LibreElec Updates triggers Emerging Threats Suricata Rules.

  • Probably just a rule that needs to be suppressed for false positives, but I thought it might be worth mentioning here. I don't know if there is anything that can be done programming side to prevent this?

    LibreElec updates triggers an alert on suricata ET rules.

    alert http $HOME_NET any -> $EXTERNAL_NET any (msg:"ET POLICY Python-urllib/ Suspicious User Agent"; flow:established,to_server; content:"Python-urllib/"; nocase; http_user_agent; depth:14; content:!"dropbox.com|0d0a|"; http_header; reference:url,http://www.useragentstring.com/pages/useragentstring.php; classtype:attempted-recon; sid:2013031; rev:4; )

    Edited once, last by CA_cabotage (February 16, 2017 at 12:17 AM).


  • Probably just a rule that needs to be suppressed for false positives, but I thought it might be worth mentioning here. I don't know if there is anything that can be done programming side to prevent this?

    LibreElec updates triggers an alert on suricata ET rules.

    alert http $HOME_NET any -> $EXTERNAL_NET any (msg:"ET POLICY Python-urllib/ Suspicious User Agent"; flow:established,to_server; content:"Python-urllib/"; nocase; http_user_agent; depth:14; content:!"dropbox.com|0d0a|"; http_header; reference:url,http://www.useragentstring.com/pages/useragentstring.php; classtype:attempted-recon; sid:2013031; rev:4; )

    It's a false positive, and nothing we can do anything about.