Some checks failed
Build RPM Package / Build RPM Packages (CentOS 7, Rocky 8/9/10) (push) Has been cancelled
+- FEATURE: Add comprehensive metrics for capture and TLS parser monitoring +- Capture metrics: packets_received, packets_sent, packets_dropped (atomic counters) +- Parser metrics: retransmit_count, gap_detected_count, buffer_exceeded_count, segment_exceeded_count +- New GetStats() method on Capture interface for capture statistics +- New GetMetrics() method on Parser interface for parser statistics +- Add DefaultMaxHelloSegments constant (100) to prevent memory leaks from fragmented handshakes +- Add Segments field to ConnectionFlow for per-flow segment tracking +- Increase DefaultMaxTrackedFlows from 50000 to 100000 for high-traffic scenarios +- Improve TCP reassembly: better handling of retransmissions and sequence gaps +- Memory leak prevention: limit segments per flow and buffer size +- Aggressive flow cleanup: clean up JA4_DONE flows when approaching flow limit +- Lock ordering fix: release flow.mu before acquiring p.mu to avoid deadlocks +- Exclude IPv6 link-local addresses (fe80::) from local IP detection +- Improve error logging with detailed connection and TLS extension information +- Add capture diagnostics logging (interface, link_type, local_ips, bpf_filter) +- Fix false positive retransmission counter when SYN packet is missed +- Fix gap handling: reset sequence tracking instead of dropping flow +- Fix extractTLSExtensions: return error details with basic TLS info for debugging
58 lines
1.8 KiB
Plaintext
58 lines
1.8 KiB
Plaintext
# Sample configuration file for ja4sentinel
|
|
# Copy to config.yml and adjust as needed
|
|
|
|
core:
|
|
# Network interface to capture traffic from
|
|
# "any" captures on all interfaces (default, recommended)
|
|
# Or specify a specific interface (e.g., eth0, ens192, etc.)
|
|
interface: any
|
|
|
|
# TCP ports to monitor for TLS handshakes
|
|
listen_ports:
|
|
- 443
|
|
- 8443
|
|
|
|
# Optional BPF filter (leave empty for auto-generated filter based on listen_ports and local_ips)
|
|
bpf_filter: ""
|
|
|
|
# Local IP addresses to monitor (traffic destined to these IPs will be captured)
|
|
# Leave empty for auto-detection (recommended) - excludes loopback addresses
|
|
# Or specify manually: ["192.168.1.10", "10.0.0.5", "2001:db8::1"]
|
|
local_ips: []
|
|
|
|
# Source IP addresses or CIDR ranges to exclude from capture
|
|
# Useful for filtering out internal traffic, health checks, or monitoring systems
|
|
# Examples: ["10.0.0.0/8", "192.168.1.1", "172.16.0.0/12"]
|
|
exclude_source_ips: []
|
|
|
|
# Timeout in seconds for TLS handshake extraction (default: 30)
|
|
flow_timeout_sec: 30
|
|
|
|
# Buffer size for packet channel (default: 1000, increase for high-traffic environments)
|
|
packet_buffer_size: 1000
|
|
|
|
# Log level: debug, info, warn, error (default: info)
|
|
# Can be overridden by JA4SENTINEL_LOG_LEVEL environment variable
|
|
log_level: info
|
|
|
|
outputs:
|
|
# Output to UNIX socket (for systemd/journald or other consumers)
|
|
# Only JSON LogRecord data is sent - no diagnostic logs
|
|
- type: unix_socket
|
|
enabled: true
|
|
params:
|
|
socket_path: /var/run/logcorrelator/network.socket
|
|
|
|
# Output to stdout (JSON lines)
|
|
# Diagnostic logs (error, debug, warning) should go here
|
|
# - type: stdout
|
|
# enabled: false
|
|
# params: {}
|
|
|
|
# Output to file
|
|
# Only JSON LogRecord data is sent - no diagnostic logs
|
|
# - type: file
|
|
# enabled: false
|
|
# params:
|
|
# path: /var/log/ja4sentinel/ja4.log
|