-
Notifications
You must be signed in to change notification settings - Fork 1.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Decouple stream bypass from TLS encrypted bypass v4 #11831
Decouple stream bypass from TLS encrypted bypass v4 #11831
Conversation
Decouple app.protocols.tls.encryption-handling and stream.bypass. There's no apparent reason why encrypted TLS bypass traffic should depend on stream bypass, as these are unrelated features. Ticket: 6788
NOTE: This PR may contain new authors. |
Codecov ReportAttention: Patch coverage is
Additional details and impacted files@@ Coverage Diff @@
## master #11831 +/- ##
==========================================
- Coverage 82.57% 79.06% -3.51%
==========================================
Files 912 912
Lines 249357 249203 -154
==========================================
- Hits 205918 197044 -8874
- Misses 43439 52159 +8720
Flags with carried forward coverage won't be shown. Click here to find out more. |
Information: QA ran without warnings. Pipeline 22800 |
We also need an addition to the upgrade section, I think. |
Blocked by issues in the SV test |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
A couple inline comments...
I'm wondering if we should add a note in the upgrading section about this new option for SSL, of it too small to be needed there.
The TLS and SSH app layer parsers have the ability to stop processing | ||
encrypted traffic after the initial handshake. By setting the | ||
`app-layer.protocols.tls.encryption-handling` and | ||
`app-layer.protocols.tls.encryption-handling` options to `bypass` Suricata |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
`app-layer.protocols.tls.encryption-handling` options to `bypass` Suricata | |
`app-layer.protocols.ssh.encryption-handling` options to `bypass` Suricata |
# What to do when the encrypted communications start: | ||
# - bypass: stop processing this flow as much as possible. | ||
# Offload flow bypass to kernel or hardware if possible. | ||
# - full: keep tracking and inspection as normal | ||
# | ||
# encryption-handling: bypass |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Shouldn't we indicate here what is the default?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Is the behavior here the same as we have for tls, or is there a difference?
goto #11886 |
Following up on #11801
Redmine ticket: https://redmine.openinfosecfoundation.org/issues/6788
Describe changes:
v4
v3
encryption-handling
allowing to choose whether to continue inspection on SSH once it turns encryptedSV_BRANCH=OISF/suricata-verify#2047