Summary: | Suricata only emits logspam galore after upgrading to Core Update 162 (testing) | ||
---|---|---|---|
Product: | IPFire | Reporter: | Peter Müller <peter.mueller> |
Component: | --- | Assignee: | Stefan Schantl <stefan.schantl> |
Status: | CLOSED FIXED | QA Contact: | |
Severity: | Minor Usability | ||
Priority: | Will affect most users | CC: | Manfred.Knick, michael.tremer, PaulV |
Version: | 2 | ||
Hardware: | all | ||
OS: | All | ||
See Also: | https://bugzilla.ipfire.org/show_bug.cgi?id=12739 |
Description
Peter Müller
2021-12-05 14:02:07 UTC
This comes from the rules that are shipped with suricata and which I think we should enable by default. They report any internal event.
Why would we not be interested in that? Invalid checksums and otherwise bad packets are interesting, or not?
> SURICATA STREAM pkt seen on wrong thread
This seems to happen when your hardware doesn't support ntuple which will dramatically impact the performance of the IPS.
(In reply to Michael Tremer from comment #1) > This comes from the rules that are shipped with suricata and which I think > we should enable by default. They report any internal event. > > Why would we not be interested in that? Invalid checksums and otherwise bad > packets are interesting, or not? While I am tempted to say "yes" in the first moment, I think these are relatively minor events. In production, you won't go after a source emitting TCP packets with broken checksums, unless you have a near-perfect network. Therefore, I would vote for silencing these ("priority: 3") by default, so users can focus on more actionable IDS hits. > > SURICATA STREAM pkt seen on wrong thread > > This seems to happen when your hardware doesn't support ntuple which will > dramatically impact the performance of the IPS. True, my testing hardware features some cheap Realtek NICs. However, I think we should silence these log messages, since they do not carry any useful information, fill the logs, and make finding actual events pretty hard. Does this sound reasonable? (In reply to Peter Müller from comment #2) > (In reply to Michael Tremer from comment #1) > > This comes from the rules that are shipped with suricata and which I think > > we should enable by default. They report any internal event. > > > > Why would we not be interested in that? Invalid checksums and otherwise bad > > packets are interesting, or not? > > While I am tempted to say "yes" in the first moment, I think these are > relatively minor events. In production, you won't go after a source emitting > TCP packets with broken checksums, unless you have a near-perfect network. > > Therefore, I would vote for silencing these ("priority: 3") by default, so > users can focus on more actionable IDS hits. Can we make this configurable? I consider these hints very useful for debugging, but we might not need all of them in production. Indeed. > > > SURICATA STREAM pkt seen on wrong thread > > > > This seems to happen when your hardware doesn't support ntuple which will > > dramatically impact the performance of the IPS. > > True, my testing hardware features some cheap Realtek NICs. However, I think > we should silence these log messages, since they do not carry any useful > information, fill the logs, and make finding actual events pretty hard. > > Does this sound reasonable? I didn't have anything that caused more than a few of these. On the two systems I am testing (upgraded to 162) there are no IPS rule hits logged only the 'SURICATA STREAM' warnings. System1 NICs: Realtek and USB dongle pci: Realtek Semiconductor Co., Ltd. RTL8111/8168/8411 usb: D-Link Corp. (r8169, usbnet ax88179_178a) System2 NICs: Intel and Intel pci: Intel Corporation 82579LM Gigabit Network Connection (Lewisville) (rev 04) pci: Intel Corporation 82574L Gigabit Network Connection (e1000e, e1000e) I suppose we can count this as a blocker for the release then. Thanks for your feedback. Stefan want's to implement a solution using threshold.conf. Stefan want's to implement a solution using threshold.conf. Patch has been send to the mailing list: https://patchwork.ipfire.org/project/ipfire/patch/20211208171805.309048-1-stefan.schantl@ipfire.org/ This commit is now merged into master, hence setting to ON_QA... |