Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

dns - support multiple requests before response - v2 #2386

Merged
merged 4 commits into from Oct 27, 2016

Conversation

jasonish
Copy link
Member

Previous PR: #2380

Changes since last PR:

  • Address issue with private pcap.
  • Window is now dynamic based on the number of requests seen without a response. Worst case is the flood/givenup condition.
  • Fix issue with multiple requests in a TCP buffer.

Prscript:

The advancement through the buffer was not taking into account
the size of the length field resulting in the second request
being detected as bad data.
Address the issue where a DNS response would not be logged when
the traffic is like:
- Request 1
- Request 2
- Response 1
- Response 2
which can happen on dual stack machines where the request for A
and AAAA are sent out at the same time on the same UDP "session".

A "window" is used to set the maximum number of outstanding
responses before considering the olders lost.
@jasonish
Copy link
Member Author

@inliniac inliniac merged commit 7d734ed into OISF:master Oct 27, 2016
@jasonish jasonish deleted the ish-dns-double-request-v2 branch October 28, 2016 00:54
richi235 added a commit to richi235/suricata that referenced this pull request Jan 23, 2018
richi235 added a commit to richi235/suricata that referenced this pull request Jan 28, 2018
)

Write permission on the logdir is necesarry to create new files in there,
which is necesary after logrotation to continue logging. (use cases:
exe.json and others)

If suricata could open the log files but not create new ones it silently failed,
not writing any logs after the first logrotation.
This patch adds a check before priv drop and warns+exit()s
if we will not be able to create new files after priv drop.

If we won't drop privs we check if the current (and general) user will be able
to create logfiles after log rotation.

For details and discussion see:
https://redmine.openinfosecfoundation.org/issues/2386
richi235 added a commit to richi235/suricata that referenced this pull request Feb 5, 2018
)

Write permission on the logdir is necesarry to create new files in there,
which is necesary after logrotation to continue logging. (use cases:
exe.json and others)

If suricata could open the log files but not create new ones it silently failed,
not writing any logs after the first logrotation.
This patch adds a check before priv drop and warns+exit()s
if we will not be able to create new files after priv drop.

If we won't drop privs we check if the current (and general) user will be able
to create logfiles after log rotation.

For details and discussion see:
https://redmine.openinfosecfoundation.org/issues/2386
richi235 added a commit to richi235/suricata that referenced this pull request Feb 5, 2018
)

Write permission on the logdir is necesarry to create new files in there,
which is necesary after logrotation to continue logging. (use cases:
exe.json and others)

If suricata could open the log files but not create new ones it silently failed,
not writing any logs after the first logrotation.
This patch adds a check before priv drop and warns+exit()s
if we will not be able to create new files after priv drop.

If we won't drop privs we check if the current (and general) user will be able
to create logfiles after log rotation.

For details and discussion see:
https://redmine.openinfosecfoundation.org/issues/2386
richi235 added a commit to richi235/suricata that referenced this pull request Feb 14, 2018
)

Write permission on the logdir is necesarry to create new files in there,
which is necesary after logrotation to continue logging. (use cases:
exe.json and others)

If suricata could open the log files but not create new ones it silently failed,
not writing any logs after the first logrotation.
This patch adds a check before priv drop and warns+exit()s
if we will not be able to create new files after priv drop.

If we won't drop privs we check if the current (and general) user will be able
to create logfiles after log rotation.

For details and discussion see:
https://redmine.openinfosecfoundation.org/issues/2386
shivan1b pushed a commit to shivan1b/suricata that referenced this pull request Oct 4, 2019
At the startup, if the default log dir provided either by command line
options or suricat.yaml is not writable, the error comes quite later.
This patch makes suricata exit if there is such an error in the
beginning itself.

Closes redmine ticket OISF#2386.
shivan1b pushed a commit to shivan1b/suricata that referenced this pull request Oct 5, 2019
At the startup, if the default log dir provided either by command line
options or suricat.yaml is not writable, the error comes quite later.
This patch makes suricata exit if there is such an error in the
beginning itself.

Closes redmine ticket OISF#2386.
shivan1b pushed a commit to shivan1b/suricata that referenced this pull request Oct 7, 2019
At the startup, if the default log dir provided either by command line
options or suricat.yaml is not writable, the error comes quite later.
This patch makes suricata exit if there is such an error in the
beginning itself.

Closes redmine ticket OISF#2386.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
2 participants