Should Suricata 6.0.8 write “alert” records to eve.json when a NIDS “pass” rule is triggered. We are unexpectedly seeing this in multiple environments. Is this by design?
from suricata.yaml
- eve-log:
enabled: ‘yes’
filetype: regular
filename: /nsm/eve-%Y-%m-%d-%H:%M.json
rotate-interval: hour
pcap-file: false
community-id: true
community-id-seed: 0
xff:
enabled: ‘no’
mode: extra-data
deployment: reverse
header: X-Forwarded-For
types:- alert:
payload: ‘no’
payload-buffer-size: 4kb
payload-printable: ‘yes’
packet: ‘yes’
metadata:
app-layer: false
flow: false
rule:
metadata: true
raw: true
tagged-packets: ‘no’
- alert:
eve.json output file includes cases like this where a “pass” rule generated an “alert” record.
{
“timestamp”: “2022-11-16T20:43:54.222486+0000”,
“flow_id”: 1108034110276122,
“in_iface”: “bond0”,
“event_type”: “alert”,
“src_ip”: “10.3.0.119”,
“src_port”: 443,
“dest_ip”: “10.3.0.93”,
“dest_port”: 59606,
“proto”: “TCP”,
“community_id”: “1:wYwjxRQvNh95IFHhE3fuDIsdbBA=”,
“alert”: {
“action”: “allowed”,
“gid”: 1,
“signature_id”: 500400,
“rev”: 1,
“signature”: “skip SSL packets that don’t involve Internet”,
“category”: “”,
“severity”: 3,
“rule”: “pass tcp $HOME_NET [443,465,993,995] → [172.16.0.0/12,192.168.0.0/16,10.0.0.0/8] any (msg:"skip SSL packets that don’t involve Internet"; sid:500400; rev:1;)”
},
“tunnel”: {
“src_ip”: “172.21.50.203”,
“src_port”: 33727,
“dest_ip”: “172.17.247.30”,
“dest_port”: 4789,
“proto”: “UDP”,
“depth”: 1
},
“payload_printable”: “”,
“stream”: 0,
“packet”: “RQAAPAAAQAA/BibjCgMAdwoDAF0Bu+jWm83DpFV3NeagEvs0yncAAAIEBYIEAggK1Bf5BMkzAeoBAwMH”,
“packet_info”: {
“linktype”: 12
}
}