-
Notifications
You must be signed in to change notification settings - Fork 90
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Bug 7318/v3 #2148
Bug 7318/v3 #2148
Conversation
@@ -0,0 +1,22 @@ | |||
requires: |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
actually this is an unrelated test
@@ -6,11 +6,24 @@ args: | |||
|
|||
checks: | |||
- filter: | |||
min-version: 8 | |||
count: 24 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
this I think makes sense, the sig is
drop ip any any -> any any (msg:"Drop all else"; flow:stateless; sid:3;)
If there are no "real" packets, why raise alerts?
@@ -9,6 +9,22 @@ args: | |||
|
|||
checks: | |||
- filter: | |||
min-version: 8 | |||
count: 25 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The rule here is
alert http any any -> any any (sid: 1;)
Should it match on the stream end packets?
@catenacyber are there cases where only at the end of the stream, with the pseudo packets we detect the app protocol? I guess we could, if data stays un-ack'd, then stream terminates, FFR will force handling of un-ACK'd data, detect protocol.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I also guess we could indeed...
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
It matched in master on sid 2, in OISF/suricata#12169 it won't match.
Data is unacked, so is only processed by flow timeout packets. This is when alert will be generated.
I think this should get closed in favor of the other couple of Suricata + SV PR |
#2174 has just the sig packet type test updates |
Various tests related to changes in handling of flow timeout packets.