<div dir="ltr"><div><div>Albert,<br><br></div>I installed suricata 4.0.4 in NFQ mode.  <br></div><div><br></div><div>My iptable configs:</div><div><br></div><div>Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)<br> pkts bytes target     prot opt in     out     source               destination         <br> 4701 2019K NFQUEUE    all  --  enp0s3 enp0s2  <a href="http://0.0.0.0/0">0.0.0.0/0</a>            <a href="http://0.0.0.0/0">0.0.0.0/0</a>            NFQUEUE balance 0:1 bypass<br> 6061  598K NFQUEUE    all  --  enp0s2 enp0s3  <a href="http://0.0.0.0/0">0.0.0.0/0</a>            <a href="http://0.0.0.0/0">0.0.0.0/0</a>            NFQUEUE balance 0:1 bypass<br></div><div><br></div><div>Then I setup an apache2.4 web server with a self signed certificate on it.   I am able to browse the website without problems. <br></div><div><br></div><div>This confirms, in my mind at least, that there is not an issue with 4.0.4 when it comes to SSL.  <br></div><div><br></div><div>Regards,</div><div><br></div><div>David Sussens.<br></div></div><div class="gmail_extra"><br><div class="gmail_quote">On Fri, Apr 13, 2018 at 8:10 AM, David Sussens <span dir="ltr"><<a href="mailto:dsussens@gmail.com" target="_blank">dsussens@gmail.com</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div dir="ltr"><div><div><div>Albert,<br><br></div>Can you please share your iptables/nftables rule base configs with us.  That might help to determine what the problem is here.<br><br></div>David Sussens.<br></div> <br></div><div class="gmail_extra"><br><div class="gmail_quote"><div><div class="h5">On Tue, Apr 10, 2018 at 10:18 PM, Albert Whale <span dir="ltr"><<a href="mailto:Albert.Whale@it-security-inc.com" target="_blank">Albert.Whale@it-security-inc.<wbr>com</a>></span> wrote:<br></div></div><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div><div class="h5">
  

    
  
  <div bgcolor="#FFFFFF" text="#000000">
    <p>Can someone please tell me why the connecting to HTTPS websites
      are problematic when using the nfqueue run mode?  This doesn't
      happen when I am using af-packet mode.</p>
    <p>In fact in nfqueue mode, I also get the following alerts from
      fast.log:</p>
    <p>04/10/2018-13:05:49.504292  [**] [1:2210007:2] ITS Safe STREAM
      3way handshake SYNACK with wrong ack [**] [Classification: Generic
      Protocol Command Decode] [Priority: 3] {TCP} <a href="http://17.249.105.246:443" target="_blank">17.249.105.246:443</a>
      -> <a href="http://192.168.1.180:61378" target="_blank">192.168.1.180:61378</a><br>
      04/10/2018-13:05:50.534691  [**] [1:2210007:2] ITS Safe STREAM
      3way handshake SYNACK with wrong ack [**] [Classification: Generic
      Protocol Command Decode] [Priority: 3] {TCP} <a href="http://17.249.105.246:443" target="_blank">17.249.105.246:443</a>
      -> <a href="http://192.168.1.180:61378" target="_blank">192.168.1.180:61378</a><br>
      04/10/2018-13:05:51.570889  [**] [1:2210007:2] ITS Safe STREAM
      3way handshake SYNACK with wrong ack [**] [Classification: Generic
      Protocol Command Decode] [Priority: 3] {TCP} <a href="http://17.249.105.246:443" target="_blank">17.249.105.246:443</a>
      -> <a href="http://192.168.1.180:61378" target="_blank">192.168.1.180:61378</a><br>
      04/10/2018-13:05:53.632130  [**] [1:2210007:2] ITS Safe STREAM
      3way handshake SYNACK with wrong ack [**] [Classification: Generic
      Protocol Command Decode] [Priority: 3] {TCP} <a href="http://17.249.105.246:443" target="_blank">17.249.105.246:443</a>
      -> <a href="http://192.168.1.180:61378" target="_blank">192.168.1.180:61378</a></p>
    <p><br>
    </p>
    <p>This is the error displayed in safari when I am running in-line
      IPS mode:</p>
    <p><img src="cid:part1.0A2A2152.055A361C@IT-Security-inc.com" alt=""></p>
    <p>Any ideas or suggestions?<span class="m_-1127117738567297255HOEnZb"><font color="#888888"><br>
    </font></span></p><span class="m_-1127117738567297255HOEnZb"><font color="#888888">
    <div class="m_-1127117738567297255m_-2277878293308104038moz-signature">-- <br>
      --<br>
      <br>
      Albert E. Whale, CEH CHS CISA CISSP<br>
      Phone: 412-515-3010 | Email: <a class="m_-1127117738567297255m_-2277878293308104038moz-txt-link-abbreviated" href="mailto:Albert.Whale@IT-Security-inc.com" target="_blank">Albert.Whale@IT-Security-inc.c<wbr>om</a><br>
      Cell: 412-889-6870<br>
      <br>
    </div>
  </font></span></div>

<br></div></div>______________________________<wbr>_________________<br>
Suricata IDS Users mailing list: <a href="mailto:oisf-users@openinfosecfoundation.org" target="_blank">oisf-users@openinfosecfoundati<wbr>on.org</a><br>
Site: <a href="http://suricata-ids.org" rel="noreferrer" target="_blank">http://suricata-ids.org</a> | Support: <a href="http://suricata-ids.org/support/" rel="noreferrer" target="_blank">http://suricata-ids.org/suppor<wbr>t/</a><br>
List: <a href="https://lists.openinfosecfoundation.org/mailman/listinfo/oisf-users" rel="noreferrer" target="_blank">https://lists.openinfosecfound<wbr>ation.org/mailman/listinfo/<wbr>oisf-users</a><br>
<br>
Conference: <a href="https://suricon.net" rel="noreferrer" target="_blank">https://suricon.net</a><br>
Trainings: <a href="https://suricata-ids.org/training/" rel="noreferrer" target="_blank">https://suricata-ids.org/train<wbr>ing/</a><br></blockquote></div><br></div>
</blockquote></div><br></div>