Kibana event.dataset.keyword: dns -- How to include encrytped port 853 DNS? #1691
-
|
How do I add port 853 to the built in kibana functions that determine something is DNS? event.dataset.keyword: DNS only includes 53, 5353, and 137. tl;dr Cleanly show an incoming standard 53 request on one side of a firewall, and see the equivalent request go out on the other side for upstream 853. Just be able to compare response times, etc. |
Beta Was this translation helpful? Give feedback.
Replies: 2 comments
-
|
Assuming you're using Zeek instead of Suricata for metadata, |
Beta Was this translation helpful? Give feedback.
-
|
Confirm using zeek, and 853 traffic does show up fine under connections and queries for it work fine. I simply wish for the traffic to be categorized properly. Large quantities of DNS traffic over short periods of time are indicative of a problem, and if one were simply packet counting on the encrypted side, without being properly categorized it makes it easier to overlook. |
Beta Was this translation helpful? Give feedback.
Assuming you're using Zeek instead of Suricata for metadata,
event.datasetis set todnsfor logs coming from Zeek'sdns.log. Zeek automatically logs any name lookups seen on ports 53, 5353, and 137 todns.log. If port 853 is encrypted, then it would seem that Zeek won't be able to determine that it's a name lookup and therefore won't log it todns.log. Zeek should still log some metadata about the connection toconn.logand so you should be able to find that via the KibanaConnectionsdashboard or via theConnectionsqueries in Hunt.