Actions
Bug #3522
closedTCP Fast Open - Bypass of stateless alerts
Affected Versions:
Effort:
medium
Difficulty:
Label:
Needs backport
Description
I have successfully verified that Suricata on latest release version v5.0.2 doesn't detect payloads using TFO (TCP Fast Open). Attached is a .pcap file with a directory path traversal payload which reads an /etc/passwd file, suricata rule to trigger alerts on packets which contain /etc/passwd payload so as the suricata.yaml configuration file.
- suricata -V
This is Suricata version 5.0.2 RELEASE
- suricata -c /etc/suricata/suricata.yaml -r tfo.pcap
This issue was addressed by Zeek in October, 2019.
Files
Updated by Victor Julien almost 5 years ago
- Priority changed from Urgent to High
Updated by Victor Julien almost 5 years ago
- Status changed from New to Assigned
- Assignee set to Victor Julien
- Priority changed from High to Normal
- Target version set to 6.0.0beta1
- Label Needs backport added
Updated by Victor Julien almost 5 years ago
- Status changed from Assigned to Closed
Updated by Jeff Lucovsky over 4 years ago
- Copied to Bug #3573: TCP Fast Open - Bypass of stateless alerts added
Actions