Hi Jeff,
I’m not sure what you mean by <logging, pcap, rule args>
.
I just ran it the way I usually do the verbosity flags:
suricata -c /etc/suricata/suricata.yaml -q 999 -vvv 2>&1 >/tmp/out
But I don’t see the config output in /tmp/out (grep returns nothing). TBH it seems like -vvv
had no effect.
I tried running with a pcap file -r <pcap file>
and also no change.
Here are a few examples of the deny flow when I don’t explicitly set the policy to ignore
:
{
"timestamp": "2023-08-27T05:57:11.762905+0000",
"flow_id": 2150756213700390,
"event_type": "drop",
"src_ip": "10.0.40.6",
"src_port": 23157,
"dest_ip": "<reducted1>",
"dest_port": 443,
"proto": "TCP",
"pkt_src": "wire/pcap",
"direction": "to_server",
"drop": {
"len": 1112,
"tos": 0,
"ttl": 64,
"ipid": 64019,
"tcpseq": 3123774421,
"tcpack": 1932030041,
"tcpwin": 501,
"syn": false,
"ack": true,
"psh": true,
"rst": false,
"urg": false,
"fin": false,
"tcpres": 0,
"tcpurgp": 0,
"reason": "stream midstream"
}
},
{
"timestamp": "2023-08-27T05:57:24.213124+0000",
"flow_id": 1196838486818802,
"event_type": "drop",
"src_ip": "10.0.40.6",
"src_port": 33617,
"dest_ip": "<reducted2>",
"dest_port": 80,
"proto": "TCP",
"pkt_src": "wire/pcap",
"direction": "to_server",
"drop": {
"len": 52,
"tos": 0,
"ttl": 64,
"ipid": 63572,
"tcpseq": 1002311777,
"tcpack": 3557248460,
"tcpwin": 501,
"syn": false,
"ack": true,
"psh": false,
"rst": false,
"urg": false,
"fin": false,
"tcpres": 0,
"tcpurgp": 0,
"reason": "stream midstream"
}
},
{
"timestamp": "2023-08-27T05:57:25.829569+0000",
"flow_id": 1592649310743450,
"event_type": "drop",
"src_ip": "10.0.40.6",
"src_port": 10705,
"dest_ip": "<reducted3>",
"dest_port": 443,
"proto": "TCP",
"pkt_src": "wire/pcap",
"direction": "to_server",
"drop": {
"len": 71,
"tos": 0,
"ttl": 64,
"ipid": 19855,
"tcpseq": 1543874525,
"tcpack": 1926112880,
"tcpwin": 501,
"syn": false,
"ack": true,
"psh": true,
"rst": false,
"urg": false,
"fin": false,
"tcpres": 0,
"tcpurgp": 0,
"reason": "stream midstream"
}
},
{
"timestamp": "2023-08-27T05:57:59.546539+0000",
"flow_id": 1592649310743450,
"event_type": "drop",
"src_ip": "<reducted3>",
"src_port": 443,
"dest_ip": "10.0.40.6",
"dest_port": 10705,
"proto": "TCP",
"pkt_src": "wire/pcap",
"direction": "to_client",
"drop": {
"len": 40,
"tos": 0,
"ttl": 111,
"ipid": 10262,
"tcpseq": 1926112880,
"tcpack": 1543874525,
"tcpwin": 0,
"syn": false,
"ack": true,
"psh": false,
"rst": true,
"urg": false,
"fin": false,
"tcpres": 0,
"tcpurgp": 0,
"reason": "flow drop"
}
},
{
"timestamp": "2023-08-27T05:58:25.492259+0000",
"flow_id": 1196838486818802,
"event_type": "drop",
"src_ip": "<reducted2>",
"src_port": 80,
"dest_ip": "10.0.40.6",
"dest_port": 33617,
"proto": "TCP",
"pkt_src": "wire/pcap",
"direction": "to_client",
"drop": {
"len": 40,
"tos": 0,
"ttl": 128,
"ipid": 41927,
"tcpseq": 3557248460,
"tcpack": 1002311778,
"tcpwin": 0,
"syn": false,
"ack": true,
"psh": false,
"rst": true,
"urg": false,
"fin": false,
"tcpres": 0,
"tcpurgp": 0,
"reason": "flow drop"
}
}