Project

General

Profile

Actions

Bug #8333

open

detect: false alerts with drop rule using geoip

Added by Tarun Yadav 24 days ago. Updated 2 days ago.

Status:
In Review
Priority:
Normal
Target version:
Affected Versions:
Effort:
Difficulty:
Label:

Description

When a pass rule specifies the SSH app-layer protocol and includes the geoip keyword, it generates false "blocked" alerts for certain packets in the SSH flow, even though the packets are correctly passed. This issue may also affect other app-layer protocols but I only tested and confirmed with SSH.

Environment:
  • Suricata version: 8.0.3 (same behavior in 7.0.8)
  • Mode: IPS (--simulate-ips)
  • GeoIP: Enabled
  • Protocol tested: SSH

Steps to Reproduce:

  1. Create rules file with:
    pass ssh any any -> any 22 (msg:"pass SSH Trafficnew"; geoip:any,US,IN; sid: 200;)
    drop ip any any -> any any (msg: "Drop established catch all"; flow:established, to_server; sid:999;)
    
  2. Run Suricata in IPS mode with SSH traffic:
    sudo suricata --simulate-ips -c suricata.yaml -S suricata.rules -r ssh_capture.pcapng -k none
    
  3. Examine fast.log and eve.json output
  • Expected Behavior:
    • SSH packets should be passed (no alerts)
    • Rule 200 should match all SSH packets in the flow
    • Rule 999 should not generate alerts for passed SSH traffic
  • Actual Behavior:
    • SSH packets are correctly passed (stats show "accepted":80, "blocked":0). Verified using pcap capture that it is passed correctly.
    • Alert is logged despite packet being passed.
           02/25/2026-18:24:39.707277  [Drop] [**] [1:999:0] Drop established catch all [**] [Classification: (null)] [Priority: 3] {TCP} 192.168.1.62:52296 -> 13.233.200.203:22
      
    • eve.json false alert with "action":"blocked" for packet 16 (during SSH key exchange - "Client: New Keys")

Files

ssh_capture.pcapng (14.8 KB) ssh_capture.pcapng Tarun Yadav, 02/26/2026 04:58 PM
Actions #2

Updated by Philippe Antoine 3 days ago

  • Status changed from New to Assigned
  • Assignee set to Philippe Antoine
  • Target version changed from TBD to 9.0.0-beta1
Actions #3

Updated by Philippe Antoine 3 days ago

  • Status changed from Assigned to In Review
Actions #4

Updated by Shivani Bhardwaj 2 days ago

  • Subject changed from Pass rule with SSH protocol and geoip keyword generates false drop alerts to detect: false alerts with drop rule using geoip
Actions

Also available in: Atom PDF