base/frameworks/analyzer/dpd.zeek
- DPD
Activates port-independent protocol detection and selectively disables analyzers if protocol violations occur.
- Namespace:
DPD
Summary
Runtime Options
Analyzers which you don’t want to throw |
|
Ignore violations which go this many bytes into the connection. |
|
Number of protocol violations to tolerate before disabling an analyzer. |
Types
The record type defining the columns to log in the DPD logging stream. |
|
Ongoing DPD state tracking information. |
Redefinitions
Add the DPD logging stream identifier. |
|
|
Hooks
A default logging policy hook for the stream. |
Detailed Interface
Runtime Options
- DPD::ignore_violations
- Type:
- Attributes:
- Default:
{}
- Redefinition:
from base/protocols/dce-rpc/main.zeek
+=
:Analyzer::ANALYZER_DCE_RPC
- Redefinition:
from base/protocols/ntlm/main.zeek
+=
:Analyzer::ANALYZER_NTLM
Analyzers which you don’t want to throw
- DPD::ignore_violations_after
-
Ignore violations which go this many bytes into the connection. Set to 0 to never ignore protocol violations.
- DPD::max_violations
-
Number of protocol violations to tolerate before disabling an analyzer.
Types
- DPD::Info
- Type:
-
- ts:
time
&log
Timestamp for when protocol analysis failed.
- uid:
string
&log
Connection unique ID.
- id:
conn_id
&log
Connection ID containing the 4-tuple which identifies endpoints.
- proto:
transport_proto
&log
Transport protocol for the violation.
- analyzer:
string
&log
The analyzer that generated the violation.
- failure_reason:
string
&log
The textual reason for the analysis failure.
- packet_segment:
string
&optional
&log
(present if policy/frameworks/dpd/packet-segment-logging.zeek is loaded)
A chunk of the payload that most likely resulted in the analyzer violation.
- ts:
The record type defining the columns to log in the DPD logging stream.
Hooks
- DPD::log_policy
- Type:
A default logging policy hook for the stream.