Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Suricata IPS blocks SSL traffic without alert log

    Scheduled Pinned Locked Moved IDS/IPS
    9 Posts 4 Posters 2.4k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • V
      va
      last edited by

      Hi. I found that suricata in IPS inline mode blocks SSL traffic with certificates signed by corporate internal CA. But there are no alert events regarding blocking.
      Empirically i found that these VRT rules affect SSL traffic.

      31484 SERVER-OTHER OpenSSL TLSv1.2 ChangeCipherSpec man-in-the-middle exploitation attempt
      31483 SERVER-OTHER OpenSSL TLSv1.1 ChangeCipherSpec man-in-the-middle exploitation attempt
      31482 SERVER-OTHER OpenSSL TLSv1.0 ChangeCipherSpec man-in-the-middle exploitation attempt
      31481 SERVER-OTHER OpenSSL SSL ChangeCipherSpec man-in-the-middle exploitation attempt

      2.3.2-RELEASE-p1
      suricata security 3.0_9

      Are anybody have the same issue?

      1 Reply Last reply Reply Quote 0
      • V
        va
        last edited by

        As I understand there are "flowbits:noalert;" so these rules don't generate alerts.

        1 Reply Last reply Reply Quote 0
        • B
          btspce
          last edited by

          Im seeing this also since moving to inline mode. SSL/TLS traffic is being blocked but nothing in alert log. Im running ET Pro rules. Stopping Suricata on wan solves it. It breaks connections to emailservers among other things. Outlook hangs on start.

          Any idea on where to look??

          1 Reply Last reply Reply Quote 0
          • V
            va
            last edited by

            use this regexp in dropsid management to eneble drop for all rules except "noalert flowbit".

            pcre:^.?.?alert((?!flowbits\x3a\s*?noalert).)+.(sid\x3a\s*?.?.?.?.?.?.?;).+$

            1 Reply Last reply Reply Quote 0
            • V
              va
              last edited by

              this rules (noalert) used for marking traffic only and shouldn't blocked.

              1 Reply Last reply Reply Quote 0
              • K
                kolpinkb
                last edited by

                Just to clarify, does inline mode refer to promiscuous mode?

                If so, does that mean in promiscuous mode - even with squid properly intercepting SSL traffic - suricata will not be able to inspect the encrypted data?

                Is this and will this always be the nature of promiscuous mode?  Does suricata have to be inline after squid somehow?

                1 Reply Last reply Reply Quote 0
                • D
                  doktornotor Banned
                  last edited by

                  Not exactly. Inline refers to the packets' flow (working inline vs. working on a copy of a packet).

                  1 Reply Last reply Reply Quote 0
                  • K
                    kolpinkb
                    last edited by

                    So if Suricata is working inline.  Is that inline before or after squid would be touching the packets?

                    1 Reply Last reply Reply Quote 0
                    • D
                      doktornotor Banned
                      last edited by

                      Not exactly sure what's the question here, obviously depends on the interface. If you have FPs, disable the offending rules.

                      1 Reply Last reply Reply Quote 0
                      • First post
                        Last post
                      Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.