public inbox for development@lists.ipfire.org
 help / color / mirror / Atom feed
* [PATCH 3/3] Suricata: detect DNS events on port 853, too
@ 2019-02-07 17:47 Peter Müller
  2019-02-07 20:34 ` Stefan Schantl
  0 siblings, 1 reply; 3+ messages in thread
From: Peter Müller @ 2019-02-07 17:47 UTC (permalink / raw)
  To: development

[-- Attachment #1: Type: text/plain, Size: 960 bytes --]

As DNS over TLS popularity is increasing, port 853 becomes
more interesting for an attacker as a bypass method. Enabling
this port for DNS monitoring makes sense in order to avoid
unusual activity (non-DNS traffic) as well as "normal" DNS
attacks.

Partially fixes #11808

Signed-off-by: Peter Müller <peter.mueller(a)ipfire.org>
Cc: Stefan Schantl <stefan.schantl(a)ipfire.org>
---
 config/suricata/suricata.yaml | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/config/suricata/suricata.yaml b/config/suricata/suricata.yaml
index d7302788c..67b9e8a7d 100644
--- a/config/suricata/suricata.yaml
+++ b/config/suricata/suricata.yaml
@@ -208,11 +208,11 @@ app-layer:
       tcp:
         enabled: yes
         detection-ports:
-          dp: 53
+          dp: "[53,853]"
       udp:
         enabled: yes
         detection-ports:
-          dp: 53
+          dp: "[53,853]"
     http:
       enabled: yes
       # memcap: 64mb
-- 
2.16.4

^ permalink raw reply	[flat|nested] 3+ messages in thread

end of thread, other threads:[~2019-02-08 12:51 UTC | newest]

Thread overview: 3+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2019-02-07 17:47 [PATCH 3/3] Suricata: detect DNS events on port 853, too Peter Müller
2019-02-07 20:34 ` Stefan Schantl
2019-02-08 12:51   ` Michael Tremer

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox