Revert "Suricata: detect DNS events on port 853, too"

This reverts commit ad99f959e2.

It does not make any sense to try to decode the TLS connection
with the DNS decoder.

Therefore should 853 (TCP only) be added to the TLS decoder.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
This commit is contained in:
Michael Tremer
2019-03-02 17:18:37 +00:00
committed by Stefan Schantl
parent 5d04cfe7d5
commit 96495c9aa2

View File

@@ -140,7 +140,7 @@ app-layer:
tls:
enabled: yes
detection-ports:
dp: "[443,444,465,993,995]"
dp: "[443,444,465,853,993,995]"
# Completely stop processing TLS/SSL session after the handshake
# completed. If bypass is enabled this will also trigger flow
@@ -204,11 +204,11 @@ app-layer:
tcp:
enabled: yes
detection-ports:
dp: "[53,853]"
dp: 53
udp:
enabled: yes
detection-ports:
dp: "[53,853]"
dp: 53
http:
enabled: yes
# memcap: 64mb