1
Intrusion Detection and Prevention / Re: Suricata blocking crashes OPNsense 1.19.4 and some earlier versions
« on: August 26, 2019, 12:44:36 am »
Just revisiting this after some time away.
I ended up moving back to pfSense for quite a while because of Snort and just lived with needing to bring down pfSense on the Proxmox host for the primary router when I wanted up date that Proxmox host. Everything else works fine.
So why is Snort such a big deal with me?
There are a coupe of reasons.
1) Snort's AppID functionality is incredibly useful and easy to support and use from an IDS/IPS perspective.
2) Suricata only allows me turn a rule on or off. Snort allows me to except rules by IP address. This lets me do things like allow my repository mirror to pull repository updates from the outside world, but alert me if other servers are trying to do the same thing.
It is a simple example, but that kind of functionality is really important if I want to be able to bring OPNsense from my home lab into the company test lab. As it is, OPNsense wouldn't meet the operational requirements for my work environment, even for our test lab, and I need to use another product.
This also means that I cannot look to purchase OPNsense products or support offerings at work. This literally means I cannot give you corporate money even though I would like to.
Overall I find I much prefer working with OPNsense over pfSense. I also strongly dislike the anti-community sentiments being given off by the parent organization of pfSense. Unfortunately Snort, Cisco Firepower, or an equivalent become a requirement once you reach a certain size. Suricata doesn't really hold up when compared to those tools.
I ended up moving back to pfSense for quite a while because of Snort and just lived with needing to bring down pfSense on the Proxmox host for the primary router when I wanted up date that Proxmox host. Everything else works fine.
So why is Snort such a big deal with me?
There are a coupe of reasons.
1) Snort's AppID functionality is incredibly useful and easy to support and use from an IDS/IPS perspective.
2) Suricata only allows me turn a rule on or off. Snort allows me to except rules by IP address. This lets me do things like allow my repository mirror to pull repository updates from the outside world, but alert me if other servers are trying to do the same thing.
It is a simple example, but that kind of functionality is really important if I want to be able to bring OPNsense from my home lab into the company test lab. As it is, OPNsense wouldn't meet the operational requirements for my work environment, even for our test lab, and I need to use another product.
This also means that I cannot look to purchase OPNsense products or support offerings at work. This literally means I cannot give you corporate money even though I would like to.
Overall I find I much prefer working with OPNsense over pfSense. I also strongly dislike the anti-community sentiments being given off by the parent organization of pfSense. Unfortunately Snort, Cisco Firepower, or an equivalent become a requirement once you reach a certain size. Suricata doesn't really hold up when compared to those tools.