Tune Suricata by Message Content #9483
-
Hello, For Suricata rule 2028816 "ET JA3 Hash - [Abuse.ch] Possible Tofsee", offenses are being fired due to a JA3 fingerprint.. In the Message content, the hash is identified as (in bold): Abuse.ch] Possible Tofsee","category":"Unknown Traffic","severity":3,"metadata":{"created_at":["2019_10_14"],"former_category":["JA3"],"updated_at":["2019_10_29"]},"rule":"alert tls $HOME_NET any -> $EXTERNAL_NET any (msg:"ET JA3 Hash - [Abuse.ch] Possible Tofsee"; ja3_hash; content:"9f62c4f26b90d3d757bea609e82f2eaf"; reference:url,sslbl.abuse.ch/ja3-fingerprints/;" It is a Synology Quickconnect site, false positive. How is it possible to tune this specific "content hash" in the message from firing the offense? There is a section for Metadata on Suricata but I don't see that option there, It's unlike all other tuning I've done via suppression and disabling... Any help is greatly appreciated. https://docs.securityonion.net/en/2.3/suricata.html#metadata Thank you. |
Beta Was this translation helpful? Give feedback.
Replies: 1 comment 3 replies
-
You should be able to disable, modify, or suppress the rule: |
Beta Was this translation helpful? Give feedback.
You should be able to disable, modify, or suppress the rule:
https://docs.securityonion.net/en/2.3/managing-alerts.html#so-what-s-next