Project

General

Profile

Actions

Feature #8285

closed

firewall: support iprep in firewall mode

Added by Aneesh Patel 24 days ago. Updated 13 days ago.

Status:
Closed
Priority:
Normal
Assignee:
Target version:
Effort:
Difficulty:
Label:

Description

In Suricata 8.0.3, the firewall modes rule engine is able to parse and accept iprep rules that are configured correctly, however it does not seem to functionally match on them correctly. I have attached the artifacts for a suricata-verify test I would expect to pass. Input.pcap is just a simple 10 packet http get request to 82.165.177.154.

The following rules -

# Packet rules

accept:hook tcp:all any any -> any any (sid:100;)
# default drop

drop:flow http1:request_line any any -> any any (sid:999; alert; iprep:dst,test,>,0;)

I would expect to drop the flow at packet 4. This would mean 1 drop event and then the stats log showing that there was 3 packets accepted (handshake packets allowed by accept:hook on tcp:all) and then 7 dropped by the drop:flow rule utilizing iprep.

To be extra sure about this behavior, I set up the same test manually by starting up suricata in af-packet mode and replaying the pcap on a TX interface into suricata. I could see that all the packets were allowed through even though the rule, per my understanding, should match and drop.

This ticket to request support for iprep in firewall mode rules.


Files

categories.txt (15 Bytes) categories.txt Aneesh Patel, 02/13/2026 05:27 PM
firewall.rules (168 Bytes) firewall.rules Aneesh Patel, 02/13/2026 05:27 PM
iprep.list (19 Bytes) iprep.list Aneesh Patel, 02/13/2026 05:27 PM
input.pcap (1.08 KB) input.pcap Aneesh Patel, 02/13/2026 05:27 PM
suricata.yaml (187 Bytes) suricata.yaml Aneesh Patel, 02/13/2026 05:27 PM
test.yaml (414 Bytes) test.yaml Aneesh Patel, 02/13/2026 05:27 PM

Subtasks 1 (0 open1 closed)

Feature #8316: firewall: support iprep in firewall mode (8.0.x backport)ClosedVictor JulienActions
Actions #1

Updated by Victor Julien 19 days ago

  • Tracker changed from Support to Feature
  • Subject changed from fw: support iprep in firewall mode to firewall: support iprep in firewall mode
  • Status changed from New to Assigned
  • Assignee set to Victor Julien
  • Target version set to 9.0.0-beta1
  • Affected Versions deleted (8.0.3)
Actions #2

Updated by Victor Julien 19 days ago

  • Status changed from Assigned to In Review

I've built a set of tests here:
https://github.com/OISF/suricata-verify/pull/2919

Can you have a look? To me they show everything working as expected.

I've added this PR to mark iprep as supported https://github.com/OISF/suricata/pull/14833

Actions #3

Updated by Aneesh Patel 19 days ago

Victor Julien wrote in #note-2:

I've built a set of tests here:
https://github.com/OISF/suricata-verify/pull/2919

Can you have a look? To me they show everything working as expected.

I've added this PR to mark iprep as supported https://github.com/OISF/suricata/pull/14833

Victor Julien wrote in #note-2:

I've built a set of tests here:
https://github.com/OISF/suricata-verify/pull/2919

Can you have a look? To me they show everything working as expected.

I've added this PR to mark iprep as supported https://github.com/OISF/suricata/pull/14833

Yup this looks good - thank you!

Actions #4

Updated by Aneesh Patel 19 days ago

Victor Julien wrote in #note-2:

I've built a set of tests here:
https://github.com/OISF/suricata-verify/pull/2919

Can you have a look? To me they show everything working as expected.

I've added this PR to mark iprep as supported https://github.com/OISF/suricata/pull/14833

Yup this looks good - thank you!

Actions #5

Updated by Victor Julien 16 days ago

  • Status changed from In Review to Resolved
  • Label Needs backport to 8.0 added
  • Label deleted (Needs Suricata-Verify test)
Actions #6

Updated by OISF Ticketbot 16 days ago

  • Subtask #8316 added
Actions #7

Updated by OISF Ticketbot 16 days ago

  • Label deleted (Needs backport to 8.0)
Actions #8

Updated by Victor Julien 13 days ago

  • Status changed from Resolved to Closed
Actions

Also available in: Atom PDF