-
Rule writers have reported that Suricata can't inspect some fields in a cert if the issuer is missing from it.
https://redmine.openinfosecfoundation.org/issues/5439
Suricata's call to `parse_x509_…
-
Commented down below highlights the issue I am experiencing with both Security Onion and Suricata. If anyone has experience with this issue or similar, please feel free to reach out. Thanks in adv…
-
Hi
Very nice Project Idea.
I setup everything and it works so far. One Question, if Suricata detect malware, it does not block it, right? Only trigger alarm?
-
How are Suricata and Kibana Dashboard connected?
Because Kibana Dashboard does not display any graph
-
Installation fails:
```
Run 'make install-conf' if you want to install initial configuration files. Or 'make install-full' to install configuration and rules
make[2]: Leaving directory '/tmp/suri…
-
Hello everybody, I have this error when run a new analysis
28/9/2019 -- 11:25:12 - - [ERRCODE: SC_ERR_CONF_YAML_ERROR(242)] - Failed to parse configuration file at line 373: did not find expected…
-
**Describe the problem**
```
TASK [Run Venom testsuites] ****************************************************
Wednesday 01 May 2024 08:45:57 -0400 (0:00:01.231) 0:00:40.799 *********
chang…
JeGoi updated
1 month ago
-
After docker-compose provided by this script:
#!/bin/bash
cd /SELKS/docker
./easy-setup.sh --non-interactive -i enp0s31f6 --iA --restart-mode always --es-memory 4G --ls-memory 4G
docker-compose…
-
This is not a bug report or a problem but a simple question...
How do you manage to export events into Suricata events? How do you follow the syntax?
By example, I'm exporting events in an environ…
-
I'm facing something strange with Suricata rules generated by MISP.
We have an event with the following attribute: "http://xxxxxx.ec/"
The generate Suricata rule is:
`
alert http $HOME_NET a…