Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Next/20221027/v10 #8097

Merged
merged 31 commits into from Oct 27, 2022
Merged

Next/20221027/v10 #8097

merged 31 commits into from Oct 27, 2022

Conversation

regit and others added 30 commits October 27, 2022 09:44
This patch adds a dataset-dump command to the list of unix socket
commands. Implementation is not optimal as we are locking the
datasets when doing the dump. But if we consider that the current
alternative from an implementation point of view is to stop Suricata
then this is far better than current state.

Ticket: OISF#5184
This patch introduce the IPv4 type for dataset so Suricata commandmatch
on a set of IPv4 addresses. This is meant to complement iprep feature
for people that needs more flexibility such as settings the IP on
the packet path.

Feature: OISF#5383
It is a sticky buffer matching on src_ip.

Feature: OISF#5383
This patch also simplifies IPv6 parsing.

Feature: OISF#5383
Each module (thread) updates its status to indicate running.
Main thread awaits for all threads to be in a running state
before continuing the initialisation process

Implements feature 5384
(https://redmine.openinfosecfoundation.org/issues/5384)
Upon all threads reaching a running state the system generates
a notification for systems running and configured for systemd

Implements feature 5384
(https://redmine.openinfosecfoundation.org/issues/5384)
Intergration of systemd is a feature that enables notification of
a running service to the service manager. The workflow now ensures
compilation with systemd and checks the binary has been built against
libsystemd.
This is to avoid the tx logging code that doesn't support LoggerId
values over 31 at this time. The simplest fix for now is to just have
all JSON (eve) loggers use the same ID.

DNP3 is left as-is for now as it needs some extra support in the parser.
Sort the LoggerId's in the order they are define in suricata-common.h.
with setrlimit NPROC.

So that, if Suricata wants to execve or such to create a new process
the OS will forbid it so that RCE exploits are more painful to write.

Ticket: OISF#5373
Add a new DNS record type to represent HTTPS
Ticket: OISF#4751
To avoid double counting in case a thread took longer than
expected to start up.
@codecov
Copy link

codecov bot commented Oct 27, 2022

Codecov Report

Merging #8097 (2f9ca8b) into master (79a7861) will decrease coverage by 0.21%.
The diff coverage is 32.54%.

Additional details and impacted files
@@            Coverage Diff             @@
##           master    #8097      +/-   ##
==========================================
- Coverage   81.72%   81.51%   -0.22%     
==========================================
  Files         954      958       +4     
  Lines      275710   276148     +438     
==========================================
- Hits       225334   225089     -245     
- Misses      50376    51059     +683     
Flag Coverage Δ
fuzzcorpus 63.35% <11.18%> (-0.44%) ⬇️
suricata-verify 58.97% <22.37%> (-0.22%) ⬇️
unittests 63.36% <20.19%> (-0.13%) ⬇️

Flags with carried forward coverage won't be shown. Click here to find out more.

@suricata-qa
Copy link

WARNING:

field baseline test %
TREX_GENERIC_stats_chk
.capture.kernel_drops 0 22915 -
.flow.end.tcp_state.syn_sent 0 56 -
.flow.end.tcp_state.syn_recv 0 1 -
.flow.end.tcp_state.fin_wait1 0 7 -
.flow.end.tcp_state.fin_wait2 0 7 -
.flow.end.tcp_state.time_wait 0 5 -
.flow.end.tcp_state.last_ack 0 5 -
.flow.end.tcp_state.close_wait 0 15 -
.tcp.segment_from_pool 15600086 16475964 105.61%
.app_layer.error.http.parser 0 5 -
.app_layer.error.smtp.gap 0 14 -
.app_layer.error.dcerpc_tcp.parser 0 3 -

Pipeline 10277

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
9 participants