Add test for DNS name truncation and associated alert.
Ticket: #7280
--- /dev/null
+Ticket: https://redmine.openinfosecfoundation.org/issues/7280
+
+PCAP: From ticket.
--- /dev/null
+# A resource name was too long (over 1025 chars)
+alert dns any any -> any any (msg:"SURICATA DNS Name too long"; app-layer-event:dns.name_too_long; classtype:protocol-command-decode; sid:224008; rev:1;)
+
+# An infinite loop was found while decoding a DNS resource name.
+alert dns any any -> any any (msg:"SURICATA DNS Infinite loop"; app-layer-event:dns.infinite_loop; classtype:protocol-command-decode; sid:224009; rev:1;)
+
+# Suricata's maximum number of DNS name labels was reached while parsing a resource name.
+alert dns any any -> any any (msg:"SURICATA DNS Too many labels"; app-layer-event:dns.too_many_labels; classtype:protocol-command-decode; sid:224010; rev:1;)
--- /dev/null
+requires:
+ min-version: 8
+
+args:
+ - --set app-layer.protocols.dns.tcp.detection-ports.dp=1053
+ - -k none
+
+checks:
+ - filter:
+ count: 1
+ match:
+ pcap_cnt: 8
+ event_type: dns
+ dns.queries[0].rrname.__len: 1025
+ dns.queries[0].rrname_truncated: true
+ - filter:
+ count: 1
+ match:
+ pcap_cnt: 9
+ event_type: alert
+ alert.signature_id: 224008
+ dns.queries[0].rrname_truncated: true