Project

General

Profile

Actions

Bug #8333

closed
TY PA

detect: false alerts with drop rule using geoip

Bug #8333: detect: false alerts with drop rule using geoip

Added by Tarun Yadav about 2 months ago. Updated 19 days ago.

Status:
Closed
Priority:
Normal
Target version:
Affected Versions:
Effort:
Difficulty:
Label:

Description

When a pass rule specifies the SSH app-layer protocol and includes the geoip keyword, it generates false "blocked" alerts for certain packets in the SSH flow, even though the packets are correctly passed. This issue may also affect other app-layer protocols but I only tested and confirmed with SSH.

Environment:
  • Suricata version: 8.0.3 (same behavior in 7.0.8)
  • Mode: IPS (--simulate-ips)
  • GeoIP: Enabled
  • Protocol tested: SSH

Steps to Reproduce:

  1. Create rules file with:
    pass ssh any any -> any 22 (msg:"pass SSH Trafficnew"; geoip:any,US,IN; sid: 200;)
    drop ip any any -> any any (msg: "Drop established catch all"; flow:established, to_server; sid:999;)
    
  2. Run Suricata in IPS mode with SSH traffic:
    sudo suricata --simulate-ips -c suricata.yaml -S suricata.rules -r ssh_capture.pcapng -k none
    
  3. Examine fast.log and eve.json output
  • Expected Behavior:
    • SSH packets should be passed (no alerts)
    • Rule 200 should match all SSH packets in the flow
    • Rule 999 should not generate alerts for passed SSH traffic
  • Actual Behavior:
    • SSH packets are correctly passed (stats show "accepted":80, "blocked":0). Verified using pcap capture that it is passed correctly.
    • Alert is logged despite packet being passed.
           02/25/2026-18:24:39.707277  [Drop] [**] [1:999:0] Drop established catch all [**] [Classification: (null)] [Priority: 3] {TCP} 192.168.1.62:52296 -> 13.233.200.203:22
      
    • eve.json false alert with "action":"blocked" for packet 16 (during SSH key exchange - "Client: New Keys")

Files

ssh_capture.pcapng (14.8 KB) ssh_capture.pcapng Tarun Yadav, 02/26/2026 04:58 PM

Subtasks 1 (0 open1 closed)

Bug #8404: detect: false alerts with drop rule using geoip (8.0.x backport)ClosedPhilippe AntoineActions

PA Updated by Philippe Antoine 26 days ago Actions #2

  • Status changed from New to Assigned
  • Assignee set to Philippe Antoine
  • Target version changed from TBD to 9.0.0-beta1

PA Updated by Philippe Antoine 26 days ago Actions #3

  • Status changed from Assigned to In Review

SB Updated by Shivani Bhardwaj 25 days ago Actions #4

  • Subject changed from Pass rule with SSH protocol and geoip keyword generates false drop alerts to detect: false alerts with drop rule using geoip

PA Updated by Philippe Antoine 20 days ago Actions #5

  • Status changed from In Review to Resolved

PA Updated by Philippe Antoine 20 days ago Actions #6

  • Label Needs backport to 8.0 added

OT Updated by OISF Ticketbot 20 days ago Actions #7

  • Subtask #8404 added

OT Updated by OISF Ticketbot 20 days ago Actions #8

  • Label deleted (Needs backport to 8.0)

PA Updated by Philippe Antoine 19 days ago Actions #9

  • Status changed from Resolved to Closed
Actions

Also available in: PDF Atom