Actions
Bug #5955
closedaf-packet: duplicate packets when sniffing on loopback interface
Affected Versions:
Effort:
Difficulty:
Label:
Description
I've recently come across this snippet in libpcap:
if (sll->sll_pkttype == PACKET_OUTGOING) {
/*
* Outgoing packet.
* If this is from the loopback device, reject it;
* we'll see the packet as an incoming packet as well,
* and we don't want to see it twice.
*/
if (sll->sll_ifindex == handlep->lo_ifindex)
return 0;
Zeek's AF_PACKET is being adapted to contain the same logic, discarding packets from loopback.
I think the same would make sense for Suricata. Currently, if you monitor a "single" HTTP request from `curl http://127.0.0.1`, the stats entries show two syns, two synacks and overlap data.
Updated by Victor Julien over 2 years ago
- Subject changed from Duplicated packets when sniffing on loopback interface to af-packet: duplicate packets when sniffing on loopback interface
Updated by Shivani Bhardwaj over 2 years ago
- Status changed from New to Closed
- Target version changed from TBD to 7.0.0-rc2
Closed by: https://github.com/OISF/suricata/pull/8778
Actions