Project

General

Profile

Actions

Support #8285

open

fw: support iprep in firewall mode

Added by Aneesh Patel 2 days ago.

Status:
New
Priority:
Normal
Assignee:
-
Affected Versions:
Label:
Needs Suricata-Verify test

Description

In Suricata 8.0.3, the firewall modes rule engine is able to parse and accept iprep rules that are configured correctly, however it does not seem to functionally match on them correctly. I have attached the artifacts for a suricata-verify test I would expect to pass. Input.pcap is just a simple 10 packet http get request to 82.165.177.154.

The following rules -

# Packet rules

accept:hook tcp:all any any -> any any (sid:100;)
# default drop

drop:flow http1:request_line any any -> any any (sid:999; alert; iprep:dst,test,>,0;)

I would expect to drop the flow at packet 4. This would mean 1 drop event and then the stats log showing that there was 3 packets accepted (handshake packets allowed by accept:hook on tcp:all) and then 7 dropped by the drop:flow rule utilizing iprep.

To be extra sure about this behavior, I set up the same test manually by starting up suricata in af-packet mode and replaying the pcap on a TX interface into suricata. I could see that all the packets were allowed through even though the rule, per my understanding, should match and drop.

This ticket to request support for iprep in firewall mode rules.


Files

categories.txt (15 Bytes) categories.txt Aneesh Patel, 02/13/2026 05:27 PM
firewall.rules (168 Bytes) firewall.rules Aneesh Patel, 02/13/2026 05:27 PM
iprep.list (19 Bytes) iprep.list Aneesh Patel, 02/13/2026 05:27 PM
input.pcap (1.08 KB) input.pcap Aneesh Patel, 02/13/2026 05:27 PM
suricata.yaml (187 Bytes) suricata.yaml Aneesh Patel, 02/13/2026 05:27 PM
test.yaml (414 Bytes) test.yaml Aneesh Patel, 02/13/2026 05:27 PM

No data to display

Actions

Also available in: Atom PDF