[Discussion] [Emerging-Sigs] OISF Brainstorming Session Summary / Phase Three Draft Dev Roadmap

Martin Holste mcholste at gmail.com
Mon Sep 26 18:31:42 UTC 2011


> Our code is BSD licensed at least so it can be reused.  For the tasks that I imagine you'd want to be doing with Suricata, I wouldn't expect the processing to be that intense actually.

Well, when I put Bro on just port 443, it still has to work pretty
hard, which is why I believe that asking Suricata to walk the cert
chain would add a considerable load.  Now, I'll certainly admit that's
far from scientific reasoning, but my other point stands: if I already
have a tool available which will alert on invalid certs, why do I need
another one, especially when that would come with the opportunity cost
of not implementing some currently unimplemented feature.  Sure, there
are a few cool things you can do in Suricata with that, but I'd wager
that we're already getting 80% of the use from the simple pattern
matching sigs we have out there for the "Internet Widgits" and
"SnakeOil" fake SSL certificates.  So, I'm not against putting SSL
features into Suricata, I just want that to be one of the last things
to go in.

> To be fair, Bro uses longest prefix matching for IP addresses and networks (which I assume Suricata is as well) and is extremely fast.
>

Touche.  Since I'm not running the RBN signatures in Bro, I guess I
just haven't seen its IP matching in action yet.

>>> GEO IP: High Priority / Low Resources
> Hey!  I think that should be called a feature to distinguish from Snort, not unique in the community. ;)

Touche again, I realized right after I sent my last email that Bro had
plenty of GeoIP integrated already.  I haven't used them in the
notice.log much yet, so I forgot about that.



More information about the Discussion mailing list