Project

General

Profile

Actions

Bug #3522

closed

TCP Fast Open - Bypass of stateless alerts

Added by Guillermo Muñoz almost 5 years ago. Updated almost 5 years ago.

Status:
Closed
Priority:
Normal
Assignee:
Target version:
Affected Versions:
Effort:
medium
Difficulty:
Label:
Needs backport

Description

I have successfully verified that Suricata on latest release version v5.0.2 doesn't detect payloads using TFO (TCP Fast Open). Attached is a .pcap file with a directory path traversal payload which reads an /etc/passwd file, suricata rule to trigger alerts on packets which contain /etc/passwd payload so as the suricata.yaml configuration file.

  1. suricata -V
    This is Suricata version 5.0.2 RELEASE
  1. suricata -c /etc/suricata/suricata.yaml -r tfo.pcap

This issue was addressed by Zeek in October, 2019.


Files

tfo.pcap (3.52 KB) tfo.pcap Guillermo Muñoz, 03/11/2020 01:36 PM
local.rules (152 Bytes) local.rules Guillermo Muñoz, 03/11/2020 01:37 PM
suricata.yaml (73.3 KB) suricata.yaml Guillermo Muñoz, 03/11/2020 01:37 PM

Related issues 1 (0 open1 closed)

Copied to Suricata - Bug #3573: TCP Fast Open - Bypass of stateless alertsClosedJeff LucovskyActions
Actions #1

Updated by Victor Julien almost 5 years ago

  • Priority changed from Urgent to High
Actions #2

Updated by Victor Julien almost 5 years ago

  • Status changed from New to Assigned
  • Assignee set to Victor Julien
  • Priority changed from High to Normal
  • Target version set to 6.0.0beta1
  • Label Needs backport added
Actions #4

Updated by Jeff Lucovsky over 4 years ago

  • Copied to Bug #3573: TCP Fast Open - Bypass of stateless alerts added
Actions

Also available in: Atom PDF