Skip to content

Commit 5787a21

Browse files
committed
update changelog and docs
1 parent 8f7c485 commit 5787a21

File tree

2 files changed

+37
-6
lines changed

2 files changed

+37
-6
lines changed

CHANGELOG.md

Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,16 @@
1+
1.1.6 (Jan 31st, 2025)
2+
* 3x speedup of the profiler process responsible for analyzing the given flows.
3+
* Fix false positive "connection without DNS" detection.
4+
* Fix false positive "DNS without connection" detection.
5+
* Fix problem parsing Suricata DNS flows.
6+
* Fix problem using threat intelligence feeds from cache even if they are not present in the given config file.
7+
* Fix regex warning when starting Slips. Special thanks to @Sekhar-Kumar-Dash.
8+
* Fix Tranco whitelists.
9+
* Improve "Incompatible CN" detection.
10+
* Improve "Invalid DNS answer" detection.
11+
* Improve unit tests. Special thanks to @Sekhar-Kumar-Dash.
12+
* Improve whitelisting by checking if the SNI of each evidence is whitelisted or not.
13+
* Update the license used.
114

215
1.1.5 (Jan 3rd, 2025)
316
- 200x times speedup of domain lookups in the threat intelligence module.

docs/flowalerts.md

Lines changed: 24 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -62,14 +62,20 @@ This detection will ignore certain IP addresses for which a connection without D
6262

6363
DNS resolutions of well known orgs might be done using DoH, in this case, slips
6464
doesn't know about the DNS resolution because the resolved domain won't be in dns.log
65-
so we simply ignore alerts of this type when connected to well known organizations. In particular Facebook, Apple, Google, Twitter, and Microsoft.
65+
so we simply ignore alerts of this type when connected to well known organizations.
66+
In particular Facebook, Apple, Google, Twitter, and Microsoft.
6667

67-
Slips uses it's own lists of organizations and information about them (IPs, IP ranges, domains, and ASNs). They are stored in ```slips_files/organizations_info``` and they are used to check whether the IP/domain of each flow belong to a known org or not.
68+
Slips uses it's own lists of organizations and information about them (IPs, IP ranges, domains, and ASNs).
69+
They are stored in ```slips_files/organizations_info``` and they are used to check whether the IP/domain
70+
of each flow belong to a known org or not.
71+
72+
Slips also doesn't detect connection without DNS to any domain in the tranco whitelist.
6873

6974
Slips doesn't detect 'connection without DNS' when running
70-
on an interface except for when it's done by this instance's own IP and only after 30 minutes has passed to avoid false positives (assuming the DNS resolution of these connections did happen before slips started).
75+
on an interface except for when it's done by this instance's own IP and only after 30 minutes has passed
76+
to avoid false positives (assuming the DNS resolution of these connections did happen before slips started).
7177

72-
check [DoH section](https://stratospherelinuxips.readthedocs.io/en/develop/detection_modules.html#detect-doh)
78+
check the [DoH section](https://stratospherelinuxips.readthedocs.io/en/develop/detection_modules.html#detect-doh)
7379
of the docs for info on how slips detects DoH.
7480

7581

@@ -81,7 +87,8 @@ Slips detects successful SSH connections using 2 ways
8187
2. If all bytes sent in a SSH connection is more than 4290 bytes
8288

8389
## DNS resolutions without a connection
84-
This will detect DNS resolutions for which no further connection was done. A resolution without a usage is slightly suspicious.
90+
This will detect DNS resolutions for which no further connection was done.
91+
A resolution without a usage is slightly suspicious.
8592

8693
The domains that are excepted are:
8794

@@ -93,8 +100,19 @@ The domains that are excepted are:
93100
- Ignore domains without a TLD such as the Chrome test domains.
94101

95102
Slips doesn't detect 'DNS resolutions without a connection' when running
96-
on an interface except for when it's done by this instance's own IP and only after 5 minutes has passed to avoid false positives (assuming the connection did happen and yet to be logged).
103+
on an interface except for when it's done by this instance's own IP and only after 30 minutes has passed to
104+
avoid false positives (assuming the connection did happen and yet to be logged).
105+
106+
107+
When running on interface and files. For each DNS flow found, slips waits 30 mins zeek time
108+
for the connection to be found before setting an evidence.
109+
110+
This is done by comparing each ts of every new dns flow to the pending detection, once 30 mins difference between the 2
111+
flows is detected, slips sets the evidence.
97112

113+
To avoid accumulating so many pending DNS flows for 30 mins, slips checks if the connection of the pending DNS flows
114+
arrived every 10 and 20 mins too, if not found, slips waits extra 10 mins (so that would be 30 mins total) and sets the
115+
evidence.
98116

99117
## Connection to unknown ports
100118

0 commit comments

Comments
 (0)