On Wednesday, January 25, 2017 at 3:10:26 AM UTC-8, Doug Burks wrote:
> Hi gradius,
>
> Are you able to provide an example?
>
> Do you have any directives in disablesid.conf?
>
> Are you able to provide the full -vv output of pulledpork?
>
> On Tue, Jan 24, 2017 at 8:45 PM, gradius wrote:
> > Hello SecurityOnion community,
> >
> > Setup: SecurityOnion14, most recent update, using Suricata.
> >
> > So recently I updated my SecurityOnion14 deploy to the newest software releases via a "soup -y" across the board including my Server and all of my sensors.
> >
> > I was aware of the change where all rules are now included in downloaded.rules, which is why local.rules is getting automatically commented out in suricata.yaml.
> >
> > After pushing out my update, I realized that a rule-update on my SO Server is adding my /etc/nsm/rules/local.rules to /etc/nsm/rules/downloaded.rules, but in a commented out state. I've checked my settings for disablesid.conf as well as changed the verbosity in
pulledpork.pl to -vv, but I still cannot find out why my local.rules are being added in a commented out state.
> >
> > Any help/tips/direction is appreciated. Please let me know if I can clarify anything.
> >
> > --
> > Follow Security Onion on Twitter!
> >
https://twitter.com/securityonion> > ---
> > You received this message because you are subscribed to the Google Groups "security-onion" group.
> > To unsubscribe from this group and stop receiving emails from it, send an email to
security-onio...@googlegroups.com.
> > To post to this group, send email to
securit...@googlegroups.com.
> > Visit this group at
https://groups.google.com/group/security-onion.
> > For more options, visit
https://groups.google.com/d/optout.
>
>
>
> --
> Doug Burks
To provide some more details:
We have about 100 lines of rules in our local.rules file. In the past we've followed the instructions on the wiki to deploy custom rules with no issue. They live in /etc/nsm/rules/local.rules on the SO server.
We have a fairly small disablesid.conf, with mostly single sid entries, and the ones that correspond to sid ranges (eg: 1:2002027-1:2002028) are well documented and have been in production since we started using SO.
I've attached the verbose run of pulledpork.pl with sensitive data omitted.
Also when reviewing /var/log/nsm/sid_changes.log, all of our local.rules appear under the "Deleted" list. Our local.rules start at the SID (5000000)