-
Hello, I would like to know if, by default, Suricata captures SSL/TLS traffic (not necessarily decrypted). After several searches in the Security Onion documentation, I haven't found an answer. Zeek gives me SSL traffic logs where I can see header information (source ip address, destinatrion, port, TLS version used) but it seems that Suricata doesn't detect any TLS traffic. By creating a simple Suricata rule to capture all SSL traffic, no alert is generated in Security Onion, hence my question.
Is there any specific configuration to be done? Is it simply not possible to generate TLS alerts for Suricata? Thanks ! |
Beta Was this translation helpful? Give feedback.
Replies: 1 comment 5 replies
-
By default, Suricata should analyze SSL/TLS traffic as it sees it on the wire (encrypted, not cleartext). There are several rules in the default ruleset that alert on TLS traffic. For example:
If you have enabled a BPF for Suricata like |
Beta Was this translation helpful? Give feedback.
Hello,
While doing some more research and testing, I came across a post of a similar problem: https://groups.google.com/g/security-onion/c/Qoh9jlOi2_U
According to this post, it seems that the solution is to change the :
to false.
So I made this change:
Go to the GUI under Administration --> Configuration
In the Option tab at the top, check show advanced settings
Then go to the suricata tab --> config --> vlan --> use-for-tracking and set the value to false
And it actually worked, I'm now able to trigger alerts on SSL/TLS and HTTP traffic (the rule I gave earlier works).
This “vlan-for-tracking” option is used to tell Suricata to identify and track packets …