• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

Snort3/4 & Suricata - HTTPS/Web Application determination based on TLS 'Hello Packet' inspection without decryption

Scheduled Pinned Locked Moved IDS/IPS
1 Posts 1 Posters 159 Views
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • S
    shon
    last edited by Aug 27, 2024, 2:45 PM

    Does anyone know whether Snort or Suricata for pfSense can identify which WebApps via TLS Hello Packet inspection ? The Palo Alto example is pretty straight forward.

    Palo Alto:
    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClVSCA0

    Cisco:
    https://secure.cisco.com/secure-firewall/docs/application-control

    https://www.cisco.com/c/en/us/td/docs/security/firepower/623/configuration/guide/fpmc-config-guide-v623/understanding_traffic_decryption.html

    Snort:
    https://docs.snort.org/rules/options/payload/

    Suricata:
    https://github.com/OISF/suricata/blob/master/src/detect-tls-cert-validity.c

    1 Reply Last reply Reply Quote 0
    1 out of 1
    • First post
      1/1
      Last post
    Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
      This community forum collects and processes your personal information.
      consent.not_received