Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Snort3/4 & Suricata - HTTPS/Web Application determination based on TLS 'Hello Packet' inspection without decryption

    Scheduled Pinned Locked Moved IDS/IPS
    1 Posts 1 Posters 164 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • S
      shon
      last edited by

      Does anyone know whether Snort or Suricata for pfSense can identify which WebApps via TLS Hello Packet inspection ? The Palo Alto example is pretty straight forward.

      Palo Alto:
      https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClVSCA0

      Cisco:
      https://secure.cisco.com/secure-firewall/docs/application-control

      https://www.cisco.com/c/en/us/td/docs/security/firepower/623/configuration/guide/fpmc-config-guide-v623/understanding_traffic_decryption.html

      Snort:
      https://docs.snort.org/rules/options/payload/

      Suricata:
      https://github.com/OISF/suricata/blob/master/src/detect-tls-cert-validity.c

      1 Reply Last reply Reply Quote 0
      • First post
        Last post
      Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.