I am using Suricata to extract information like sni, hostname/domain from HTTP, and TLS using eve-log. First, I run Suricata to capture traffic on a device interface but receive nothing. I use tcpdump to capture traffic on that device interface and write traffic to pcap. I open that pcap file on Wireshark and Zeek, both of them can give me the sni, domain information.
- Suricata version: 7.0.2
- Operating system: test on Centos 7, Ubuntu 22.04
- How you installed Suricata: Installed from source and package management (apt, yum)
Here is my suricata.yaml file
suricata.yaml (76.8 KB)
Here is my pcap file
serverpcap.pcap (949.8 KB)
Here is stats.log
Counter | TM Name | Value
decoder.pkts | Total | 4561
decoder.bytes | Total | 899562
decoder.ipv4 | Total | 3868
decoder.ethernet | Total | 4561
decoder.unknown_ethertype | Total | 693
decoder.tcp | Total | 3399
tcp.syn | Total | 115
tcp.rst | Total | 74
decoder.udp | Total | 463
decoder.icmpv4 | Total | 6
decoder.vlan | Total | 3868
decoder.avg_pkt_size | Total | 197
decoder.max_pkt_size | Total | 1402
flow.total | Total | 361
flow.tcp | Total | 143
flow.udp | Total | 218
flow.wrk.spare_sync_avg | Total | 100
flow.wrk.spare_sync | Total | 4
flow.wrk.flows_evicted_needs_work | Total | 115
flow.wrk.flows_evicted_pkt_inject | Total | 115
flow.wrk.flows_evicted | Total | 1
flow.wrk.flows_injected | Total | 115
tcp.sessions | Total | 115
tcp.ssn_from_pool | Total | 115
detect.alert | Total | 4
app_layer.flow.quic | Total | 24
app_layer.tx.quic | Total | 22
app_layer.flow.dns_udp | Total | 194
app_layer.tx.dns_udp | Total | 194
flow.end.state.new | Total | 361
flow.end.tcp_state.syn_sent | Total | 115
flow.mgr.rows_per_sec | Total | 6553
flow.spare | Total | 9900
memcap_pressure | Total | 5
memcap_pressure_max | Total | 5
flow.recycler.recycled | Total | 245
flow.recycler.queue_avg | Total | 2
flow.recycler.queue_max | Total | 75
tcp.memuse | Total | 606208
tcp.reassembly_memuse | Total | 114688
flow.memuse | Total | 7154304
Please help!!