HTTP and HTTPS Conection loss with Suricata´s "OISF Traffic ID Rules"

Hi guys!!!.

I have the IPFire mounted on a NanoPI r2s with 1Gb of ram and had out of memory problems with the “Emergingthreats.net Community Rules” and I have been trying others.

With the “OISF Traffic ID Rules” I have had the problem that it has totally cut off my Internet connectivity in both HTTP and HTTPS. I couldn’t even access the IPFire GUI.

The log appeared like this:

SURICATA STREAM excessive retransmissions

I have had to enter via PUTTY with the USB-TTL to the COM port and through the “ELINKS”, blessed be, everything is said, I have deactivated the IPS and I have been able to solve the problem.

Anyone else has happened?.

Greetings.

@roberto

Hi

SURICATA STREAM excessive retransmissions

From this site : https://github.com/OISF/suricata/blob/master/rules/stream-events.rules

# retransmission detection
#
# The rules below match on retransmissions detected in various stages of the
# stream engine. They are all “noalert” rules that increment the counter
# tcp.retransmission.count. The last rule sid:2210054 matches if the counter
# reaches 10. Increase this number if the rule is too noisy.

alert tcp any any → any any (msg:“SURICATA STREAM excessive retransmissions”; flowbits:isnotset,tcp.retransmission.alerted; flowint:tcp.retransmission.count,>=,10; flowbits:set,tcp.retransmission.alerted; classtype:protocol-command-decode; sid:2210054; rev:1;)

Maybe try to increase retransmission count from 10 to higher value.

2 Likes

Thanks @loup001.

I’ll see if I can find time and look at it.

Greetings.

@roberto

From ipfire blog : IPFire 2.27 - Core Update 165 released

Misc.

  • A long-standing bug with broken cable modems has been fixed: Some providers have cable modems which return an unusually small MTU of only 576 bytes which will cause that IPFire will fragment every packet larger than this before it can be sent out on the RED interface. This can now properly changed in the setup tool and IPFire will accept any custom value. This used to break video conferences over UDP which could not re-assemble the fragmented video stream and which did not automatically fall back to TCP (#12563).

Depending on your isp, this might require investigation too.

Hi all,

given that descriptions, I don’t really see a benefit in this rule. Retransmissions happen all the time, and while more than 10 of them should not occur in robustly connected setups, they may well happen if a connection is unstable, or has a lot of latency (or some packet loss) involved. Cellular networks match that description.

Are things fine again if this IPS rule is disabled? Or are we dealing with a more general problem here?

Thanks, and best regards,
Peter Müller

1 Like