Hello, team.
I use dockerized Suricata 6.0.13 (jasonish/suricata:latest) and it doesn’t block traffic.
Steps to reproduce.
- Command to run container looks like:
docker run --name=suricata --rm -it --name=suricata --net=host \
--cap-add=net_admin --cap-add=net_raw --cap-add=sys_nice \
-v /opt/suricata/logs:/var/log/suricata \
-v /opt/suricata/lib:/var/lib/suricata \
-v /opt/suricata/etc:/etc/suricata \
jasonish/suricata:latest -i eth0
- Updating rules:
docker exec -it --user suricata suricata suricata-update -f
- Modifying the rule 2100498 to drop packets:
drop ip any any -> any any (msg:"GPL ATTACK_RESPONSE id check returned root"; content:"uid=0|28|root|29|"; classtype:bad-unknown; sid:2100498; rev:7; metadata:created_at 2010_09_23, updated_at 2010_09_23;)
- Reloading rules:
docker exec -it --user suricata suricata suricatasc -c reload-rules
- Testing Invalid traffic:
curl --max-time 5 http://testmynids.org/uid/index.html
(no error recieved)
- In fast.log I see ‘wDrop’ record:
07/12/2023-12:25:38.959068 [**] [1:2013028:7] ET POLICY curl User-Agent Outbound [**] [Classification: Attempted Information Leak] [Priority: 2] {TCP} 192.168.88.122:44172 -> 52.XX.XX.69:80
07/12/2023-12:25:39.012621 [wDrop] [**] [1:2100498:7] GPL ATTACK_RESPONSE id check returned root [**] [Classification: Potentially Bad Traffic] [Priority: 2] {TCP} 52.XX.XX.69:80 -> 192.168.88.1
22:44172
but packets was not blocked.
Please help me, what I do wrong?