Kibana event.dataset.keyword: dns -- How to include encrytped port 853 DNS? #1691
-
How do I add port 853 to the built in kibana functions that determine something is DNS? event.dataset.keyword: DNS only includes 53, 5353, and 137. tl;dr Cleanly show an incoming standard 53 request on one side of a firewall, and see the equivalent request go out on the other side for upstream 853. Just be able to compare response times, etc. |
Beta Was this translation helpful? Give feedback.
Replies: 2 comments
-
Assuming you're using Zeek instead of Suricata for metadata, |
Beta Was this translation helpful? Give feedback.
-
Confirm using zeek, and 853 traffic does show up fine under connections and queries for it work fine. I simply wish for the traffic to be categorized properly. Large quantities of DNS traffic over short periods of time are indicative of a problem, and if one were simply packet counting on the encrypted side, without being properly categorized it makes it easier to overlook. |
Beta Was this translation helpful? Give feedback.
Assuming you're using Zeek instead of Suricata for metadata,
event.dataset
is set todns
for logs coming from Zeek'sdns.log
. Zeek automatically logs any name lookups seen on ports 53, 5353, and 137 todns.log
. If port 853 is encrypted, then it would seem that Zeek won't be able to determine that it's a name lookup and therefore won't log it todns.log
. Zeek should still log some metadata about the connection toconn.log
and so you should be able to find that via the KibanaConnections
dashboard or via theConnections
queries in Hunt.