I get this very broken tcpdump trace (see below). My server (10.10.200.164) dutifully replies to the SYNs to an obvious broken or malicious client (75.183.234.180) that is using source port 80.
My question is why is Suricata alerting with resend with different acks?
As you can see, ACKs seem legitimate; Is suricata getting confused by the source port being 80?
03/10/2021-19:56:43.704523 [] [1:2210004:2] SURICATA STREAM 3way handshake SYNACK resend with different ack [] [Classification: Generic Protocol Command Decode] [Priority: 3] {TCP} 10.10.200.164:443 → 75.183.234.180:80
03/10/2021-19:56:48.730139 [] [1:2210004:2] SURICATA STREAM 3way handshake SYNACK resend with different ack [] [Classification: Generic Protocol Command Decode] [Priority: 3] {TCP} 10.10.200.164:443 → 75.183.234.180:80
03/10/2021-19:56:48.730480 [] [1:2210004:2] SURICATA STREAM 3way handshake SYNACK resend with different ack [] [Classification: Generic Protocol Command Decode] [Priority: 3] {TCP} 10.10.200.164:443 → 75.183.234.180:80
03/10/2021-19:56:52.770404 [] [1:2210004:2] SURICATA STREAM 3way handshake SYNACK resend with different ack [] [Classification: Generic Protocol Command Decode] [Priority: 3] {TCP} 10.10.200.164:443 → 75.183.234.180:80
03/10/2021-19:57:00.117941 [] [1:2210004:2] SURICATA STREAM 3way handshake SYNACK resend with different ack [] [Classification: Generic Protocol Command Decode] [Priority: 3] {TCP} 10.10.200.164:443 → 75.183.234.180:80
03/10/2021-19:57:13.101787 [] [1:2210004:2] SURICATA STREAM 3way handshake SYNACK resend with different ack [] [Classification: Generic Protocol Command Decode] [Priority: 3] {TCP} 10.10.200.164:443 → 75.183.234.180:80
03/10/2021-19:57:57.633964 [] [1:2210004:2] SURICATA STREAM 3way handshake SYNACK resend with different ack [] [Classification: Generic Protocol Command Decode] [Priority: 3] {TCP} 10.10.200.164:443 → 75.183.234.180:80
03/10/2021-19:57:57.634433 [] [1:2210004:2] SURICATA STREAM 3way handshake SYNACK resend with different ack [] [Classification: Generic Protocol Command Decode] [Priority: 3] {TCP} 10.10.200.164:443 → 75.183.234.180:80
03/10/2021-19:58:02.102512 [] [1:2210004:2] SURICATA STREAM 3way handshake SYNACK resend with different ack [] [Classification: Generic Protocol Command Decode] [Priority: 3] {TCP} 10.10.200.164:443 → 75.183.234.180:80
03/10/2021-19:58:02.102624 [] [1:2210004:2] SURICATA STREAM 3way handshake SYNACK resend with different ack [] [Classification: Generic Protocol Command Decode] [Priority: 3] {TCP} 10.10.200.164:443 → 75.183.234.180:80
03/10/2021-19:58:10.943018 [] [1:2210004:2] SURICATA STREAM 3way handshake SYNACK resend with different ack [] [Classification: Generic Protocol Command Decode] [Priority: 3] {TCP} 10.10.200.164:443 → 75.183.234.180:80
03/10/2021-19:58:28.850221 [] [1:2210004:2] SURICATA STREAM 3way handshake SYNACK resend with different ack [] [Classification: Generic Protocol Command Decode] [Priority: 3] {TCP} 10.10.200.164:443 → 75.183.234.180:80
19:56:40.665825 IP 75.183.234.180.80 > 10.10.200.164.443: Flags [S], seq 714790283, win 5840, length 0
19:56:40.665922 IP 10.10.200.164.443 > 75.183.234.180.80: Flags [S.], seq 1131111674, ack 714790284, win 26883, options [mss 8961], length 0
19:56:41.866019 IP 10.10.200.164.443 > 75.183.234.180.80: Flags [S.], seq 1131111674, ack 714790284, win 26883, options [mss 8961], length 0
19:56:43.866037 IP 10.10.200.164.443 > 75.183.234.180.80: Flags [S.], seq 1131111674, ack 714790284, win 26883, options [mss 8961], length 0
19:56:47.866028 IP 10.10.200.164.443 > 75.183.234.180.80: Flags [S.], seq 1131111674, ack 714790284, win 26883, options [mss 8961], length 0
19:56:56.066022 IP 10.10.200.164.443 > 75.183.234.180.80: Flags [S.], seq 1131111674, ack 714790284, win 26883, options [mss 8961], length 0
19:57:12.066018 IP 10.10.200.164.443 > 75.183.234.180.80: Flags [S.], seq 1131111674, ack 714790284, win 26883, options [mss 8961], length 0
19:57:50.860042 IP 75.183.234.180.80 > 10.10.200.164.443: Flags [S], seq 215330200, win 5840, length 0
19:57:50.860141 IP 10.10.200.164.443 > 75.183.234.180.80: Flags [S.], seq 2227896315, ack 215330201, win 26883, options [mss 8961], length 0
19:57:52.061983 IP 10.10.200.164.443 > 75.183.234.180.80: Flags [S.], seq 2227896315, ack 215330201, win 26883, options [mss 8961], length 0
19:57:54.062018 IP 10.10.200.164.443 > 75.183.234.180.80: Flags [S.], seq 2227896315, ack 215330201, win 26883, options [mss 8961], length 0
19:57:58.062016 IP 10.10.200.164.443 > 75.183.234.180.80: Flags [S.], seq 2227896315, ack 215330201, win 26883, options [mss 8961], length 0
19:58:06.061998 IP 10.10.200.164.443 > 75.183.234.180.80: Flags [S.], seq 2227896315, ack 215330201, win 26883, options [mss 8961], length 0
19:58:22.262031 IP 10.10.200.164.443 > 75.183.234.180.80: Flags [S.], seq 2227896315, ack 215330201, win 26883, options [mss 8961], length 0