Project

General

Profile

Actions

Bug #3522

closed
GM VJ

TCP Fast Open - Bypass of stateless alerts

Bug #3522: TCP Fast Open - Bypass of stateless alerts

Added by Guillermo Muñoz about 6 years ago. Updated about 6 years ago.

Status:
Closed
Priority:
Normal
Assignee:
Target version:
Affected Versions:
Effort:
medium
Difficulty:
Label:
Needs backport

Description

I have successfully verified that Suricata on latest release version v5.0.2 doesn't detect payloads using TFO (TCP Fast Open). Attached is a .pcap file with a directory path traversal payload which reads an /etc/passwd file, suricata rule to trigger alerts on packets which contain /etc/passwd payload so as the suricata.yaml configuration file.

  1. suricata -V
    This is Suricata version 5.0.2 RELEASE
  1. suricata -c /etc/suricata/suricata.yaml -r tfo.pcap

This issue was addressed by Zeek in October, 2019.


Files

tfo.pcap (3.52 KB) tfo.pcap Guillermo Muñoz, 03/11/2020 01:36 PM
local.rules (152 Bytes) local.rules Guillermo Muñoz, 03/11/2020 01:37 PM
suricata.yaml (73.3 KB) suricata.yaml Guillermo Muñoz, 03/11/2020 01:37 PM

Related issues 1 (0 open1 closed)

Copied to Suricata - Bug #3573: TCP Fast Open - Bypass of stateless alertsClosedJeff LucovskyActions

VJ Updated by Victor Julien about 6 years ago Actions #1

  • Priority changed from Urgent to High

VJ Updated by Victor Julien about 6 years ago Actions #2

  • Status changed from New to Assigned
  • Assignee set to Victor Julien
  • Priority changed from High to Normal
  • Target version set to 6.0.0beta1
  • Label Needs backport added

JL Updated by Jeff Lucovsky about 6 years ago Actions #4

  • Copied to Bug #3573: TCP Fast Open - Bypass of stateless alerts added
Actions

Also available in: PDF Atom