-
Notifications
You must be signed in to change notification settings - Fork 1.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Detect log alert tx one 7199 v8.2 #12269
Detect log alert tx one 7199 v8.2 #12269
Conversation
So we get: 1. request arrives - buffered due to not ackd 2. response arrives, acks request - request is now parsed, response isn't 3. ack for response, response parsed. Then detect runs for request, generates alert. We now have 2 txs. txid will be 0 from AppLayerParserGetTransactionInspectId But txid 1 is unidirectional in the other way, so we can use txid 0 metadata for logging Ticket: 7199
Codecov ReportAttention: Patch coverage is
Additional details and impacted files@@ Coverage Diff @@
## master #12269 +/- ##
=======================================
Coverage 83.22% 83.22%
=======================================
Files 912 912
Lines 257311 257322 +11
=======================================
+ Hits 214154 214169 +15
+ Misses 43157 43153 -4
Flags with carried forward coverage won't be shown. Click here to find out more. |
Information: QA ran without warnings. Pipeline 23921 |
@jufajardini @jasonish remind me, why do we want to test with SV task-7018-dns-ips-stream-rule that The third and fourth alert https://github.com/OISF/suricata-verify/blob/master/tests/dns/task-7018-dns-ips-stream-rule/test.yaml#L138 (lines 121 - 141) I understand why the code does that but I do not understand why we want to enforce this behavior with the test... |
I see your point. I think I created a test that was descriptive of what we had, and that was the result. I wonder if at some point we could have a more precise processing, and then we wouldn't even have that mismatch. In which case removing this check makes sense. Indeed, when working on these tests, we wanted to showcase the current (undesirable) behavior: OISF/suricata-verify#1902 (comment) |
If I recall correctly, this was confusing behavior. Your alerting on |
Thanks, next version in #12306 I put a comment in the SV check that this was not the desired behavior and added a reference to the ticket 7004 about it... |
Link to ticket: https://redmine.openinfosecfoundation.org/issues/
https://redmine.openinfosecfoundation.org/issues/7449
https://redmine.openinfosecfoundation.org/issues/7199
Describe changes:
Provide values to any of the below to override the defaults.
SV_BRANCH=OISF/suricata-verify#2180
#12266 with suricata.yaml.in changes as proposed in #12260