I stopped suricata with /usr/local/suricatactrl stop
System logs showed
17:13:11 suricata: (W-NFQ#3) Verdict: Accepted 174040, Dropped 171, Replaced 0
17:13:11 suricata: (W-NFQ#3) Treated: Pkts 174211, Bytes 174746469, Errors 0
17:13:11 suricata: (W-NFQ#2) Verdict: Accepted 80938, Dropped 139, Replaced 0
17:13:11 suricata: (W-NFQ#2) Treated: Pkts 81077, Bytes 76103777, Errors 0
17:13:11 suricata: (W-NFQ#1) Verdict: Accepted 112400, Dropped 69, Replaced 0
17:13:11 suricata: (W-NFQ#1) Treated: Pkts 112469, Bytes 96119546, Errors 0
17:13:11 suricata: (W-NFQ#0) Verdict: Accepted 246979, Dropped 288, Replaced 0
17:13:11 suricata: (W-NFQ#0) Treated: Pkts 247267, Bytes 253652340, Errors 0
17:13:10 suricata: time elapsed 12929.488s
17:13:09 suricata: Signal Received. Stopping engine.
So engine was stopped at 17:13:11
Then I waited for around a minute and then ran
/usr/local/bin/suricatactrl start
After memory level for suricata was no longer increasing the system logs showed
17:16:51 suricata: Signature(s) loaded, Detect thread(s) activated.
17:16:51 suricata: rule reload complete
17:14:59 suricata: flowbit 'exe.no.referer' is checked but not set. Checked in 2020500 and 0 other sigs
17:14:59 suricata: flowbit 'HTTP.UncompressedFlash' is checked but not set. Checked in 2023313 and 0 other sigs
17:14:59 suricata: flowbit 'et.WinHttpRequest' is checked but not set. Checked in 2019823 and 0 other sigs
17:14:59 suricata: flowbit 'ET.SW.Bookmark' is checked but not set. Checked in 2061729 and 0 other sigs
17:14:59 suricata: flowbit 'ET.implantjs.syn' is checked but not set. Checked in 2060257 and 2 other sigs
17:14:59 suricata: flowbit 'ET.BunnyLoader.Checkin' is checked but not set. Checked in 2048398 and 0 other sigs
17:14:59 suricata: flowbit 'ET.generictelegram' is checked but not set. Checked in 2045614 and 0 other sigs
17:14:59 suricata: flowbit 'min.gethttp' is checked but not set. Checked in 2023711 and 0 other sigs
17:14:59 suricata: flowbit 'ET.autoit.ua' is checked but not set. Checked in 2019165 and 0 other sigs
17:14:59 suricata: flowbit 'ET.Socks5.OnionReq' is checked but not set. Checked in 2027704 and 0 other sigs
17:14:59 suricata: flowbit 'ET.smb.binary' is checked but not set. Checked in 2027402 and 4 other sigs
17:14:59 suricata: flowbit 'ET.armwget' is checked but not set. Checked in 2024242 and 0 other sigs
17:14:59 suricata: flowbit 'et.MS.WinHttpRequest.no.exe.request' is checked but not set. Checked in 2022653 and 0 other sigs
17:14:59 suricata: flowbit 'et.MCOFF' is checked but not set. Checked in 2022303 and 0 other sigs
17:14:59 suricata: flowbit 'et.MS.XMLHTTP.no.exe.request' is checked but not set. Checked in 2022053 and 0 other sigs
17:14:59 suricata: flowbit 'et.MS.XMLHTTP.ip.request' is checked but not set. Checked in 2022050 and 1 other sigs
17:14:59 suricata: flowbit 'ET.wininet.UA' is checked but not set. Checked in 2021312 and 0 other sigs
17:14:59 suricata: flowbit 'ET.MSSQL' is checked but not set. Checked in 2020569 and 0 other sigs
17:14:59 suricata: flowbit 'et.DocVBAProject' is checked but not set. Checked in 2020170 and 0 other sigs
17:14:59 suricata: flowbit 'ET.ELFDownload' is checked but not set. Checked in 2019896 and 0 other sigs
17:14:59 suricata: flowbit 'ET.http.javaclient.vulnerable' is checked but not set. Checked in 2013036 and 0 other sigs
17:14:59 suricata: flowbit 'is_proto_irc' is checked but not set. Checked in 2002029 and 4 other sigs
17:14:59 suricata: flowbit 'ET.pdf.in.http' is checked but not set. Checked in 2017150 and 3 other sigs
17:14:59 suricata: flowbit 'ET.JS.Obfus.Func' is checked but not set. Checked in 2017247 and 0 other sigs
17:14:59 suricata: flowbit 'ET.000webhostpost' is checked but not set. Checked in 2052143 and 0 other sigs
17:14:59 suricata: flowbit 'ET.ZIP.Symlink.Inbound' is checked but not set. Checked in 2059742 and 2 other sigs
17:14:59 suricata: flowbit 'dcerpc.rpcnetlogon' is checked but not set. Checked in 2030870 and 6 other sigs
17:14:59 suricata: flowbit 'ET.gocd.auth' is checked but not set. Checked in 2034333 and 0 other sigs
17:14:59 suricata: flowbit 'et.IE7.NoRef.NoCookie' is checked but not set. Checked in 2023671 and 9 other sigs
17:14:59 suricata: flowbit 'ET.http.javaclient' is checked but not set. Checked in 2017181 and 5 other sigs
17:14:59 suricata: flowbit 'ET.http.binary' is checked but not set. Checked in 2019421 and 5 other sigs
17:14:59 suricata: 29439 signatures processed. 0 are IP-only rules, 2715 are inspecting packet payload, 26694 inspect application layer, 0 are decoder event only
17:14:58 suricata: Threshold config parsed: 0 rule(s) found
17:14:58 suricata: 14 rule files processed. 29439 rules successfully loaded, 0 rules failed, 0
17:14:13 suricata: Including configuration file /var/ipfire/suricata/suricata-used-rulesfiles.yaml.
17:14:13 suricata: Including configuration file /var/ipfire/suricata/suricata-http-ports.yaml.
17:14:13 suricata: Including configuration file /var/ipfire/suricata/suricata-dns-servers.yaml.
17:14:13 suricata: Including configuration file /var/ipfire/suricata/suricata-homenet.yaml.
17:14:13 suricata: rule reload starting
17:14:13 suricata: Threads created -> W: 4 FM: 1 FR: 1 Engine started.
17:14:13 suricata: setting nfnl bufsize to 6144000
17:14:13 suricata: setting queue length to 4096
17:14:13 suricata: binding this thread 3 to queue '3'
17:14:13 suricata: setting nfnl bufsize to 6144000
17:14:13 suricata: setting queue length to 4096
17:14:13 suricata: binding this thread 2 to queue '2'
17:14:13 suricata: setting nfnl bufsize to 6144000
17:14:13 suricata: setting queue length to 4096
17:14:13 suricata: binding this thread 1 to queue '1'
17:14:13 suricata: setting nfnl bufsize to 6144000
17:14:13 suricata: setting queue length to 4096
17:14:13 suricata: binding this thread 0 to queue '0'
17:14:13 suricata: Packets will start being processed before signatures are active.
17:14:13 suricata: fast output device (regular) initialized: fast.log
17:14:13 suricata: dropped the caps for main thread
17:14:13 suricata: NFQ running in REPEAT mode with mark 2147483648/2147483648
17:14:13 suricata: HTTP memcap: 268435456
17:14:13 suricata: master exception-policy set to: pass-packet
17:14:13 suricata: CPUs/cores online: 4
17:14:13 suricata: This is Suricata version 7.0.10 RELEASE running in SYSTEM mode
So the rule reload was complete at 17:16:51
Before I stopped suricata the last entry in the IPS Logs entry was at 17:07:06
After suricata was back running I then got three entries after the 17:16:51 time at which the suricata rules were fully reloaded.
So Suricata seems to be working for me.
You can test if Suricata is working or not by doing the following.
Add the Emerging Threats Community provider if you don’t have it already.
Then select the emerging-attack_response.rules
The testing rule is selected by default and is called
GPL ATTACK_RESPONSE id check returned root
and then from a machine on your green network (presuming you have the Green interface selected on the IDS WUI page) run the following command.
curl http://testmynids.org/uid/index.html
It will not complete as the command will be blocked so you will need to do a Ctrl-C to get back to your terminal line.
Your IPS Logs will now contain the following log response
This is a standard test function that is described in the Suricata documentation
https://docs.suricata.io/en/latest/quickstart.html#alerting
If you get the log response then everything is working as intended but you are not getting very many traffic attempts that are getting triggered.
If you don’t get that log response then more investigation is needed.