mirror of
https://github.com/zeek/zeek.git
synced 2025-10-14 04:28:20 +00:00

- Large rework on packet filter framework to make many things easier. - Removed the PacketFilter::all_packets variable because it was confusing. - New variable (PacketFilter::enable_auto_protocol_capture_filters) to re-enable the old filtering model of only sniffing ports for analyzed protocols. - In progress plugin model for adding filtering mechanisms. - New default single item for capture_filters = { ["default"] = PacketFilter::default_capture_filter }; - Mechanism and helper functions to "shunt" traffic with filters. - Created the Protocols framework to assist with reworking how base protocol scripts are registered with DPD and other things. - Protocols framework creates BPF filters for registered analyzers. (if using PacketFilter framework in that mode).
12 lines
589 B
Text
12 lines
589 B
Text
## Capture TCP fragments, but not UDP (or ICMP), since those are a lot more
|
|
## common due to high-volume, fragmenting protocols such as NFS :-(.
|
|
|
|
## This normally isn't used because of the default open packet filter
|
|
## but we set it anyway in case the user is using a packet filter.
|
|
## Note: This was removed because the default model now is to have a wide
|
|
## open packet filter.
|
|
#redef capture_filters += { ["frag"] = "(ip[6:2] & 0x3fff != 0) and tcp" };
|
|
|
|
## Shorten the fragment timeout from never expiring to expiring fragments after
|
|
## five minutes.
|
|
redef frag_timeout = 5 min;
|