]> git.ipfire.org Git - ipfire-2.x.git/commitdiff
Suricata: detect TLS traffic on port 444, too
authorPeter Müller <peter.mueller@ipfire.org>
Fri, 22 Feb 2019 20:16:00 +0000 (20:16 +0000)
committerStefan Schantl <stefan.schantl@ipfire.org>
Fri, 1 Mar 2019 16:53:04 +0000 (17:53 +0100)
This is the default port for IPFire's administrative web interface
and should be monitored by Suricata, too.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
c: Stefan Schantl <stefan.schantl@ipfire.org>
Acked-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
config/suricata/suricata.yaml

index 4fbd32b850db69502c30da3a10b5be867eae7ebc..0ff06f4aeb4f05af231915e1620f0681bc3b799f 100644 (file)
@@ -140,7 +140,7 @@ app-layer:
     tls:
       enabled: yes
       detection-ports:
-        dp: "[443,465,993,995]"
+        dp: "[443,444,465,993,995]"
 
       # Completely stop processing TLS/SSL session after the handshake
       # completed. If bypass is enabled this will also trigger flow