Unexpected "Suricata: Rule Mismatch" involving modified emerging-all.rules file in airgapped environment #14963
Replies: 4 comments 1 reply
-
Please post a sanitized version of the |
Beta Was this translation helpful? Give feedback.
-
Here is the expanded messages field from the error record
and here is the entire record
|
Beta Was this translation helpful? Give feedback.
-
And of all the referenced rule IDs that I check, they correspond to rules that I am myself am intentionally disabling in the ruleset before the NSM downloads it from my own server. |
Beta Was this translation helpful? Give feedback.
-
I do see directly in the so-detection index for the rules that I out-of-band disabled that so_detection.isEnabled is set to true, even though the revised emerging-all.rules file that the NSM downloads from my internal server, definitely has those rules commented out. Also looking up the same disabled rules, I find them commented out in the all.rules file inside the so-suricata container. I would assume that downloading a new emerging-all.rules file (airgap style) would cause the enabled/disabled status for all the rules in that file to be used to update the records in so-detection. Do I need to do something to flush out the suricata rule history in so-detection so there is no confusion about the state of things between before and after I switch from direct downloads of ETPRO from the Internet to internal downloads of a revised copy of ETPRO from my server? |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
Version
2.4.170
Installation Method
Security Onion ISO image
Description
other (please provide detail below)
Installation Type
Standalone
Location
airgap
Hardware Specs
Meets minimum requirements
CPU
varies
RAM
varies
Storage for /
varies
Storage for /nsm
varies
Network Traffic Collection
other (please provide detail below)
Network Traffic Speeds
Less than 1Gbps
Status
Yes, all services on all nodes are running OK
Salt Status
No, there are no failures
Logs
No, there are no additional clues
Detail
I have numerous independent Security Onion 2.4 deployments that are subscribed to the ETPRO rule feed. I also have a common shared set of enable, disable, and modify rules and additional rules that are to be folded into the ETPRO ruleset before delivery to the individual NSM grids. My expectation is that after receiving our revised version of the latest ETPRO ruleset, that each NSM will then additionally apply any uniquely site-specific Detections measures that are defined at each given site.
I am doing this by using the airgap method so that I'm allowed to use my own custom orchestration to deliver our revised emerging-all.rules file to /nsm/rules/suricata/
(https://docs.securityonion.net/en/2.4/airgap.html#rule-updates).
I generate the revised emerging-all.rules file on a non-NSM server where I have a vanilla install of the latest suricata 7.x and suricata-update in place. From that server suricata-update downloads the latest from ETPRO and then applies my shared enable, disable, modify, and local rules like this:
From there the resulting emerging-all.rules file is distributed to each NSM manager's /nsm/rules/suricata/ directory.
This appears to be working. I find clear evidence that all my different types of changes are in place when I inspect /etc/suricata/rules/all.rules while shelled into the so-suricata container.
However, I am concerned because the Detections module keeps throwing an "enabledButNotDeployed" complaint about rules that I did indeed disable with suricata-update on my centralized server.
Please help me understand why the Suricata rule integrity check would consider these problematic, when it is complaining about rule numbers that were already disabled at the point so-rule-update ingested them on the NSMs? Also, I don't see other integrity check complaints about my custom modify measures or about my added rules.
This may just be a cosmetic issue, but I would like to confirm I don't need to worry about
If I can actually tweak something so that I don't see "Suricata: Rule Mismatch" at all, that would be ideal. Otherwise I'd like some assurance that my approach is not breaking needed functionality.
Thanks,
Kevin Branch
Guidelines
Beta Was this translation helpful? Give feedback.
All reactions