Project

General

Profile

Actions

Bug #7279

closed
PA PA

dns: protocol detection is not strict enough

Bug #7279: dns: protocol detection is not strict enough

Added by Philippe Antoine over 1 year ago. Updated over 1 year ago.

Status:
Closed
Priority:
Normal
Target version:
Affected Versions:
Effort:
Difficulty:
Label:

Description

From https://github.com/OISF/suricata/pull/11794 and TLPR pcaps from QA showing the deviation


Related issues 1 (0 open1 closed)

Related to Suricata - Bug #7228: dns: no data logged, and no events with udp corrupt additional recordClosedPhilippe AntoineActions

PA Updated by Philippe Antoine over 1 year ago Actions #1

  • Related to Bug #7228: dns: no data logged, and no events with udp corrupt additional record added

PA Updated by Philippe Antoine over 1 year ago Actions #2

  • Subject changed from dns: custom protocol data exfiltration traffic on port 53 detected as DNS with later app-layer parser error to dns: protocol detection is not strict enough

It accepts as DNS custom protocol data exfiltration traffic on port 53 with later app-layer parser error on TLP pcap

PA Updated by Philippe Antoine over 1 year ago Actions #3

  • Status changed from New to In Review

PA Updated by Philippe Antoine over 1 year ago Actions #4

  • Status changed from In Review to Closed
Actions

Also available in: PDF Atom