-
Notifications
You must be signed in to change notification settings - Fork 90
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Verify bypass behavior under different traffic profiles v3 #2114
Verify bypass behavior under different traffic profiles v3 #2114
Conversation
Ticket: 6788
@@ -4,7 +4,7 @@ features: | |||
- RUST | |||
|
|||
args: | |||
- -k none --set stream.bypass=yes | |||
- -k none --set stream.bypass=yes --set app-layer.protocols.ssh.encryption-handling=bypass |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Why do we need this change ?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
behavior change
- Encrypted SSH traffic bypass is now independently controlled through
app-layer.protocols.ssh.encryption-handling
setting. The setting can either
bebypass
,default
orfull
.
To retain the previous behavior of encrypted traffic bypass
combined with stream depth bypass, set
app-layer.protocols.ssh.encryption-handling
tobypass
(while also
settingapp-layer.protocols.tls.encryption-handling
tobypass
and
stream.bypass
totrue
).
Previously SSH was bypassed after the session turned encrypted, now we need to be more explicit.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Re
Previously SSH was bypassed after the session turned encrypted, now we need to be more explicit.
So previously when the SSH session turned encrypted and stream bypass was allowed then it bypassed the flow. This was not related to reaching the stream depth but only to the session state.
Currently, you can replicate the behavior with setting encryption handling to bypass.
@@ -0,0 +1,18 @@ | |||
requires: | |||
min-version: 8 | |||
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Is it reusing a pcap ?
cont in #2170 P's comment is mentioned in the PR |
Follow-up of #2078
Redmine ticket:
https://redmine.openinfosecfoundation.org/issues/6788
Note:
Describe changes:
v3: