public inbox for development@lists.ipfire.org
 help / color / mirror / Atom feed
* [PATCH 3/3] Suricata: detect DNS events on port 853, too
@ 2019-02-07 17:47 Peter Müller
  2019-02-07 20:34 ` Stefan Schantl
  0 siblings, 1 reply; 3+ messages in thread
From: Peter Müller @ 2019-02-07 17:47 UTC (permalink / raw)
  To: development

[-- Attachment #1: Type: text/plain, Size: 960 bytes --]

As DNS over TLS popularity is increasing, port 853 becomes
more interesting for an attacker as a bypass method. Enabling
this port for DNS monitoring makes sense in order to avoid
unusual activity (non-DNS traffic) as well as "normal" DNS
attacks.

Partially fixes #11808

Signed-off-by: Peter Müller <peter.mueller(a)ipfire.org>
Cc: Stefan Schantl <stefan.schantl(a)ipfire.org>
---
 config/suricata/suricata.yaml | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/config/suricata/suricata.yaml b/config/suricata/suricata.yaml
index d7302788c..67b9e8a7d 100644
--- a/config/suricata/suricata.yaml
+++ b/config/suricata/suricata.yaml
@@ -208,11 +208,11 @@ app-layer:
       tcp:
         enabled: yes
         detection-ports:
-          dp: 53
+          dp: "[53,853]"
       udp:
         enabled: yes
         detection-ports:
-          dp: 53
+          dp: "[53,853]"
     http:
       enabled: yes
       # memcap: 64mb
-- 
2.16.4

^ permalink raw reply	[flat|nested] 3+ messages in thread

* Re: [PATCH 3/3] Suricata: detect DNS events on port 853, too
  2019-02-07 17:47 [PATCH 3/3] Suricata: detect DNS events on port 853, too Peter Müller
@ 2019-02-07 20:34 ` Stefan Schantl
  2019-02-08 12:51   ` Michael Tremer
  0 siblings, 1 reply; 3+ messages in thread
From: Stefan Schantl @ 2019-02-07 20:34 UTC (permalink / raw)
  To: development

[-- Attachment #1: Type: text/plain, Size: 1047 bytes --]

Merged.

Best regards,

-Stefan
> As DNS over TLS popularity is increasing, port 853 becomes
> more interesting for an attacker as a bypass method. Enabling
> this port for DNS monitoring makes sense in order to avoid
> unusual activity (non-DNS traffic) as well as "normal" DNS
> attacks.
> 
> Partially fixes #11808
> 
> Signed-off-by: Peter Müller <peter.mueller(a)ipfire.org>
> Cc: Stefan Schantl <stefan.schantl(a)ipfire.org>
> ---
>  config/suricata/suricata.yaml | 4 ++--
>  1 file changed, 2 insertions(+), 2 deletions(-)
> 
> diff --git a/config/suricata/suricata.yaml
> b/config/suricata/suricata.yaml
> index d7302788c..67b9e8a7d 100644
> --- a/config/suricata/suricata.yaml
> +++ b/config/suricata/suricata.yaml
> @@ -208,11 +208,11 @@ app-layer:
>        tcp:
>          enabled: yes
>          detection-ports:
> -          dp: 53
> +          dp: "[53,853]"
>        udp:
>          enabled: yes
>          detection-ports:
> -          dp: 53
> +          dp: "[53,853]"
>      http:
>        enabled: yes
>        # memcap: 64mb

[-- Attachment #2: signature.asc --]
[-- Type: application/pgp-signature, Size: 833 bytes --]

^ permalink raw reply	[flat|nested] 3+ messages in thread

* Re: [PATCH 3/3] Suricata: detect DNS events on port 853, too
  2019-02-07 20:34 ` Stefan Schantl
@ 2019-02-08 12:51   ` Michael Tremer
  0 siblings, 0 replies; 3+ messages in thread
From: Michael Tremer @ 2019-02-08 12:51 UTC (permalink / raw)
  To: development

[-- Attachment #1: Type: text/plain, Size: 1274 bytes --]

Do we expect any plain DNS traffic on this port?

I am not sure if any rules would match the TLS traffic here.

> On 7 Feb 2019, at 20:34, Stefan Schantl <stefan.schantl(a)ipfire.org> wrote:
> 
> Merged.
> 
> Best regards,
> 
> -Stefan
>> As DNS over TLS popularity is increasing, port 853 becomes
>> more interesting for an attacker as a bypass method. Enabling
>> this port for DNS monitoring makes sense in order to avoid
>> unusual activity (non-DNS traffic) as well as "normal" DNS
>> attacks.
>> 
>> Partially fixes #11808
>> 
>> Signed-off-by: Peter Müller <peter.mueller(a)ipfire.org>
>> Cc: Stefan Schantl <stefan.schantl(a)ipfire.org>
>> ---
>> config/suricata/suricata.yaml | 4 ++--
>> 1 file changed, 2 insertions(+), 2 deletions(-)
>> 
>> diff --git a/config/suricata/suricata.yaml
>> b/config/suricata/suricata.yaml
>> index d7302788c..67b9e8a7d 100644
>> --- a/config/suricata/suricata.yaml
>> +++ b/config/suricata/suricata.yaml
>> @@ -208,11 +208,11 @@ app-layer:
>>       tcp:
>>         enabled: yes
>>         detection-ports:
>> -          dp: 53
>> +          dp: "[53,853]"
>>       udp:
>>         enabled: yes
>>         detection-ports:
>> -          dp: 53
>> +          dp: "[53,853]"
>>     http:
>>       enabled: yes
>>       # memcap: 64mb


^ permalink raw reply	[flat|nested] 3+ messages in thread

end of thread, other threads:[~2019-02-08 12:51 UTC | newest]

Thread overview: 3+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2019-02-07 17:47 [PATCH 3/3] Suricata: detect DNS events on port 853, too Peter Müller
2019-02-07 20:34 ` Stefan Schantl
2019-02-08 12:51   ` Michael Tremer

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox