Skip to content

Conversation

@LaLaGuy
Copy link
Contributor

@LaLaGuy LaLaGuy commented Jan 15, 2026

Describe the bug

The search can detect a 514 udp as rsh on tcp.
When "interesting_ports_lookup" is used, only the port is checked, not the protocol. Plus, only the first result is returned.
This lookup include several entries for the same port (like 514 rsh/syslog) and the wrong entry can get returned. This create false match. The wrong enrichment is given (including a wrong transport method) and a notable is generated when it shouldn't. It can also be greatly optimized by moving the filter logic to the where of the tstats.

Expected behavior

If a 514 udp is detected by the firewall, it should match syslog and not create a notable (or risk) saying it detected a rsh 514 tcp.

Details

It only contains a patch for the search in the rule "Prohibited Network Traffic Allowed".
It now get the transport from the log instead of adding it from the lookup, add transport to the match in the lookup "interesting_ports_lookup" command and the filter logic is now in the where.

### **Describe the bug**
When interesting_ports_lookup is used, only the port is checked, not the protocol.
Plus, only the first result is returned.
This lookup include several entries for the same port (like 514 rsh/syslog) and the wrong entry can get returned.
This create false match. The wrong enrichment is given (including a wrong transport method) and a notable is generated when it shouldn't.
It can also be greatly optimized by moving the filter logic to the where of the tstats.

### **Expected behavior**
If a 514 udp is detected by the firewall, it should match syslog and not create a notable (or risk) telling me we detected a rsh 514 tcp.

### **Additional context**
Here is a solution (we get the transport from the log instead of adding it from the lookup, add transport to the match and move the filter logique up).
@ljstella
Copy link
Contributor

Hi @LaLaGuy

Thanks for the contribution! Just an FYI that the appinspect workflow is expected to fail on forks.

We're currently going through a release process, but will give this the attention it deserves once we're done.

Thanks
Lou

@ljstella
Copy link
Contributor

@LaLaGuy would you mind increasing the version number and the date on the detection? We should be able to merge this once that's done.

@LaLaGuy
Copy link
Contributor Author

LaLaGuy commented Jan 16, 2026

done

Copy link
Contributor

@ljstella ljstella left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM. Thanks again for your contribution!

@ljstella ljstella merged commit d51b057 into splunk:develop Jan 16, 2026
4 of 5 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

[BUG] ESCU - Prohibited Network Traffic Allowed - Rule

2 participants