reach out to the internet and retrieve the file. This could be a misclick from an install and our firewall still blocks it, however whenever I try to put the rules "/nsm/rules/suricata/" directory and run so-rule-update, it just hangs on "Fetching https://rules.emergingthreats.net/open/suricata-6.0.0/emerging.rules.tar.gz.", unable to go onto the next step. Is there way to change this URL variable to just point to our local storage? "http://****:7788/suricata/emerging-all.rules" I tried going into the Security onion configuration panel and adding that as a custom URL however it'd just error out, and I also added just the IP so it didn't need to resolve and when I tried so-rule-update it wouldn't even do anything.I also attempted to hunt down where I could modify rulecat.conf to just not point to that location and I couldn't figure that out or what to modify, and I also attempted to turn off IDSTOOLS in the manager configuration panel. At this moment I'm not really sure how I would be able to install the rules I drop into the "/nsm/rules/suricata/" directory. If there was an incorrect installation done with our setup could that of caused this? If so, is there a way to fix that? Thank you in advance. :) Guidelines
|
Beta Was this translation helpful? Give feedback.
Replies: 2 comments 2 replies
-
Sounds like this one wasn't installed as an Airgap. What's the value of global --> airgap in the Configuration interface? |
Beta Was this translation helpful? Give feedback.
-
Found my solution to my issue by messing around in the scripts. I noticed that in /usr/sbin/so-rule-update it has this portion to download from the internet. However when I check /opt/so/saltstack/default/salt/idstools/tools/sbin_jinja/so-rule-update I see this check that technically true but it still runs and downloads from the internet. I'm not an expert so I could be looking at something completely incorrect so apologies. I'm aware that salt will automatically pull the rules from /nsm/rules/suricata/emerging-all.rules down to the sensors also. I was just curious why all of a sudden this had changed whether it was done purposefully or not. docker exec so-idstools /bin/bash -c "cd /opt/so/idstools/etc && idstools-rulecat --force" I didn't test it but I think will still allow you to add the argument modifiers to idstools-rulecat. Here is the suricata documentation for it. https://idstools.readthedocs.io/en/latest/tools/rulecat.html |
Beta Was this translation helpful? Give feedback.
Found my solution to my issue by messing around in the scripts. I noticed that in /usr/sbin/so-rule-update it has this portion to download from the internet.
However when I check /opt/so/saltstack/default/salt/idstools/tools/sbin_jinja/so-rule-update I see this check that technically true but it still runs and downloads from the internet. I'm not an expert so I could be looking at something completely incorrect so apologies.
I'm aware that salt will automatically pull the rules from /nsm/rules/suricata/emerging-all.rules down to the sensors also. I was just curious why all of a sudden this had changed whether it was done purposefully or not.
I found that running this command will pull f…