Project

General

Profile

Actions

Bug #3573

closed

TCP Fast Open - Bypass of stateless alerts

Added by Jeff Lucovsky over 1 year ago. Updated over 1 year ago.

Status:
Closed
Priority:
Normal
Assignee:
Target version:
Affected Versions:
Effort:
medium
Difficulty:
Label:

Description

I have successfully verified that Suricata on latest release version v5.0.2 doesn't detect payloads using TFO (TCP Fast Open). Attached is a .pcap file with a directory path traversal payload which reads an /etc/passwd file, suricata rule to trigger alerts on packets which contain /etc/passwd payload so as the suricata.yaml configuration file.

  1. suricata -V
    This is Suricata version 5.0.2 RELEASE
  1. suricata -c /etc/suricata/suricata.yaml -r tfo.pcap

This issue was addressed by Zeek in October, 2019.


Files

tfo.pcap (3.52 KB) tfo.pcap Guillermo Muñoz, 03/11/2020 01:36 PM
local.rules (152 Bytes) local.rules Guillermo Muñoz, 03/11/2020 01:37 PM
suricata.yaml (73.3 KB) suricata.yaml Guillermo Muñoz, 03/11/2020 01:37 PM

Related issues

Copied from Bug #3522: TCP Fast Open - Bypass of stateless alertsClosedVictor JulienActions
Actions #1

Updated by Jeff Lucovsky over 1 year ago

  • Copied from Bug #3522: TCP Fast Open - Bypass of stateless alerts added
Actions #2

Updated by Jeff Lucovsky over 1 year ago

  • Status changed from New to Assigned
Actions #3

Updated by Jeff Lucovsky over 1 year ago

  • Status changed from Assigned to In Review
Actions #4

Updated by Jeff Lucovsky over 1 year ago

  • Status changed from In Review to Closed
Actions

Also available in: Atom PDF