Feature #3379
openFiltering ICAP Protocoll on lo Interface
Description
It would be very nice when Suricata can handle the ICAP protocoll for filtering decrypted SSL Web Traffic.
Proxies - for example Squid - often are doing SSL Inspection through local loopback interface (lo) ICAP Protocol on Port 1344.
I can configure Suricata to listen on "lo" Interface, but Suricata is not alerting the rules on this decrypted Web Traffic which is readable on lo interface also for suricata.
I guess suricata needs an "ICAP Wrapper", so a new feature?
Files
Updated by Schroeffu Schroeffu almost 5 years ago
Attached you'll see an example of the only Suricata alert i get sometimes while monitoring local loopback interface, on that all the decrypted web traffic goes through for virus scanning (custom port 13444 instead of 1344). I should see much more alert hits from suricata, so suricata seems not to understand ICAP yet.
Updated by Victor Julien over 1 year ago
- Related to Feature #6101: icap: app-layer protocol support added
Updated by Philippe Antoine over 1 year ago
- Assignee set to OISF Dev
Do you have some pcaps that can be shared ?