detect-engine: - profile: high [it is set to medium, high would use more ram to save some CPU, I have 4GB of RAM]app-layer: protocols: tls: enabled: yes detection-ports: dp: 443 no-reassemble: yes [remove comment here so it IS set for no-reassemble:yes]
If no-reassemble is set to true, all processing of this session is stopped. No further parsing and inspection happens. If bypass is enabled this will lead to the flow being bypassed, either inside Suricata or by the capture method if it supports it.If no-reassemble is set to false, which is the default, Suricata will continue to track the SSL/TLS session. Inspection will be limited, as content inspection will still be disabled. There is no point in doing pattern matching on traffic known to be encrypted. Inspection for (encrypted) Heartbleed and other protocol anomalies still happens.