Skip to content

Commit

Permalink
Add Rule for unexpected udp traffic
Browse files Browse the repository at this point in the history
New rule Unexpected UDP Traffic checks for udp traffic not on a list of
expected ports. Currently blocked on
#308.
  • Loading branch information
mstemm committed Jan 25, 2018
1 parent 070a67d commit 2791e6a
Showing 1 changed file with 24 additions and 0 deletions.
24 changes: 24 additions & 0 deletions rules/falco_rules.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -1361,6 +1361,30 @@
priority: NOTICE
tags: [network]

- list: openvpn_udp_ports
items: [1194, 1197, 1198, 8080, 9201]

- list: l2tp_udp_ports
items: [500, 1701, 4500, 10000]

- list: statsd_ports
items: [8125]

- list: expected_udp_ports
items: [53, openvpn_udp_ports, l2tp_udp_ports, statsd_ports]

- macro: expected_udp_traffic
condition: fd.sport in (expected_udp_ports)

- rule: Unexpected UDP Traffic
desc: UDP traffic not on port 53 (DNS) or commonly used VPN Ports
condition: (inbound or outbound) and fd.l4proto=udp and not expected_udp_traffic
output: >
Unexpected UDP Traffic Seen
(user=%user.name command=%proc.cmdline connection=%fd.name proto=%fd.l4proto fd=%fd.sport)
priority: NOTICE
tags: [network]

# With the current restriction on system calls handled by falco
# (e.g. excluding read/write/sendto/recvfrom/etc, this rule won't
# trigger).
Expand Down

0 comments on commit 2791e6a

Please sign in to comment.