Bug #5771
openxdp: Flows with nested VLANs are not bypassed by XDP filter
Description
Even though the eBPF (XDP) and Suricata structures are ready to handle nested VLANs (VLAN in VLAN) after my testing all packets were passed to Suricata.
I've found this when trying out TLS bypass - bypass TLS flow after TLS handshake. I am attaching a single TLS stream where after adding a VLAN all packets are forwarded to Suricata even though they should be bypassed after the handshake (after ~23 packets).
Files
Updated by Lukas Sismis over 2 years ago
- Subject changed from xdp: Flows with nested VLANs are not bypassed] to xdp: Flows with nested VLANs are not bypassed by XDP filter
Updated by Philippe Antoine 19 days ago
- Status changed from New to Feedback
Seems to be working for me :
Using a rule alert tls any any -> any any (sid: 43; bypass;)
. and your pcap I get no tls event and
```
"flow_bypassed": {
"local_pkts": 0,
"local_bytes": 0,
"local_capture_pkts": 65,
"local_capture_bytes": 27835,
```
and without using the rule, I get the tls event and zeroes in stats bypass