Proxmox 9/Debian 13.
This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.
Show posts MenuQuote from: spidysense on October 07, 2025, 03:48:47 PMQuote from: spetrillo on August 30, 2025, 08:50:21 PMSuricata is throwing up some alerts that I think are ok but I am not sure. Is this ok??
Content match Service Suricata_alert
Date: Sat, 30 Aug 2025 14:41:04
Action: alert
Host: opnsfwpr01.petrillo.home
Description: content match:
{"timestamp":"2025-08-30T14:39:03.101552-0400","flow_id":2125015740515061,"in_iface":"igb3^","event_type":"alert","src_ip":"172.16.2.2","src_port":31511,"dest_ip":"185.136.96.98","dest_port":53,"proto":"UDP","pkt_src":"wire/pcap","tx_id":0,"alert":{"action":"allowed","gid":1,"signature_id":2027758,"rev":5,"signature":"ET DNS Query for .cc TLD","category":"Potentially Bad Traffic","severity":2,"metadata":{"affected_product":["Any"],"attack_target":["Client_Endpoint"],"confidence":["High"],"created_at":["201
...
The Suricata alert indicates a network event captured on August 30, 2025, at 14:39:03 EDT, with the following details:
Timestamp: 2025-08-30T14:39:03.101552-0400
Flow ID: 2125015740515061 (unique identifier for the network flow)
Interface: igb3^ (network interface where traffic was captured)
Event Type: Alert (triggered by Suricata's intrusion detection system)
Source IP/Port: 172.16.2.2:31511 (private IP, likely internal network device)
Destination IP/Port: 185.136.96.98:53 (public IP, port 53 used for DNS)
Protocol: UDP (typical for DNS queries)
Packet Source: wire/pcap (captured from live network traffic or pcap file)
Transaction ID: 0 (tx_id for the specific transaction in the flow)
Alert Details:
Action: Allowed (traffic was not blocked)
GID: 1 (group ID for the rule)
Signature ID: 2027758 (unique ID for the rule triggered)
Revision: 5 (rule version)
Signature: ET DNS Query for .cc TLD (Emerging Threats rule for DNS query to .cc top-level domain)
Category: Potentially Bad Traffic (indicates suspicious but not necessarily malicious activity)
Severity: 2 (moderate severity, on a scale where 1 is critical, 3 is low)
Metadata:
Affected Product: Any (applies to any system)
Attack Target: Client_Endpoint (likely targeting a client device)
Confidence: High (high confidence in the rule's accuracy)
Created At: 2013 (rule creation date)
Summary: The alert was triggered by a DNS query from 172.16.2.2 to 185.136.96.98 for a .cc domain, flagged as potentially suspicious by Suricata's Emerging Threats ruleset. The .cc TLD is sometimes associated with malicious activity, but the traffic was allowed. Further investigation into the destination IP and domain context is recommended to assess risk. If you check out what this host has been reported for causing it to be flagged, you can look here. I like to use AbuseIPDB for further IP/host investigation.
Quote from: BrandyWine on September 24, 2025, 06:39:03 AMQuote from: spetrillo on September 22, 2025, 06:48:43 PMSo some interesting driver info for FreeBSD. If I look at the Intel website it tells me the latest FreeBSD driver version is 3.4.31, however when I run sysctl -a | grep dev.ix.0.iflib.driver_version it tells me I am running 4.0.1-k on my OPNsense server. Not sure where this driver came from bc the Intel 30.4.2 pkg only shows the 3.4.31 version.Well, the ix ko shows 4.0.1-k
I just did a standard OPNsense install. Its just running 25.7. I ran sysctl -a | grep dev.ix.0.iflib.driver_version. It shows the version as 4.0.1-k. I thought this was the driver version for ix.
How it's loaded in? It's not in as klm
strings /boot/kernel/if_ix.ko | grep "4.0.1"
kldstat -v |grep ix
it's #146 on my OPNsense.
ix is in the kernel, I suspect the ko is the same code that's in the kernel. Edit: which is the case, v14.3 src code ID's ix driver as 4.0.1-k. Version numbers between freeBSD code and Intel code will be different, because it's different vendors numbering in different ways.
Why have a ko and in the kernel? Well, it is possible to unbind the static ix and then kldload the ko, which gives you flexibility, and ability to load your own compiled ko driver.
Quote from: BrandyWine on September 23, 2025, 09:47:22 PMQuote from: spetrillo on September 23, 2025, 08:31:52 PMYes swapping the cables fixed the issue. The switch log shows the connection and negotiation to 100M. Nothing abnormal.If the switch is fully 802.3bz compliant it could have ran next/fext for alien noise and decided to accept the lower speed. I wonder what the switch would accept of 100M was not available from the x550? If say 2.5G was the only speed allowed in auto-neg would it accept that or not link at all? For me I would be curious and test it, but since your setup is working that's up to you.
Were your bad cables new and labeled as CAT6?
Quote from: BrandyWine on September 26, 2025, 06:57:26 PMQuote from: spetrillo on September 26, 2025, 04:29:27 PMSo the real answer for me is I am SOL until next year. That's ok.Your patience needs to match "community" of OPNsense product. ;)
The E610 is a very low wattage adapter, so when its supported it will be ready to replace my X550.
Unless there are others who are will to test a new ko, you are the testor.
Trusting compiled stuff from anonymous is not the best, and not acceptable for critical stuff.
Once the process is somewhat well-documented you can then do it yourself, this was if there are issues, it's on you.
Or if you prefer, shelve the 610 for now and wait.
Or, be community oriented, try test fix try test fix, report your findings, etc.