Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Commit 8344c35

Browse files
authored
Merge pull request Hacker0x01#1208 from Hacker0x01/sw/add-compliance-log-section-to-customer-gateway-page
Add sections for hacker traffic logs to customer gateway page
2 parents 8761562 + 38ad40d commit 8344c35

File tree

4 files changed

+100
-3
lines changed

4 files changed

+100
-3
lines changed

docs/organizations/hackerone-vpn.md

Lines changed: 20 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -41,12 +41,29 @@ You can pause or resume access of individual hackers by:
4141

4242
![gateway_manage_individual_hacker_access](./images/gateway-6.png)
4343

44-
### Activity logs
44+
### Activity Overview
4545

46-
The activity logs show what actions are being performed by Hackers while on the Gateway solution. It is possible to customize the results by using the filters available, such as **Date**, **Month**, **Year** and **start-end** time, or by using the search box.
46+
The activity overview shows what actions are being performed by Hackers while on the Gateway solution. It is possible to customize the results by using the filters available, such as **Date**, **Month**, **Year** and **start-end** time, or by using the search box.
4747
Please note that it can take up to 20 minutes to display the latest activity logs.
4848

49-
![gateway_activity_logs](./images/gateway-7.png)
49+
![gateway_activity_overview](./images/gateway-7.png)
50+
51+
### Download Hacker Traffic Logs
52+
53+
The log page allows you to download verbose logs of your network activities for the selected date at UTC (Coordinated Universal Time).
54+
It might take some time to generate logs depending on the hacker traffic volume on the given date.
55+
You will be notified by email once the logs are ready to download.
56+
57+
The links to download logs are valid for 24 hours. When expired, you can request logs for the same date again and a new link will be generated quickly. You can request a maximum of 5 logs at the same time.
58+
59+
You can view all log requests that have been made for the given program. The table shows request details such as request time, status, requester, the date the log was requested for, expiration time of the download link and a download link if available.
60+
61+
![gateway_download_logs](./images/gateway-8.png)
62+
63+
### Sync Hacker Traffic Logs
64+
65+
To sync logs directly to your selected data storage, please reach out to your CSM. Logs are pushed in batches
66+
as soon as possible. Usually it takes 3-4 minutes for the logs to be available in your data storage.
5067

5168

5269

107 KB
Loading
Lines changed: 78 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,78 @@
1+
---
2+
title: "Gateway Hacker Traffic Logs"
3+
path: "/organizations/vpn-hacker-traffic-logs.html"
4+
id: "organizations/vpn-hacker-traffic-logs"
5+
---
6+
7+
This page describes hacker traffic logs that are available to download or sync to your data storage.
8+
See [this page](/organizations/hackerone-vpn.html#download-hacker-traffic-logs) for instructions on how to obtain these logs.
9+
10+
Logs are provided in a newline-delimited JavaScript Object Notation (NDJSON) format.
11+
Three types of logs are available that are described in detail below:
12+
- [HTTP](#http)
13+
- [Network](#network)
14+
- [Network Session](#network-session)
15+
16+
### HTTP
17+
18+
Field | Description
19+
--------|------------
20+
HTTP Host | Hostname in the HTTP header for the HTTP request.
21+
Email | Email address of the user who made the HTTP request. This is generated by the WARP client.
22+
Action | The Gateway Action taken based on the first rule that matched (for example, Allow or Block).
23+
Datetime | Date and time of the HTTP request.
24+
URL | Full URL of the HTTP request.
25+
Referer | Referer request header containing the address of the page making the request.
26+
HTTP Version | HTTP version of the origin that Gateway connected to on behalf of the user.
27+
HTTP Method | HTTP method used for the request (for example, GET or POST).
28+
HTTP Status Code | HTTP status code returned in the response.
29+
Destination IP | Public IP address of the destination requested.
30+
Destination Port | Port of the destination requested.
31+
User Agent | User agent header sent in the request by the originating device.
32+
Untrusted Certificate Action | Action taken when an untrusted origin certificate error occurs (for example, expired certificate, mismatched common name, invalid certificate chain, signed by non-public CA). One of **none**, **block**, **error** or **passThrough**.
33+
SessionID | The session identifier of this network session.
34+
35+
### Network
36+
37+
Field | Description
38+
------|------------
39+
Destination IP | IP address of the packet’s target.
40+
Action | The Gateway Action taken based on the first rule that matched (for example, Allow or Block).
41+
Session ID | ID of the unique session.
42+
Datetime | Date and time of the session.
43+
Source Port | Source port number for the packet.
44+
SNI | Host whose Server Name Indication (SNI) header Gateway will filter traffic against.
45+
Email | Email address of the user sending the packet.
46+
OverrideIP | Overridden IP of the network session, if any.
47+
OverridePort | Overridden port of the network session, if any.
48+
Transport | Transport protocol used for this session. Possible values are **tcp**, **quic** and **udp**.
49+
50+
### Network Session
51+
52+
Field | Description
53+
------|------------
54+
BytesReceived | The number of bytes sent from the origin to the client during the network session.
55+
BytesSent | The number of bytes sent from the client to the origin during the network session.
56+
ClientTCPHandshakeDurationMs | Duration of handshaking the TCP connection between the client and Cloudflare in milliseconds.
57+
ClientTLSCipher | TLS cipher suite used in the connection between the client and Cloudflare.
58+
ClientTLSHandshakeDurationMs | Duration of handshaking the TLS connection between the client and Cloudflare in milliseconds.
59+
ClientTLSVersion | TLS protocol version used in the connection between the client and Cloudflare.
60+
ConnectionCloseReason | The reason for closing the connection, only applicable for TCP. Possible values are **clientClosed**, **originClosed**, **timeout**, **clientTcpError**, **clientTlsError**, **originTcpError** and **originTlsError**.
61+
ConnectionReuse | Whether the TCP connection was reused for multiple HTTP requests.
62+
EgressColoName | The name of the Cloudflare colocation from which traffic egressed to the origin.
63+
EgressIP | Source IP used when egressing traffic from Cloudflare to the origin.
64+
EgressPort | Source port used when egressing traffic from Cloudflare to the origin.
65+
Email | [Email address alias](/hackers/hacker-email-alias.html) associated with the user identity which initiated the network session.
66+
IngressColoName | The name of the Cloudflare colocation to which traffic ingressed.
67+
Offramp | The type of destination to which the network session was routed. Possible values are **internet**, **magic**, **cfd_tunnel** and **WARP**.
68+
OriginIP | The IP of the destination origin for the network session.
69+
OriginPort | The port of the destination origin for the network session.
70+
OriginTLSCertificateIssuer | The issuer of the origin TLS certificate.
71+
OriginTLSCertificateValidationResult | The result of validating the TLS certificate of the origin. Possible values are **valid**, **expired**, **revoked** and **hostnameMismatch**.
72+
OriginTLSCipher | TLS cipher suite used in the connection between Cloudflare and the origin.
73+
OriginTLSHandshakeDurationMs | Duration of handshaking the TLS connection between Cloudflare and the origin in milliseconds.
74+
OriginTLSVersion | TLS protocol version used in the connection between Cloudflare and the origin.
75+
Protocol | Network protocol used for this network session. Possible values are **tcp**, **udp**, **icmp** and **icmpv6**.
76+
SessionEndTime | The network session end timestamp with nanosecond precision.
77+
SessionID | The identifier of this network session.
78+
SessionStartTime | The network session start timestamp with nanosecond precision.

src/pages/organizations/organizations-nav.yaml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -352,6 +352,8 @@
352352
- title: Gateway
353353
path: /organizations/hackerone-vpn.html
354354
items:
355+
- title: Hacker Traffic Logs
356+
path: /organizations/vpn-hacker-traffic-logs.html
355357
- title: Gateway V1
356358
path: /organizations/hackerone-vpn-v1.html
357359
- title: FAQs Gateway V1

0 commit comments

Comments
 (0)