[Oisf-users] Configuring Suricata Auto Update with Briar IDS

419telegraph298 at protonmail.com 419telegraph298 at protonmail.com
Sat Jan 19 21:44:15 UTC 2019


Hey everyone,

I recently installed Suricata on a Raspberry Pi 3 using the Briar IDS - https://github.com/musicmancorley/BriarIDS

I then attempted to install Suricata-Update, however, and am running into issues, I suspect because Briar installed suricata-4.0.4 in /usr/local/src but auto-update is in /var/lib/suricata. Suricata stops running every day instead of updating, and I have to relaunch the program manually. It does not have any issues collecting traffic when I relaunch.

It fails to locate the binary for Suricata and gives me the error "No distribution rule directory found" but has been able to update my rulesets in /usr/local/src/suricata-4.0.4/rules. Do I need to move my config file?

When I run verbose mode, I get the following output:

sudo suricata-update -v

19/1/2019 -- 21:27:28 - <Debug> -- This is suricata-update version 1.0.3 (rev: 8a782d4); Python: 2.7.13 (default, Sep 26 2018, 18:42:22) - [GCC 6.3.0 20170516]

19/1/2019 -- 21:27:28 - <Debug> -- Setting configuration value force -> False

19/1/2019 -- 21:27:28 - <Debug> -- Setting configuration value verbose -> True

19/1/2019 -- 21:27:28 - <Debug> -- Setting configuration value enable -> False

19/1/2019 -- 21:27:28 - <Debug> -- Setting configuration value no-merge -> False

19/1/2019 -- 21:27:28 - <Debug> -- Setting configuration value version -> False

19/1/2019 -- 21:27:28 - <Debug> -- Setting configuration value dump-sample-configs -> False

19/1/2019 -- 21:27:28 - <Debug> -- Setting configuration value no-test -> False

19/1/2019 -- 21:27:28 - <Debug> -- Setting configuration value subcommand -> update

19/1/2019 -- 21:27:28 - <Debug> -- Setting configuration value modify -> False

19/1/2019 -- 21:27:28 - <Debug> -- Setting configuration value no-reload -> False

19/1/2019 -- 21:27:28 - <Debug> -- Setting configuration value no-ignore -> False

19/1/2019 -- 21:27:28 - <Debug> -- Setting configuration value disable -> False

19/1/2019 -- 21:27:28 - <Debug> -- Setting configuration value etopen -> False

19/1/2019 -- 21:27:28 - <Debug> -- Setting configuration value now -> False

19/1/2019 -- 21:27:28 - <Debug> -- Setting configuration value url -> []

19/1/2019 -- 21:27:28 - <Debug> -- Setting configuration value drop -> False

19/1/2019 -- 21:27:28 - <Debug> -- Setting configuration value ignore -> []

19/1/2019 -- 21:27:28 - <Debug> -- Looking for suricata in /usr/local/sbin

19/1/2019 -- 21:27:28 - <Debug> -- Looking for suricata in /usr/local/bin

19/1/2019 -- 21:27:28 - <Debug> -- Looking for suricata in /usr/sbin

19/1/2019 -- 21:27:28 - <Debug> -- Looking for suricata in /usr/bin

19/1/2019 -- 21:27:28 - <Debug> -- Looking for suricata in /sbin

19/1/2019 -- 21:27:28 - <Debug> -- Looking for suricata in /bin

19/1/2019 -- 21:27:28 - <Warning> -- No suricata application binary found on path.

19/1/2019 -- 21:27:28 - <Info> -- Using default Suricata version of 4.0.0

19/1/2019 -- 21:27:28 - <Info> -- No sources configured, will use Emerging Threats Open

19/1/2019 -- 21:27:28 - <Info> -- Checking https://rules.emergingthreats.net/open/suricata-4.0.0/emerging.rules.tar.gz.md5.

19/1/2019 -- 21:27:28 - <Debug> -- Setting HTTP User-Agent to Suricata-Update/1.0.3 (OS: Linux; CPU: armv7l; Python: 2.7.13; Dist: debian/9.6; Suricata: 4.0.0)

19/1/2019 -- 21:27:29 - <Debug> -- Local checksum=|x|; remote checksum=|x|

19/1/2019 -- 21:27:29 - <Info> -- Remote checksum has not changed. Not fetching.

19/1/2019 -- 21:27:29 - <Warning> -- No distribution rule directory found.

19/1/2019 -- 21:27:29 - <Debug> -- Parsing rules/emerging-mobile_malware.rules.

19/1/2019 -- 21:27:29 - <Debug> -- Parsing rules/emerging-icmp.rules.

19/1/2019 -- 21:27:29 - <Debug> -- Parsing rules/tor.rules.

19/1/2019 -- 21:27:30 - <Debug> -- Parsing rules/emerging-activex.rules.

19/1/2019 -- 21:27:30 - <Debug> -- Parsing rules/emerging-icmp_info.rules.

19/1/2019 -- 21:27:30 - <Debug> -- Parsing rules/emerging-policy.rules.

19/1/2019 -- 21:27:31 - <Debug> -- Parsing rules/emerging-pop3.rules.

19/1/2019 -- 21:27:31 - <Debug> -- Parsing rules/emerging-shellcode.rules.

19/1/2019 -- 21:27:31 - <Debug> -- Parsing rules/emerging-attack_response.rules.

19/1/2019 -- 21:27:31 - <Debug> -- Parsing rules/emerging-trojan.rules.

19/1/2019 -- 21:27:36 - <Debug> -- Parsing rules/emerging-dns.rules.

19/1/2019 -- 21:27:36 - <Debug> -- Parsing rules/emerging-telnet.rules.

19/1/2019 -- 21:27:36 - <Debug> -- Parsing rules/emerging-scada.rules.

19/1/2019 -- 21:27:36 - <Debug> -- Parsing rules/emerging-misc.rules.

19/1/2019 -- 21:27:36 - <Debug> -- Parsing rules/dshield.rules.

19/1/2019 -- 21:27:36 - <Debug> -- Parsing rules/emerging-sql.rules.

19/1/2019 -- 21:27:36 - <Debug> -- Parsing rules/emerging-inappropriate.rules.

19/1/2019 -- 21:27:36 - <Debug> -- Parsing rules/emerging-web_server.rules.

19/1/2019 -- 21:27:37 - <Debug> -- Parsing rules/emerging-web_specific_apps.rules.

19/1/2019 -- 21:27:42 - <Debug> -- Parsing rules/emerging-user_agents.rules.

Thank you so much in advance for any advice on this. I have read through previous forum postings and have gathered that Suricata's Auto-Update can kill traffic collection if improperly configured.

Sincerely,
Paul

Sent from [ProtonMail](https://protonmail.ch), encrypted email based in Switzerland.

Sent with [ProtonMail](https://protonmail.com) Secure Email.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openinfosecfoundation.org/pipermail/oisf-users/attachments/20190119/86b9e254/attachment.html>


More information about the Oisf-users mailing list