-
Notifications
You must be signed in to change notification settings - Fork 1.7k
detect: investigation on single-pkt flows inspection (5180) - v1 #14677
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
In corner case scenarios of the engine seeing a single-packet flow started midstream, it would skip certain inspections for the packet due to TCP connection not being established yet. This led to the possibility of a real packet not being blocked, in iPS, or matched against rules, as the corresponding portion of the stream was only inspected later, as part of the stream/flow-timeout logic. Checking if midstream is enabled allows the engine to inspect that traffic earlier, and block the corresponding packet, if need be. Related to Bug OISF#5180
During initialization, the engine reports how many rules were loaded, as well as which types. Pkt-only or stream-pkt rules would cause a "hole" in such stats, as they're not counted.
bad716a to
59d6c49
Compare
Codecov Report❌ Patch coverage is Additional details and impacted files@@ Coverage Diff @@
## main #14677 +/- ##
=======================================
Coverage 82.11% 82.12%
=======================================
Files 1011 1011
Lines 262812 262825 +13
=======================================
+ Hits 215812 215839 +27
+ Misses 47000 46986 -14
Flags with carried forward coverage won't be shown. Click here to find out more. 🚀 New features to boost your workflow:
|
|
Forced-push the clang-format fix. |
|
"In corner case scenarios" - please describe the scenario(s) in which this can happen. |
|
Information: QA ran without warnings. Pipeline = 29251 |
catenacyber
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Typo in commit message iPS
Also needs rebase
|
another attempt: #14704 |
Link to ticket: https://redmine.openinfosecfoundation.org/issues/
https://redmine.openinfosecfoundation.org/issues/5180
Describe changes:
connected, yet (noticed while debugging the behavior noticed in tests: check that drop is applied even if alert is discarded - v2 suricata-verify#2863)Provide values to any of the below to override the defaults.
SV_BRANCH=OISF/suricata-verify#2884