Project

General

Custom queries

Profile

Actions

Feature #4965

open

protocol: SOCKS support

Added by Peter Fyon over 3 years ago. Updated 3 months ago.

Status:
In Progress
Priority:
Low
Assignee:
Target version:
Effort:
Difficulty:
Label:
Protocol

Description

Related issue: https://redmine.openinfosecfoundation.org/issues/2513

Suricata should apply application layer protocol parsers to protocols being tunneled through SOCKS.

Currently, an HTTP request being proxied through a SOCKS tunnel does not get recognized by the HTTP application layer parser. In my opinion, an HTTP request through a tunnel is still an HTTP request and should match against http.* keywords.

Likely there will need to be some keyword(s) to control this behaviour, eg. such that a signature writer could bypass the tunnel decapsulation and match traffic that pretends to be SOCKS but is not.

Ideally, this feature could be expanded in the future to apply to other types of tunneling protocols.


Files


Related issues 1 (1 open0 closed)

Related to Suricata - Feature #2513: Suricata read the SSLProxy header FeedbackCommunity TicketActions
#1

Updated by Brandon Murphy about 1 year ago

#2

Updated by Philippe Antoine 12 months ago

  • Related to Feature #2513: Suricata read the SSLProxy header added
#3

Updated by Philippe Antoine 12 months ago

  • Assignee set to OISF Dev
  • Target version set to TBD
#4

Updated by Victor Julien 6 months ago

  • Subject changed from Suricata should detect application layer protocol underneath SOCKS to protocol: SOCKS support
  • Status changed from New to In Progress
  • Assignee changed from OISF Dev to Victor Julien
  • Target version changed from TBD to 8.0.0-beta1
#6

Updated by Victor Julien 5 months ago

  • Priority changed from Normal to Low
#7

Updated by Victor Julien 3 months ago

  • Target version changed from 8.0.0-beta1 to 9.0.0-beta1
Actions

Also available in: Atom PDF