Suricata: detect TLS traffic on port 444, too

This is the default port for IPFire's administrative web interface
and should be monitored by Suricata, too.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
c: Stefan Schantl <stefan.schantl@ipfire.org>
Acked-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
This commit is contained in:
Peter Müller
2019-02-22 20:16:00 +00:00
committed by Stefan Schantl
parent cc636c4741
commit 1f3c61b66c

View File

@@ -140,7 +140,7 @@ app-layer:
tls:
enabled: yes
detection-ports:
dp: "[443,465,993,995]"
dp: "[443,444,465,993,995]"
# Completely stop processing TLS/SSL session after the handshake
# completed. If bypass is enabled this will also trigger flow