From patchwork Sun Mar 3 04:18:39 2019 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Michael Tremer X-Patchwork-Id: 2124 Return-Path: Received: from mail01.ipfire.org (mail01.i.ipfire.org [172.28.1.200]) (using TLSv1.2 with cipher ECDHE-ECDSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "mail01.ipfire.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by web07.i.ipfire.org (Postfix) with ESMTPS id D4C3588B0AC for ; Sat, 2 Mar 2019 17:19:02 +0000 (GMT) Received: from mail01.i.ipfire.org (localhost [IPv6:::1]) by mail01.ipfire.org (Postfix) with ESMTP id 44BY122nRpz5HyH6; Sat, 2 Mar 2019 17:19:02 +0000 (GMT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ipfire.org; s=201801; t=1551547142; h=from:from:sender:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:content-type: content-transfer-encoding:in-reply-to:in-reply-to: references:references:list-id:list-unsubscribe:list-subscribe:list-post; bh=yQmEoP+aUllaggbCkrZG8SC9z/9/ySCDBU/CmPoz3G4=; b=fzRyV3D8iFDB/mzt/pvA2cbQjIxWD+yFlFJidCiVoZBdhx+E2xPaEj4wc8S++QGeMnrvhc unUDGvYWlskirOL72LYr131a2pooF/WPhij2uKedDX/9ijvyu2auIyiQAAkedJOFV4XgW6 7Zs4iXJ63Vi0iyNU6pUkS+rhoy7dzPZLEUDmgHxmjDqqPGBHrCz7JYNOsfhaBF3lEbw2qa fP7PFxvo2FaMElW+RYu4kLptrPr0DjMvhaxQHnbOonGCc08tZEuhS/We7JGi7ef99/e4iN S0nuEgqTupL40v9sWnxEBDT/fqqZW+3OL2MLqC0uKRlKaWLI0jFsCyxfXj/Nfg== Received: from ipfire.tremer.co.uk (unknown [88.215.19.234]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mail01.ipfire.org (Postfix) with ESMTPSA id 44BY0s36Gvz5HLY3; Sat, 2 Mar 2019 17:18:53 +0000 (GMT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ipfire.org; s=201801; t=1551547133; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:content-type: content-transfer-encoding:in-reply-to:in-reply-to: references:references; bh=yQmEoP+aUllaggbCkrZG8SC9z/9/ySCDBU/CmPoz3G4=; b=Ec55A7rcnJ4YowhulEj2oZS8dorsm8q4DOTuERa3olsEn8X0uttoQHhrsaTDypqleaxssO bTy4eDlsnUSKRRc7G2EKX3wDzWcxi3lP8n5WXY5foBF2LFtYhKbqRYqPyJyAVP/3yH0fui JVChXfhNhq+K0cbP96WmbYlsb/1dUDmKWsMwHZE90C4I+tuhMnA08CTJXLyuDTZFiqJS5K TVdWPDA34rbsyH8DyXibHioFqSOR7XDL+QIc+yYt6n+RfT+xNHzdVp3HMmIi4nJC3tqUd9 1sFAjHCa44/8+q68Wkm99P/NZs3q0+xFUGM5ez6h6p15BJkgY5wWaA2VJ2tyzg== From: Michael Tremer To: development@lists.ipfire.org Subject: [PATCH v2 3/3] suricata: Drop parsers I have never heard of Date: Sat, 2 Mar 2019 17:18:39 +0000 Message-Id: <20190302171839.16341-3-michael.tremer@ipfire.org> X-Mailer: git-send-email 2.12.2 In-Reply-To: <20190302171839.16341-1-michael.tremer@ipfire.org> References: <20190302171839.16341-1-michael.tremer@ipfire.org> Authentication-Results: mail01.ipfire.org; auth=pass smtp.auth=ms smtp.mailfrom=michael.tremer@ipfire.org X-Spamd-Result: default: False [-8.34 / 11.00]; ARC_NA(0.00)[]; FROM_HAS_DN(0.00)[]; TO_DN_SOME(0.00)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; MIME_GOOD(-0.10)[text/plain]; REPLY(-4.00)[]; DKIM_SIGNED(0.00)[]; RCPT_COUNT_TWO(0.00)[2]; MID_CONTAINS_FROM(1.00)[]; NEURAL_HAM(-2.71)[-0.903,0]; RCVD_COUNT_ZERO(0.00)[0]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+]; ASN(0.00)[asn:31655, ipnet:88.215.0.0/18, country:GB]; RCVD_TLS_ALL(0.00)[]; BAYES_HAM(-2.53)[97.90%] X-Spam-Status: No, score=-8.34 X-Rspamd-Server: mail01.i.ipfire.org Cc: Michael Tremer X-BeenThere: development@lists.ipfire.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: IPFire development talk List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: development-bounces@lists.ipfire.org Sender: "Development" Signed-off-by: Michael Tremer --- config/suricata/suricata.yaml | 34 ---------------------------------- 1 file changed, 34 deletions(-) diff --git a/config/suricata/suricata.yaml b/config/suricata/suricata.yaml index 84c4aa2a7..8b4ab8c3b 100644 --- a/config/suricata/suricata.yaml +++ b/config/suricata/suricata.yaml @@ -257,40 +257,6 @@ app-layer: double-decode-path: no double-decode-query: no - # Note: Modbus probe parser is minimalist due to the poor significant field - # Only Modbus message length (greater than Modbus header length) - # And Protocol ID (equal to 0) are checked in probing parser - # It is important to enable detection port and define Modbus port - # to avoid false positive - modbus: - # How many unreplied Modbus requests are considered a flood. - # If the limit is reached, app-layer-event:modbus.flooded; will match. - #request-flood: 500 - - enabled: no - detection-ports: - dp: 502 - # According to MODBUS Messaging on TCP/IP Implementation Guide V1.0b, it - # is recommended to keep the TCP connection opened with a remote device - # and not to open and close it for each MODBUS/TCP transaction. In that - # case, it is important to set the depth of the stream reassembling as - # unlimited (stream.reassembly.depth: 0) - - # Stream reassembly size for modbus. By default track it completely. - stream-depth: 0 - - # DNP3 - dnp3: - enabled: no - detection-ports: - dp: 20000 - - # SCADA EtherNet/IP and CIP protocol support - enip: - enabled: no - detection-ports: - dp: 44818 - sp: 44818 # Limit for the maximum number of asn1 frames to decode (default 256) asn1-max-frames: 256