Actions
Bug #5955
closedaf-packet: duplicate packets when sniffing on loopback interface
Affected Versions:
Effort:
Difficulty:
Label:
Description
I've recently come across this snippet in libpcap:
if (sll->sll_pkttype == PACKET_OUTGOING) { /* * Outgoing packet. * If this is from the loopback device, reject it; * we'll see the packet as an incoming packet as well, * and we don't want to see it twice. */ if (sll->sll_ifindex == handlep->lo_ifindex) return 0;
Zeek's AF_PACKET is being adapted to contain the same logic, discarding packets from loopback.
I think the same would make sense for Suricata. Currently, if you monitor a "single" HTTP request from `curl http://127.0.0.1`, the stats entries show two syns, two synacks and overlap data.
Updated by Victor Julien over 1 year ago
- Subject changed from Duplicated packets when sniffing on loopback interface to af-packet: duplicate packets when sniffing on loopback interface
Updated by Shivani Bhardwaj over 1 year ago
- Status changed from New to Closed
- Target version changed from TBD to 7.0.0-rc2
Closed by: https://github.com/OISF/suricata/pull/8778
Actions