Replies: 2 comments 2 replies
-
@LennyDK I looked at your rule file and found several formatting issues that we causing problems. I have attached a cleaned up version of your rule file. I have fixed most of the easy ones where you had HOME_NET instead of $HOME_NET and others that were missing ; somewhere in the rule. I commented out the ones below that will actually require you to do something about so all the other rules will load without error. If you fix the errors below your ruleset will work with Suricata on SO 2. Below is a list of line numbers that have issues. These lines error out with the following message: 11 can't use multiple nocase modifiers with the same content: 124 Can't use file_data with flow:to server or flow:from_client with http 601 rule (somesid) setup buffer file_data but didn't add matches to it 1165 2 out of the following 11 sids need to be fixed. The error is "Unable to find the sm in any of the sm lists" and gets triggered specifically by a combination of flowbits plus non buffered pcre. I commented them all out for now. You have 2 other rules that are causing the smlist errors but I am unable to find them right now. Might need to disable chunks of rules to pinpoint the 2 other rules that are throwing the smlist errors. sids: Getting these warnings: 10/2/2021 -- 09:19:31 - - [ERRCODE: SC_WARN_FLOWBIT(306)] - flowbit 'file.exe' is checked but not set. Checked in 5017108 and 9 other sigs |
Beta Was this translation helpful? Give feedback.
-
@TOoSmOotH Thank you for cleaning up Lenny's rules so they work under Suricata. But... His question remains, is there any plans to offer Snort 3.0 as an alternative to Suricata in SecurityOnion v2? Now that Snort 3.0 is finally out of Beta, and capable of using AF_PACKET, offering it as an option is feasible again, I believe. It gives users the benefit of being able to run the full TALOS ruleset from Cisco, including shared-object rules that Suricata cannot run. From a MSSP perspective, the TALOS and ETPRO rulesets focus on different areas. One tends to focus more on server-to-internet traffic, while the other has more rules for workstation-to-internet traffic (I forget which is which). Plus, becoming a Snort Integrator is cheaper for smaller MSSPs. Last I checked, Proofpoint wouldn't talk to you as an OEM integrator until you dropped $10k, whereas Cisco lets you break the normal per-sensor cost down to top daily usage per quarter, paid quarterly, and with no minimum. ETPRO isn't competitive on cost parity until you're upwards of 30 deployed sensors, assuming the rulesets are of equal value. If you do explore adding Snort as a NIDS option (and I hope you do), please consider adding the ability to run both Snort and Suricata concurrently. That gives the option to run TALOS or Snort-community rules on Snort and ETPRO or ETOPEN on Suricata. |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
Hi There
Dos anyone know if SNORT is to be supported in Security Onion 2 ?
I have thousands of rules that only run in SNORT I have written my self. That is years of rewriting and testing on old pcaps and so on.....Nightmare :-)
By the way...you can get them from here (NOT working Security Onion 2)
https://networkforensic.dk/SNORT/default.html
Best Regards
Lenny
Beta Was this translation helpful? Give feedback.
All reactions