[Oisf-users] Bad IPv6 events on UDP packets

Victor Julien lists at inliniac.net
Thu Nov 24 15:02:55 UTC 2016


On 22-11-16 14:47, Martijn van Oosterhout wrote:
> Hi,
> 
> We're getting strange IPv6 events on traffic that isn't IPv6 but plain
> UDP/IPv4 packets. Concretely, the rule is:
> 
> alert pkthdr any any -> any any (msg:"SURICATA IPv6 truncated extension
> header"; decode-event:ipv6.trunc_exthdr; sid:2200014; rev:1;)
> 
> The packet looks like so:
> 16:01:26.988695 IP 101.102.103.104.45657 > 97.98.99.100.12340: UDP,
> length 54
>     0x0000:  d46d 50b4 b901 74a2 e6a2 a947 0800 4500  .mP...t....G..E.
>     0x0010:  0052 f717 0000 4011 1b31 6566 6768 6162  .R.... at ..1efghab
>     0x0020:  6364 b259 3034 003e 96c2 6482 6af8 000e  cd.Y04.>..d.j...
>     0x0030:  3c83 399c 9d0e 08a6 e2b7 64b1 ca33 de5a  <.9.......d..3.Z
>     0x0040:  3453 8110 324e 6855 1945 661d 73dd 50d6  4S..2NhU.Ef.s.P.
>     0x0050:  c39f 6660 d106 d5d8 fb1a 38c7 2ef4 7aa6  ..f`......8...z.
> 
> (attached for convenience)
> 
> The resulting event looks like:
> {"alert_severity": 3, "alert_category": "", "protocol": "IPv6-Opts",
> "event_type": "alert", "timestamp": "2016-11-17T15:01:26.988695+0000",
> "source_ip": "399c:9d0e:08a6:e2b7:64b1:ca33:de5a:3453", "alert_gid": 1,
> "destination_ip": "8110:324e:6855:1945:661d:73dd:50d6:c39f",
> "alert_signature_id": 2200014, "alert_action": "allowed",
> "alert_signature": "SURICATA IPv6 truncated extension header",
> "alert_rev": 1, "uuid": "8b9893c0-3e0c-4562-9a18-d25697c08bab"}
> 
> This is completely reproducible here. As you can see somehow suricata is
> convinced it's an IPv6 packet when it clearly isn't. What worse is that
> the alert message hides the fact that it was actually a UDP packet. If
> you set Suricata to log packet data it only logs from 6af8000e...
> (offset 2c) so you can't figure it out that way. There is no flow_id in
> the log so you can't find it that way either. The above was found
> eventually by doing content search on the PCAPs.
> 
> Presumably this is due to some aggressive protocol detection but I don't
> see any way that suricata could have decided that packet was IPv6. Is
> this something that can be tweaked?
> 
> Suricata 3.1.

This is probably another case of failing teredo auto detection.

https://redmine.openinfosecfoundation.org/issues/744

-- 
---------------------------------------------
Victor Julien
http://www.inliniac.net/
PGP: http://www.inliniac.net/victorjulien.asc
---------------------------------------------




More information about the Oisf-users mailing list