Suricata: detect TLS traffic on port 444, too

Message ID 407990e1-b28c-546a-d1b5-d99901eaee8e@ipfire.org
State Accepted
Commit 1f3c61b66c77898707791519b837e61b1d2e6ad0
Headers
Series Suricata: detect TLS traffic on port 444, too |

Commit Message

Peter Müller Feb. 23, 2019, 7:16 a.m. UTC
  This is the default port for IPFire's administrative web interface
and should be monitored by Suricata, too.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
c: Stefan Schantl <stefan.schantl@ipfire.org>
---
 config/suricata/suricata.yaml | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)
  

Comments

Michael Tremer Feb. 28, 2019, 2:27 a.m. UTC | #1
Acked-by: Michael Tremer <michael.tremer@ipfire.org>

> On 22 Feb 2019, at 20:16, Peter Müller <peter.mueller@ipfire.org> wrote:
> 
> This is the default port for IPFire's administrative web interface
> and should be monitored by Suricata, too.
> 
> Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
> c: Stefan Schantl <stefan.schantl@ipfire.org>
> ---
> config/suricata/suricata.yaml | 2 +-
> 1 file changed, 1 insertion(+), 1 deletion(-)
> 
> diff --git a/config/suricata/suricata.yaml b/config/suricata/suricata.yaml
> index 4fbd32b85..0ff06f4ae 100644
> --- a/config/suricata/suricata.yaml
> +++ b/config/suricata/suricata.yaml
> @@ -140,7 +140,7 @@ app-layer:
>     tls:
>       enabled: yes
>       detection-ports:
> -        dp: "[443,465,993,995]"
> +        dp: "[443,444,465,993,995]"
> 
>       # Completely stop processing TLS/SSL session after the handshake
>       # completed. If bypass is enabled this will also trigger flow
> -- 
> 2.16.4
  
Stefan Schantl March 2, 2019, 4:11 a.m. UTC | #2
Merged.

Best regards,

-Stefan
> Acked-by: Michael Tremer <michael.tremer@ipfire.org>
> 
> > On 22 Feb 2019, at 20:16, Peter Müller <peter.mueller@ipfire.org>
> > wrote:
> > 
> > This is the default port for IPFire's administrative web interface
> > and should be monitored by Suricata, too.
> > 
> > Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
> > c: Stefan Schantl <stefan.schantl@ipfire.org>
> > ---
> > config/suricata/suricata.yaml | 2 +-
> > 1 file changed, 1 insertion(+), 1 deletion(-)
> > 
> > diff --git a/config/suricata/suricata.yaml
> > b/config/suricata/suricata.yaml
> > index 4fbd32b85..0ff06f4ae 100644
> > --- a/config/suricata/suricata.yaml
> > +++ b/config/suricata/suricata.yaml
> > @@ -140,7 +140,7 @@ app-layer:
> >     tls:
> >       enabled: yes
> >       detection-ports:
> > -        dp: "[443,465,993,995]"
> > +        dp: "[443,444,465,993,995]"
> > 
> >       # Completely stop processing TLS/SSL session after the
> > handshake
> >       # completed. If bypass is enabled this will also trigger flow
> > -- 
> > 2.16.4
  

Patch

diff --git a/config/suricata/suricata.yaml b/config/suricata/suricata.yaml
index 4fbd32b85..0ff06f4ae 100644
--- a/config/suricata/suricata.yaml
+++ b/config/suricata/suricata.yaml
@@ -140,7 +140,7 @@  app-layer:
     tls:
       enabled: yes
       detection-ports:
-        dp: "[443,465,993,995]"
+        dp: "[443,444,465,993,995]"
 
       # Completely stop processing TLS/SSL session after the handshake
       # completed. If bypass is enabled this will also trigger flow