DVB-Cube <<< Das deutsche PC und DVB-Forum >>>

PC-Ecke => # Security Center => Software (PC-Sicherheit) => Thema gestartet von: SiLæncer am 19 September, 2009, 08:29

Titel: Netzwerk-Schwein Snort ...
Beitrag von: SiLæncer am 19 September, 2009, 08:29
Ab sofort steht die Sicherheits-Software Snort 2.8.5 bereit. Unter anderem soll die neueste Version in Sachen Geschwindigkeit schneller geworden sein.

Die „VRT Certified“ rules werden ab sofort kompatibel mit Version 2.8.5 sein. Offizielle Unterstützung für Ausgabe 2.8.4 gibt es noch 90 Tage. Die Entwickler heben unter anderem hervor, dass Anwender nun mehrere Konfigurations-Dateien benutzen können. Diese lassen sich entweder mittels Vlan ID oder IP-Adresse an die Konfigurations-Datei binden. Statt mehrerer Snort-Prozesse können Anwender nun einen laufen lassen, dafür aber multiple snort.conf-Dateien. Ebenso ist die Funktion „SSH preprocessor“ nicht länger experimentell.

Weitere Informationen finden Sie in den vollständigen Release-Notizen (http://dl.snort.org/snort-current/release_notes_285.txt). Ebenso stellen die Entwickler einen Leitfaden zur Verfügung, der bei einem Upgrade hilfreich sein soll. Die neueste Version finden Sie im Download-Bereich (http://www.snort.org/downloads) der Projektseite. Neben dem Quellcode stehen auch Binärpakete im RPM-Format und Windows zur Verfügung.

Quelle : www.tecchannel.de
Titel: Snort 2.8.6.1 und Snort 2.9 Beta stehen bereit
Beitrag von: SiLæncer am 01 August, 2010, 12:11
Ab sofort steht eine neue Ausgabe der Sicherheits-Software Snort zur Verfügung. Darüber hinaus gibt es eine Beta-Ausgabe von 2.9.
Snort 2.8.6.1 bereinigt einige Fehler. Dazu gehört die Elimination von so genannten False Positives bei der Verwendung von fast_pattern:only und nur einen http-Inhalt im Mustervergleich.

Die Beta-Version von 2.9 bringt interessante Neuerungen mit sich. Die Entwickler stellen zum Beispiel eine Datensammel-API (DAQ) zur Verfügung. Ebenso gibt es Updates im Bereich IPv6. Interessierte finden alle Details und Neuerungen in der offiziellen Ankündigung (http://www.snort.org/news/2010/07/28/snort-2-8-6-1-and-snort-2-9-beta-released/). Beide Versionen können Sie aus dem Download-Bereich (http://www.snort.org/snort-downloads) der Projektseite herunterladen.

Quelle : www.tecchannel.de
Titel: Einbruchserkennunssystem Snort 2.9.0 mit Datensammel-API DAQ
Beitrag von: SiLæncer am 05 Oktober, 2010, 10:57
Das Snort-Team hat eine neue Version seines Intrusion-Verhinderungs- und Erkennungssystems (IPS/IDS) Snort veröffentlicht. Snort überwacht Netzwerke, indem der Netzwerkverkehr in Echtzeit analysiert wird. Das Analysewerkzeug basiert auf einem Regelwerk und kann Puffer-Überläufe, heimliche Portscans, CGI-Attacken und OS-Fingerprint-Versuche erkennen.

In Snort 2.9 wurde die Inline-Installation des IPS verbessert. Das Inline-Deplyment Snorts, das Datenströme analysiert, wurde um eine neue aktive API für Antwortpakete erweitert. Das Modul respond3 unterstützt die Syntax von resp als auch resp2 und kann zur Auswertung von Stream-, Respond- oder React-Paketen genutzt werden. Dank eines neuen Vorprozessors kann Snort ein Paket wie der empfangende Host interpretieren. Eine Datensammel-API (DAQ) erlaubt es als Abstraktionsebene Hilfaanwendungen wie libpcap, netfilterq, IPFW, und afpacket zum Erfassen von Hardware-Paketen zu integrieren und den Snort-Modus ohne Neukompilierung zwischen Passiv und Inline zu wechseln.

HTTP Inspect kann IP-Adressen aus X-Forward-For- und True-Client-IP-Header-Filtern auslesen und protokollieren, die neue Regel »byte_extract« erlaubt es, Werte zu extrahieren und in nachfolgenden Regeloptionen für isdataat, byte_test, byte_jump und content distance/within/depth/offset zu verwenden. Der SMTP-Preprocessor wurde aktualisiert, so dass er jetzt MIME-Anhänge über verschiedenartige Pakete decodieren kann. Der Paket-Decoder für IPv6 wurde dahingehend verbessert, dass er Anomalien erkennt und eine neue Mustererkennung unterstützt Intel's Quick Assist Technology, was eine schnellere Analyse zulässt.

Snort wurde 1998 vom Sourcefire-Gründer Martin Roesch entwickelt und begann sein Dasein als leichtgewichtiges IDS, dass immer weiter ausgebaut wurde. Das IPS/IDS steht unter der GPLv2, die aktuelle Version 2.9 wird auf der Projektwebseite zum Download (http://www.snort.org/snort-downloads) angeboten.

Quelle : www.pro-linux.de
Titel: Snort 2.9.0.5
Beitrag von: SiLæncer am 08 April, 2011, 16:04
2011-03-23 Steven Sturges <ssturges@sourcefire.com>
  * src/build.h:
      Increment Snort build number to 134
  * src/: decode.h, encode.c:
  * src/dynamic-plugins/sf_engine/: sf_snort_packet.h:
  * src/preprocessors/: spp_sfportscan.c, spp_frag3.c:
  * src/output-plugins/: spo_alert_fast.c:
  * src/preprocessors/Stream5/: stream5_common.c:
      Updated portscan to set protocol correctly in raw packet for
      IPv6 and changed the encoder to recognize portscan packets as pseudo
 packets so that the checksum isn't calculated
  * src/: sfdaq.c, util.c:
      Improve handling of DAQ failure codes when Snort is shutting down.
  * src/preprocessors/spp_perfmonitor.c:
      Update perfmonitor to create now files prior to dropping privs

2011-03-16 Ryan Jordan <ryan.jordan@sourcefire.com>
Snort 2.9.0.5
  * src/build.h:
      Increment Snort build number to 132
  * src/snort.c:
  * src/preprocessors/: normalize.c, perf-base.c, perf-base.h,
    Stream5/snort_stream5_tcp.c:
      TCP timestamp options are only NOPed by the Normalization preprocessor
      if Stream5 has seen a full 3-way handshake, and timestamps weren't
      negotiated.

      The IPS mode reassembly policy has been refactored to do stream
      normalization within the first policy.

      Packets injected by the normalization preprocessor are now counted
      in the packet statistics.
  * doc/snort_manual.tex:
  * src/: parser.c, parser.h:
  * src/preprocessors/: spp_frag3.c, Stream5/snort_stream5_session.c:
      Added a "config vlan_agnostic" setting that globally disables Stream's
      use of vlan tag in session tracking.
  * src/: snort.c, preprocessors/normalize.c,
    preprocessors/spp_normalize.c, preprocessors/spp_normalize.h,
    preprocessors/perf-base.c, preprocessors/perf-base.h:
  * doc/: README.normalize, snort_manual.pdf, snort_manual.tex:
      Fixed the normalization preprocessor to call its post-initialization
      config functions during a policy reload.

      Packets can no longer be trimmed below the minimum ethernet frame
      length. Trimming is now configurable with the "normalize_ip4: trim;"
      option. TOS clearing is now configurable with "normalize_ip4: tos;".

      The "normalize_ip4: trim" option is automatically disabled if the
      DAQ can't inject packets. If the DAQ tries and fails to inject
      a given packet, the wire packet is not blocked.

      Updated documentation regarding these changes.
  * src/detection-plugins/sp_cvs.c:
      Fixed a false positive in the CVS detection plugin. It was incorrectly
      parsing CVS entries that had a '+' in between the 3rd and 4th slashes.
  * src/preprocessors/HttpInspect/: client/hi_client.c,
    server/hi_server.c:
      Changed a pointer comparison to a size check for code readability.
      Belated thanks to Dwane Atkins and Parker Crook for reporting a
      related issue that was fixed in Snort 2.9.0.4 build 111.

      Moved the zlib initialization such that gzipped responses are still
      inspected if the zipped data starts after the first Stream-reassembled
      packet is inspected.
  * src/decode.c:
      Fixed an issue with decoding too many IP layers in a single packet. The
      Teredo proto bit was not unset after hitting the limit on IP layers.
      Thanks to Dwane Atkins for reporting this issue.

      IPv6 fragmented packets are no longer inspected unless they have an
      offset of zero and the next layer is UDP. This behavior is consistent
      with IPv4 decoding.
      Thanks to Martin Schütte for reporting an issue where fragged ICMPv6
      packets were being inspected.

      The decoder no longer attempts to decode Teredo packets inside of
      IPv4 fragments, instead waiting for the reassembled packet.
  * src/encode.c:
      Fixed a problem where encoded packets had their lengths calculated
      incorrectly. This caused the active response feature to generate
      incorrect RST packets if the original packet had a VLAN tag.
  * preproc_rules/preprocessor.rules:
      Updated references to rule 125:1:1
  * src/preprocessors/spp_perfmonitor.c:
      Perfmonitor files are now created after Snort changes uid/gid.
  * src/dynamic-plugins/sf_preproc_example/sf_dynamic_preproc_lib.c:
      Fixed the size formatting of an error message argument when
      compiling with --enable-rzb-saac.
      Thanks to Cleber S. Brandão for reporting this issue.
  * etc/snort.conf:
      Updated the default snort.conf with max compress and decompress
      depths to enable unlimited decompression of gzipped HTTP responses.
  * snort.8:
      Fixed the man page's URL regarding the location of Snort rules.
      Thanks to Michael Scheidell for reporting an out-of-date man page section.
  * doc/README.http_inspect, doc/snort_manual.tex,
    src/preprocessors/snort_httpinspect.c:
      HTTP Inspect's "unlimited_decompress" option now requires that
      "compress_depth" and "decompress_depth" are set to their max values.
  * src/: fpcreate.c, dynamic-plugins/sf_dynamic_define.h,
    dynamic-plugins/sf_dynamic_engine.h,
    preprocessors/Stream5/snort_stream5_tcp.c:
      Fixed an error that prevented compiling with --disable-dynamicplugin.
      Thanks to Jason Wallace for reporting this issue.
  * src/dynamic-preprocessors/ftptelnet/: snort_ftptelnet.c,
    snort_ftptelnet.h, spp_ftptelnet.c:
      Changed the names of ProcessGlobalConf() and PrintGlobalConf() inside
      the ftp_telnet preprocessor to avoid a naming conflict with similar
      functions in HTTP Inspect.
      Thanks to Bruce Corwin for reporting this issue.
  * src/preprocessors/: perf.c, perf-base.c, perf-base.h, perf-flow.c,
    perf-flow.h:
      Fixed comparisons between signed and unsigned int, which lead to
      a faulty length check.
      Thanks to Cihan Ayyildiz and Jason Wallace for helping us debug this
      issue.

http://www.snort.org/
Titel: Snort 2.9.1
Beitrag von: SiLæncer am 25 August, 2011, 16:06
Snort 2.9.1 introduces the following new capabilities:

* Protocol aware reassembly support for HTTP and DCE/RPC
preprocessors.  Updates to Stream5 allowing Snort to more
intelligently inspect HTTP and DCE/RPC requests and responses.
See README.stream5 subsection related to Protocol Aware Flushing
(PAF).

* SIP preprocessor to identify SIP call channels and provide
rule access via new rule option keywords.  Also includes new
preprocessor rules for anomalies in the SIP communications.
See the Snort Manual and README.sip for details.

* POP3 & IMAP preprocessors to decode email attachments in
Base64, Quoted Printable, and uuencode formats, and updates
to SMTP preprocessor for decoding email attachments encoded
as Quoted Printable and uuencode formats.  See the Snort
Manual, README.pop, README.imap, and README.SMTP for details.

* Support for reading large pcap files.

* Logging of HTTP URL (host and filename), SMTP attachment
filenames and email recipients to unified2 when Snort generates
events on related traffic.

* IP Reputation preprocessor, allowing Snort to blacklist or
whitelist packets based on their IP addresses. This preprocessor
is still in an experimental state, so please report any issues
to the Snort team.  See README.reputation for more information.

Additionally, the following updates and improvements have been made:

* Updates to give shared library rules direct access to gzip
decoding capabilities.

* Rule Option Improvements:

- Updates to content modifier http_cookie to not include
the HTTP header names themselves in the buffer.  This change
may affect existing rules that leverage this keyword.

- Updates to the file_data and base64_data rule option keywords
and added a pkt_data rule option keyword that sets the buffer
to be used for subsequent content/pcre/etc rule options.

- Updates to the tcp flag rule option keyword to support 'C'
and 'E' for CWR and ECN bits.

- Updates to byte_extract rule option keyword to support
the same string formats as with byte_test and byte_jump.

* Updates to Snort's build infrastructure and autoconf script
for portability and improved checks for library dependencies.
To facilitate easier building of Snort on many of the different
platforms supported, Snort now uses pkg-config to check for
certain library locations.  Obtain pkg-config from freedesktop.org.

* Many updates and improvements to the Snort documentation.  Special
thanks to all of the contributors from the Snort community for
working with us and making the documentation more accurate and
usable.

* Updates to the sensitive data preprocessor for handling HTTP
traffic and reducing false positives.

* Updates to Snort's config parsing to provide more meaningful
error messages relating to snort.conf errors and configuration
display at startup.

* Updates to Snort's active response packets whether via response
keyword or part of inline normalization.

* Improvements to HTTP Inspect processing of chunked HTTP data.
Additional HTTP Inspect alerts for evasion attempts such as small
chunks and excessive whitespace in folded headers.

* Updates to the statistics Snort prints to console or syslog
at exit for different preproessors.



2.9.1.0 Changelog:

Snort 2.9.1
* src/build.h:
Updated build number to 71.

* etc/gen-msg.map, preproc_rules/decoder.rules, src/decode.c,
src/decode.h, src/generators.h, src/snort.c,
src/dynamic-plugins/sf_engine/sf_snort_packet.h:
Fixed an issue with decoding large numbers of IPv6 extension headers.
Added rule 116:456 to safeguard against too many IPv6 extension headers.
Thanks to Martin Schutte for reporting the issue.

* src/detection-plugins/sp_urilen_check.c,
src/detection-plugins/sp_urilen_check.h:
Fixed the urilen rule option to look at reassembled packets.
Added an extra parameter to specify whether to check raw or normalized uri buffer. Will check raw uri buffer by default.

* src/: dynamic-preprocessors/dcerpc2/sf_dce2.dsp,
dynamic-preprocessors/dns/sf_dns.dsp,
dynamic-preprocessors/ftptelnet/sf_ftptelnet.dsp,
dynamic-preprocessors/imap/sf_imap.dsp,
dynamic-preprocessors/isakmp/sf_isakmp.dsp,
dynamic-preprocessors/pop/sf_pop.dsp,
dynamic-preprocessors/reputation/sf_reputation.dsp,
dynamic-preprocessors/sdf/sf_sdf.dsp,
dynamic-preprocessors/sip/sf_sip.dsp,
dynamic-preprocessors/smtp/sf_smtp.dsp,
dynamic-preprocessors/ssh/sf_ssh.dsp,
dynamic-preprocessors/ssl/sf_ssl.dsp,
win32/WIN32-Prj/sf_engine.dsp:
Fixed a bug where the sensitive_data preprocessor gave an error while loading sensitive data rules.

* doc/README.http_inspect, etc/gen-msg.map,
preproc_rules/preprocessor.rules, src/generators.h,
src/preprocessors/snort_httpinspect.c,
src/preprocessors/HttpInspect/event_output/hi_eo_log.c,
src/preprocessors/HttpInspect/include/hi_eo_events.h,
src/preprocessors/HttpInspect/utils/hi_paf.c:
Added two HTTP Inspect preprocessor rules:
119:28 - post w/o content-length or transfer-encoding: chunked
120:8 - message with invalid content-length or chunk size

* src/preprocessors/spp_httpinspect.c:
Fixed a bug where Snort wouldn't reload, giving the error that
"Changing decompress_depth requries a restart".

* etc/gen-msg.map:
Commented out four rules from gen-msg.map, 133:44 through 133:47,
because they were not yet implemented.

* preproc_rules/preprocessor.rules:
Added a CVE reference for Rule 119:19.
Added a reference to SMTP preprocessor rule 124:4.
Added a preprocessor rule, 125:9, for an FTPTelnet preprocessor
alert that was missing the corresponding rule.

* src/dynamic-plugins/sf_engine/sf_snort_plugin_api.c:
PAF tweak for single-segment full PDUs matching only-stream

* src/snort.c:
Fixed a bug where Snort wouldn't reload on SIGHUP with OpenBSD.
Set default paf_max to 16K.

* doc/: README.reputation, snort_manual.pdf, snort_manual.tex:
Added a use case in the IP Reputation preprocessor documentation.

* src/: dynamic-preprocessors/reputation/reputation_config.c,
dynamic-preprocessors/reputation/sf_reputation.dsp,
win32/WIN32-Prj/snort.dsw, win32/WIN32-Prj/snort_installer.nsi:

Fixed the IP Reputation preprocessor so that it would build on Windows.

* src/preprocessors/HttpInspect: client/hi_client.c, include/hi_client.h,
server/hi-server.c, utils/hi_paf.c:
Support up to full 32-bit content-lengths

* src/preprocessors/Stream5/stream5_paf.c:
Fixed compilation with the options "--disable-target-based --enable-paf".

* src/preprocessors/Stream5/snort_stream5_tcp.c:
Fixed an error in IDS mode when segments overlap and the sequence
number wraps.

* tools/u2spewfoo/Makefile.am:
Added the u2spewfoo Windows project file to the Snort source tarball.

Snort 2.9.1 RC
* doc/README.sip, doc/snort_manual.pdf, doc/snort_manual.tex,
preproc_rules/preprocessor.rules,
src/dynamic-preprocessors/sip/sip_parser.c,
src/dynamic-preprocessors/sip/spp_sip.h, etc/gen-msg.map:
Added three new SIP preprocessor alerts.

* src/preprocessors/Stream5/: snort_stream5_tcp.c, stream5_paf.c,
stream5_paf.h:
Allow multiple preprocs to scan for PDUs on the same port.
This fixes a problem with DCE autodetect using the same
ports as HTTP.

* src/build.h:
Updated build number to 63.

* src/: fpcreate.c, log.c, detection-plugins/sp_byte_extract.c,
detection-plugins/sp_tcp_win_check.c,
dynamic-plugins/sf_engine/sf_snort_plugin_content.c,
dynamic-plugins/sf_engine/sf_snort_plugin_pcre.c,
preprocessors/spp_normalize.c:
Fixed some compiler warnings.

* src/: detection-plugins/detection_options.c,
detection-plugins/sp_flowbits.h,
dynamic-plugins/sf_engine/sf_snort_detection_engine.c,
dynamic-plugins/sf_engine/examples/Makefile.am,
dynamic-plugins/sf_engine/examples/flowbits_test.c,
dynamic-plugins/sf_engine/examples/rules.c,
dynamic-plugins/sf_engine/examples/web-client_test.c:
Only set/clear/toggle/unset a flowbit when all of the rule
matches, including the IPs and Ports. Thanks to Eoin Miller
for reporting the issue.

* src/dynamic-preprocessors/: Makefile.am, dcerpc2/Makefile.am,
dns/Makefile.am, ftptelnet/Makefile.am, imap/Makefile.am,
pop/Makefile.am, reputation/Makefile.am, rzb_saac/Makefile.am,
sdf/Makefile.am, sip/Makefile.am, smtp/Makefile.am,
ssh/Makefile.am, ssl/Makefile.am:
Fixed dynamic preprocesor Makefiles so that they can be built
in parallel.

* doc/README.http_inspect, doc/snort_manual.pdf,
doc/snort_manual.tex, etc/gen-msg.map,
preproc_rules/preprocessor.rules, src/generators.h,
src/preprocessors/snort_httpinspect.c,
src/preprocessors/snort_httpinspect.h,
src/preprocessors/HttpInspect/client/hi_client.c,
src/preprocessors/HttpInspect/event_output/hi_eo_log.c,
src/preprocessors/HttpInspect/include/hi_eo_events.h,
src/preprocessors/HttpInspect/include/hi_ui_config.h,
src/preprocessors/HttpInspect/include/hi_util.h,
src/preprocessors/HttpInspect/user_interface/hi_ui_config.c,
src/sfutil/util_unfold.c:

Added a new HTTP Inspect preprocessor rule, GID 119 SID 26.  This rule checks for 200+ whitespaces in a folded header line from an HTTP request. A new config option was added to configure the allowable amount whitespace.

Added a new configuration option to http_inspect server configuration:
"small_chunk_length { <chunk_size> <num_consec_chunks> }", with preprocessor rules for both client and server. Consecutive chunk lengths less than or equal to <chunk_size> will cause an event to be generated.

See README.http_inspect for more information.

* src/: dynamic-preprocessors/dcerpc2/sf_dce2.dsp,
dynamic-preprocessors/dns/sf_dns.dsp,
dynamic-preprocessors/ftptelnet/sf_ftptelnet.dsp,
dynamic-preprocessors/imap/sf_imap.dsp,
dynamic-preprocessors/isakmp/sf_isakmp.dsp,
dynamic-preprocessors/sdf/sf_sdf.dsp,
dynamic-preprocessors/sf_dynamic_initialize/sf_dynamic_initialize.dsp,
dynamic-preprocessors/sip/sf_sip.dsp,
dynamic-preprocessors/smtp/sf_smtp.dsp,
dynamic-preprocessors/ssh/sf_ssh.dsp,
dynamic-preprocessors/ssl/sf_ssl.dsp,
win32/WIN32-Prj/sf_engine.dsp,
win32/WIN32-Prj/sf_engine_initialize.dsp,
win32/WIN32-Prj/sf_testdetect.dsp, win32/WIN32-Prj/snort.dsp:
Fixed the Win32 build to (1) not use .pch, and (2) correct sed
patterns on ipv6_port.h.

* src/output-plugins/spo_alert_sf_socket.c:
Fixed a problem where Snort's generic IP address structure was being sent by the socket output plugin.
The output plugin now only generates events for IPv4 packets, and is guaranteed to use uint32_t IPv4 addresses for interoperability.

* src/sfutil/: sfrt.c, sfrt.h:
Optimized some memory usage.

* configure.in:
Add check for pkg-config and provide instructions to get it if pkg-config is not installed.

* src/preprocessors/Stream5/: snort_stream5_tcp.c,
stream5_common.h:
Show single segment PAF packets and only short-circuit at
correct sequence.
When aborting PAF, flush at paf_max.
Tweaked retransmission check to use actual sequence numbers
instead of the adjusted sequence numbers.
Changed the pseudo-random flush point after each flush.

* src/snort.c:
Fixed a compilation error when active response is disabled.

* src/snort.h:
Fixed a bug where Snort wouldn't daemonize on OpenBSD if the process was running as root. Thanks to Olaf Schreck for reporting this issue.

* src/preprocessors/: perf-base.c, perf-base.h, perf-event.c,
perf-event.h, perf-flow.c, perf-flow.h, perf.c, perf.h,
spp_perfmonitor.c:
Split out Perfmon submodule Init and Reset, so that everything is
initialized when the Perfmonitor preprocessor is initialized.
Previously, some data was initialized on the first packet.

* src/detection-plugins/sp_tcp_flag_check.c:
Fixed a couple spots where the "1" and "2" flags weren't renamed to "C" and "E". Thanks to Joshua Kinard for reporting the issue and supplying a patch.

* doc/README.sip, doc/snort_manual.pdf, doc/snort_manual.tex,
src/dynamic-preprocessors/sip/sip_parser.c,
src/dynamic-preprocessors/sip/spp_sip.h,
preproc_rules/preprocessor.rules, etc/gen-msg.map:
Added a new SIP preprocessor alert for missing content type headers.
Fixed an issue where the SIP preprocessor checked for Stream5 even if the SIP preprocessor was disabled.

* etc/unicode.map:
Updated unicode.map to match the unicode standard on Windows 7 SP1.

* etc/snort.conf:
Sync'ed to VRT's latest snort.conf.

* src/: decode.c, detect.c:
Tweaked the preprocessing loop to bypass app preprocs if no app data.

* src/sfutil/sf_ip.c, src/sfutil/sf_ip.h, src/sfutil/sfrt_dir.c,
src/dynamic-preprocessors/reputation/Makefile.am,
src/dynamic-preprocessors/reputation/reputation_config.h,
src/dynamic-preprocessors/reputation/reputation_utils.c,
src/dynamic-preprocessors/reputation/sf_reputation.dsp,
src/dynamic-preprocessors/reputation/spp_reputation.c,
src/dynamic-preprocessors/reputation/spp_reputation.h,
src/dynamic-preprocessors/reputation/reputation_config.c,
src/dynamic-preprocessors/reputation/reputation_debug.h,
src/dynamic-preprocessors/reputation/reputation_utils.h,
doc/README.reputation, doc/Makefile.am, doc/snort_manual.pdf,
doc/snort_manual.tex, preproc_rules/preprocessor.rules,
src/dynamic-preprocessors/Makefile.am, configure.in,
src/preprocids.h, etc/gen-msg.map:
Added the IP Reputation preprocessor. This preprocessor provides the ability to whitelist and blacklist packets based on IP addresses.
See README.reputation for more information.

* src/: sf_types.h, dynamic-plugins/sf_dynamic_plugins.c,
dynamic-preprocessors/dcerpc2/Makefile.am,
dynamic-preprocessors/dcerpc2/dce2_config.c,
dynamic-preprocessors/dcerpc2/dce2_debug.h,
dynamic-preprocessors/dcerpc2/dce2_paf.c,
dynamic-preprocessors/dcerpc2/dce2_paf.h,
dynamic-preprocessors/dcerpc2/sf_dce2.dsp,
dynamic-preprocessors/dcerpc2/snort_dce2.c:
Added protocol-aware flushing support for the dcerpc2 preprocessor.

* src/dynamic-plugins/sf_convert_dynamic.c:
Added the ability to convert shared object rules that use the preprocessor rule option.

* src/preprocessors/: snort_httpinspect.c, spp_httpinspect.c,
HttpInspect/include/hi_paf.h, HttpInspect/utils/hi_paf.c,
Stream5/snort_stream5_tcp.c:
Don't enable paf unless stream ports configured for the given direction; add "(PAF)" to http inspect ports output to indicate when enabled; and only register port for given direction if corresponding flow depth is set.

Support full 32-bit content-lengths and chunk sizes, and flush/abort when exceeded.

* doc/README.SMTP, doc/snort_manual.tex,
src/dynamic-preprocessors/smtp/smtp_config.h,
src/dynamic-preprocessors/smtp/smtp_util.c,
src/dynamic-preprocessors/smtp/snort_smtp.c,
src/dynamic-preprocessors/smtp/snort_smtp.h,
src/dynamic-preprocessors/smtp/spp_smtp.c:
Fixed performance issue: allocate the buffers used for filename, mailfrom and rcptto logging using mempool ('memcap' used to allocate the mempool).
Added a fatal error when b64_decode_depth is used with enable_mime_decoding.

* src/dynamic-plugins/sf_engine/examples: all rule files:
Fixed compiler warnings.


* configure.in:
Updates to configure.in.
Fix zlib checks to use correctly named variable for checking zlib header and library existence.
Enable IPv6 by default in builds.  Can use --disable-ipv6 to turn it off.
Using --enable-zlib, configure should fail.  snort -V should show IPv6 by default and VRT config should load without modification.
Added a new option, "--enable-large-pcap", which allows Snort to read pcap files that are larger than 2 GB.
Changed the default ./configure options to match the requirements for the bundled snort.conf
* doc/: INSTALL, README.imap, README.pop,
README.SMTP, README.stream5, README.sip, README.tag,
README.http_inspect, README.counts, README.normalize,
snort_manual.pdf, snort_manual.tex:
Updated documentation for Snort 2.9.1:
Added documentation for new SIP, POP and IMAP preprocessors
Updated README.stream5 with documentation for Protocol Aware Flushing (PAF)
Updated README.http_inspect with memcap information, clarified "http_cookie" information, and documentation for "log_uri" and "log_hostname".
Fixed a typo in README.counts
Updated "byte_extract" section to reflect syntax changes
Improved the explanation of "max_queued_events"
Added documentation for the ESP decoder, which is now configurable
Improved the explanation of "rawbytes"
Fixed an incorrect example in README.tag.
* etc/snort.conf:
Synced snort.conf with VRT's latest version.

Added configurations for new preprocessors.
* preproc_rules/: decoder.rules, preprocessor.rules
Added new preprocessor rules for SIP, SMTP, POP, and IMAP.

Added decoder rules 116:453, 116:454, and 116:455. These rules
were formerly covered by VRT rules.
* src/build.h: Updated build number to 46
* src/decode.c:
TCP and UDP decoder rules that require a fully-decoded packet will only fire if the checksum is correct and the port number is not ignored.

ESP decoding is now configurable, and off by default.

The "config enable_decode_oversized_alerts" option now applies to packets where the UDP header claims there is more data than actually exists.
The Teredo decoder now only processes packets in the Teredo prefix
(2001:0000::/32) or the link-local prefix (fe80::/16).
* src/detection-plugins/sp_cvs.c:
Fixed a false positive in the CVS detection plugin.
* doc/snort_manual.tex, src/detection-plugins/sp_byte_extract.c:
Made some changes to the byte_extract syntax:
Writing "string" without a number type defaults to decimal.
The "string" and "hex/dec/oct" options are now independent of each other, like in byte_test and byte_jump. You can write "string,dec", "hex,string", "string,relative,oct", etc.
Specifying one of "hex", "dec", and "oct" without using "string"
results in an error.
byte_extract options can no longer be delimited by spaces. This does not affect "align <num>" or "multiplier <num>".
* src/: parser.c, util.c, util.h,
detection-plugins/sp_base64_decode.c,
dynamic-plugins/sf_dynamic_plugins.c,
dynamic-plugins/sf_dynamic_preprocessor.h,

dynamic-plugins/sp_dynamic.c,
dynamic-preprocessors/smtp/smtp_util.c,
preprocessors/HttpInspect/client/hi_client.c,
preprocessors/HttpInspect/server/hi_server.c,
sfutil/sf_base64decode.c, sfutil/sf_base64decode.h:
Changes include the following:
- Attempt dechunkind only when transfer-encoding: chunked is present.
- Override the content length with transfer encoding
- SnortStrcasestr uses slen now.
- unfolding : trim spaces when required.
* src/: pcap_pkthdr32.h, preprocessors/spp_frag3.c,
preprocessors/Stream5/snort_stream5_tcp.c,
preprocessors/Stream5/stream5_common.h, sfutil/sf_ipvar.c,
sfutil/sf_ipvar.h, sfutil/sf_vartable.c:
Update Frag3/Stream5 to print bound addresses, better descriptsions of detect anomalies and port lists.
- Updated Frag3/Stream5 to print bound addresses for IPv6 enabled builds
- Updated Frag3 to print meaningful detect anomalies configuration
- Updated Stream5 to print that there are more ports than those printed.
* src/dynamic-plugins/sf_engine/: Makefile.am, sf_decompression.c,
sf_decompression.h, sf_snort_detection_engine.c,
sf_snort_plugin_api.h:
Added a Decompression API that wraps Zlib for use with dynamic
plugins. See sf_decompression.h for more details.
* src/: fpcreate.c, fpdetect.c, treenodes.h:
Update pattern matcher and sort functions to correctly sort by priority as well as implement sorting by content_length (which was never done with 2.8.2 addition of rule option tree).

Added a warning when max-pattern-len is defined twice.

Packets will no longer be tagged or logged if they are filtered or passed.
* src/preprocessors/Stream5:
Ensured that reassembly doesn't require packet dropping in IPS mode.
The message "additional ports configured but not printed" is only printed when that is actually the case.
* src/snort.c:
fix output of filename / shutdown alerts sequence when iterating over multiple pcaps with --pcap-show --pcap-reset and console alerts (eg -A cmg or
-A console:test).

Fixed an issue with reloading Snort while the default output options were used.

When reading several pcap files with --pcap-dir, Snort will move on
to the next file if one fails to load.
* src/output-plugins/spo_alert_full.c:
Update alert_full to print rule references, regardless of whether
there is TCP/UDP/etc.
* src/output-plugins/spo_log_tcpdump.c:
convert DLT_IPV{4,6} to DLT_RAW for compatibility with libpcap 1.0.0
fix 'mixed decls and code' compiler warning
* src/: decode.h, detect.c, detection_util.c, detection_util.h,
fpcreate.c, fpdetect.c, log.c, log_text.c, parser.h, plugbase.c,
rule_option_types.h, detection-plugins/Makefile.am,
detection-plugins/detection_options.c,
detection-plugins/sp_base64_data.c,
detection-plugins/sp_byte_check.c,
detection-plugins/sp_byte_extract.c,
detection-plugins/sp_byte_jump.c,
detection-plugins/sp_file_data.c,
detection-plugins/sp_ftpbounce.c,
detection-plugins/sp_isdataat.c,
detection-plugins/sp_pattern_match.c,
detection-plugins/sp_pcre.c, detection-plugins/sp_pkt_data.c,
detection-plugins/sp_pkt_data.h,
dynamic-plugins/sf_convert_dynamic.c,
dynamic-plugins/sf_dynamic_common.h,
dynamic-plugins/sf_dynamic_define.h,
dynamic-plugins/sf_dynamic_engine.h,
dynamic-plugins/sf_dynamic_plugins.c,
dynamic-plugins/sf_dynamic_preprocessor.h,
dynamic-plugins/sp_dynamic.c, dynamic-plugins/sp_dynamic.h,
dynamic-plugins/sf_engine/sf_snort_detection_engine.c,
dynamic-plugins/sf_engine/sf_snort_packet.h,
dynamic-plugins/sf_engine/sf_snort_plugin_api.c,
dynamic-plugins/sf_engine/sf_snort_plugin_content.c,
dynamic-plugins/sf_engine/sf_snort_plugin_pcre.c,
dynamic-plugins/sf_engine/examples/detection_lib_meta.h,
dynamic-preprocessors/ftptelnet/pp_ftp.c,
dynamic-preprocessors/ftptelnet/pp_telnet.c,
dynamic-preprocessors/ftptelnet/snort_ftptelnet.c,
dynamic-preprocessors/smtp/smtp_util.c,
dynamic-preprocessors/smtp/snort_smtp.c,
dynamic-preprocessors/smtp/snort_smtp.h,
preprocessors/snort_httpinspect.c,
preprocessors/snort_httpinspect.h,
preprocessors/spp_rpc_decode.c,
preprocessors/HttpInspect/server/hi_server.c,
preprocessors/HttpInspect/server/hi_server_norm.c,
preprocessors/Stream5/snort_stream5_tcp.c:
The "file_data" and "base64_data" rule options now set the buffer
for any rule options that follow them. This applies to both relative and non-relative rule options.

The detection code now uses 3 separate buffers:
- "Alt Detect": set by file_data, base64_data, etc.
- "Alt Decode": set by preprocessor normalization, e.g. HTTP Inspect
- Raw packet data

The AltDetect buffer can also be set by custom .so rules.
* src/parser.c, src/parser.h, src/snort.h, src/output-plugins/spo_unified2.c,
src/sfutil/Unified2_common.h:
IPv6 source and destination addresses are now logged in Unified2 as extra data events. This is configured with "config log_ipv6_extra_data".
* src/dynamic-preprocessors/sip/Makefile.am,
src/dynamic-preprocessors/sip/sf_sip.dsp,
src/dynamic-preprocessors/sip/sip_config.c,
src/dynamic-preprocessors/sip/sip_config.h,
src/dynamic-preprocessors/sip/sip_debug.h,
src/dynamic-preprocessors/sip/sip_dialog.c,
src/dynamic-preprocessors/sip/sip_dialog.h,
src/dynamic-preprocessors/sip/sip_parser.c,
src/dynamic-preprocessors/sip/sip_parser.h,
src/dynamic-preprocessors/sip/sip_roptions.c,
src/dynamic-preprocessors/sip/spp_sip.c,
src/dynamic-preprocessors/sip/spp_sip.h,
src/dynamic-preprocessors/sip/sip_roptions.h,
src/dynamic-preprocessors/sip/sip_utils.c,
src/dynamic-preprocessors/sip/sip_utils.h, doc/README.sip,
etc/gen-msg.map, src/dynamic-preprocessors/sip/test/Makefile.am,
src/dynamic-preprocessors/sip/test/sip_test.c, configure.in,
src/dynamic-preprocessors/Makefile.am:
Added a new preprocessor for SIP traffic.
See README.sip and the Snort Manual for more information.
* src/: dynamic-preprocessors/dcerpc2/dce2_utils.c,
dynamic-preprocessors/dcerpc2/spp_dce2.c,
preprocessors/spp_frag3.c:
Make Frag3 OpenBSD Vuln alert only happen if the frag policy is 'linux' (which includes OpenBSD).  The 'bsd' policy is NOT used for OpenBSD, which is the only OS on which the vulnerability was present.

This reduces false positives to only occur when frag3 policy is linux and its an actual linux system, rather than the alert occurring regardless of frag policy.
* src/: detection-plugins/Makefile.am,
detection-plugins/sp_byte_extract.c,
detection-plugins/sp_byte_extract.h,
dynamic-plugins/sf_convert_dynamic.c,
dynamic-plugins/sf_engine/Makefile.am,

dynamic-plugins/sf_engine/sf_snort_detection_engine.c,
dynamic-plugins/sf_engine/sf_snort_detection_engine.h,
dynamic-plugins/sf_engine/sf_snort_plugin_api.c,
dynamic-plugins/sf_engine/sf_snort_plugin_api.h,
dynamic-plugins/sf_engine/sf_snort_plugin_byte.c,
dynamic-plugins/sf_engine/sf_snort_plugin_content.c,
dynamic-plugins/sf_engine/sf_snort_plugin_hdropts.c,
dynamic-plugins/sf_engine/sf_snort_plugin_loop.c,
dynamic-plugins/sf_engine/sf_snort_plugin_pcre.c,
Added support for ByteExtract variables to the .so rule versions of
Content, ByteTest, ByteJump, and isdataat.
* src/: encode.c, preprocessors/spp_normalize.c,
preprocessors/Stream5/snort_stream5_tcp.c,
preprocessors/Stream5/stream5_common.c:
Fixed the TTL on encoded response packets.
* src/: fpcreate.c, fpdetect.c,
detection-plugins/sp_pattern_match.c,
detection-plugins/sp_pattern_match.h,
dynamic-plugins/sf_dynamic_define.h,
dynamic-plugins/sf_engine/sf_snort_detection_engine.c,
dynamic-plugins/sf_engine/sf_snort_plugin_api.h:
Update to not inspect HTTP method buffer with Snort's fast pattern engine.
Rules with only HTTP method content end up as non-content rules.
This eliminates a short cycle of searches with fast pattern on every initial HTTP request.
* src/dynamic-preprocessors/pop/: all files
Added a new preprocessor for POP traffic.
See README.pop for more information.
* src/dynamic-preprocessors/imap/: all files
Added a new preprocessor for IMAP traffic.
See README.imap for more information.
* src/sfutil/: sf_email_attach_decode.c, sf_email_attach_decode.h:
Base64 decoding was moved to its own section in sfutil, for use by the new email preprocessors.

Added support for uuencoded email attachments.
* src/dynamic-preprocessors/sdf/spp_sdf.c:
The Sensitive Data preprocessor now inspects the "file_data" buffer, used for HTTP response bodies & decoded email attachments.
* src/: snort.c, preprocessors/spp_stream5.c,
preprocessors/stream_api.h:
Update Snort to return a DAQ verdict of whitelist (meaning don't send Snort any more packets) for sessions that are being ignored in both directions or ports that are configured to ignore.  For DAQ modules and hardware that supports it, this should result in a performance gain because Snort no longer has to decode packets that are part of that connection.
* src/util.c:
Added an error message when opening a pid file fails.
* src/preprocessors/HttpInspect/: client/hi_client.c,
server/hi_server.c:
The Set-Cookie: and Cookie: headers wont be included in the cookie buffers.
* configure.in, src/active.c, src/active.h, src/decode.h,
src/encode.c, src/encode.h, src/log_text.c, src/log_text.h,
src/parser.c, src/parser.h, src/sf_types.h, src/sfdaq.c,
src/sfdaq.h, src/snort.h, src/snort_debug.h,
src/detection-plugins/sp_react.c,
src/detection-plugins/sp_respond3.c,
src/dynamic-plugins/sf_dynamic_define.h,
src/dynamic-plugins/sf_engine/sf_snort_packet.h,
src/preprocessors/snort_httpinspect.c,
src/preprocessors/spp_httpinspect.c,
src/preprocessors/spp_stream5.c, src/preprocessors/stream_api.h,
src/preprocessors/HttpInspect/Makefile.am,
src/preprocessors/HttpInspect/include/Makefile.am,
src/preprocessors/HttpInspect/include/hi_paf.h,
src/preprocessors/HttpInspect/mode_inspection/hi_mi.c,
src/preprocessors/HttpInspect/server/hi_server.c,
src/preprocessors/HttpInspect/utils/Makefile.am,
src/preprocessors/HttpInspect/utils/hi_paf.c,
src/preprocessors/Stream5/Makefile.am,
src/preprocessors/Stream5/snort_stream5_icmp.c,
src/preprocessors/Stream5/snort_stream5_session.c,
src/preprocessors/Stream5/snort_stream5_tcp.c,
src/preprocessors/Stream5/snort_stream5_tcp.h,
src/preprocessors/Stream5/snort_stream5_udp.c,
src/preprocessors/Stream5/stream5_common.c,
src/preprocessors/Stream5/stream5_common.h,
src/preprocessors/Stream5/stream5_paf.c,
src/preprocessors/Stream5/stream5_paf.h, src/sfutil/sf_textlog.h:
Added support in Stream5 for Protocol Aware Flushing (PAF). PAF allows Snort to statefully scan a stream and reassemble a complete PDU regardless of segmentation.

Added PAF support to HTTP Inspect, allowing the preprocessor to determine when HTTP sessions are flushed by Stream5.

See README.stream5 for more details.
* src/preprocessors/: stream_ignore.h, stream_ignore.c,
Stream5/snort_stream5_udp.c:
Added support for ignoring UDP channels. Light weight session will be created to track UDP channel, even ports are not monitored.
* src/win32/: most files
Updated Snort and its libraries to build/link against MFC.

http://www.snort.org/
Titel: Snort 2.9.1.1
Beitrag von: SiLæncer am 11 Oktober, 2011, 16:02
Snort 2.9.1.1
    * src/decode.c:
        Fixed decode.c to allow building with --enable-debug.

    * src/: dynamic-plugins/sf_engine/sf_decompression.c,
      dynamic-plugins/sf_engine/sf_decompression.h,
      preprocessors/snort_httpinspect.h,
      preprocessors/HttpInspect/server/hi_server.c:
        Fixed http_inspect decompression and decompression API to decompress
        both raw and zlib deflated data.
        Support locating utf charset when spaces are present.

    * src/: preprocessors/HttpInspect/server/hi_server_norm.c,
      sfutil/util_utf.h:
        Added "Byte Order Mark" support for unicode in http_inspect.

    * src/detection-plugins/sp_urilen_check.c:
        Fixed potential false positives when using urilen detection option.

    * src/preprocessors/Stream5/stream5_paf.c:
        Fixed flushing beyond "paf_max".
        Verify paf configuration before enabling.

    * src/preprocessors/Stream5/snort_stream5_tcp.c:
        Free application and protocol state when a session is blocked.
        Ensure that seglist_next is NULL after being freed.

    * src/dynamic-preprocessors/smtp/smtp_util.c:
        Fixed an issue with SMTP logging while running in inline mode.

    * src/dynamic-preprocessors/reputation/Makefile.am,
      src/dynamic-preprocessors/reputation/reputation_config.c,
      src/dynamic-preprocessors/reputation/reputation_config.h,
      src/dynamic-preprocessors/reputation/spp_reputation.c,
      src/dynamic-preprocessors/reputation/spp_reputation.h,
      src/Makefile.am, src/idle_processing.c, src/idle_processing.h,
      src/idle_processing_funcs.h, src/plugbase.c, src/plugbase.h,
      src/snort.c, src/snort.h, src/util.c, src/util.h,
      src/dynamic-examples/Makefile.am,
      src/dynamic-preprocessors/reputation/shmem/shmem_config.c,
      src/dynamic-preprocessors/reputation/shmem/shmem_config.h,
      src/dynamic-preprocessors/reputation/shmem/shmem_datamgmt.h,
      src/dynamic-preprocessors/reputation/shmem/shmem_lib.c,
      src/dynamic-preprocessors/reputation/shmem/shmem_mgmt.c,
      src/dynamic-preprocessors/reputation/shmem/shmem_mgmt.h,
      src/control/Makefile.am, src/control/sfcontrol.c,
      src/control/sfcontrol.h, src/control/sfcontrol_funcs.h,
      src/dynamic-preprocessors/reputation/shmem/sflinux_helpers.c,
      src/dynamic-preprocessors/reputation/shmem/sflinux_helpers.h,
      src/dynamic-preprocessors/reputation/shmem/shmem_common.h,
      src/dynamic-preprocessors/reputation/shmem/shmem_datamgmt.c,
      src/dynamic-preprocessors/reputation/shmem/shmem_lib.h,
      src/sfutil/Makefile.am, src/sfutil/segment_mem.c,
      src/sfutil/segment_mem.h, src/sfutil/sfrt_flat.c,
      src/sfutil/sfrt_flat.h, src/sfutil/sfrt_flat_dir.c,
      src/sfutil/sfrt_flat_dir.h,
      src/dynamic-preprocessors/Makefile.am, tools/control/Makefile.am,
      tools/control/README.snort_control, tools/control/sfcontrol.c,
      src/dynamic-plugins/sf_dynamic_plugins.c,
      src/dynamic-plugins/sf_dynamic_preprocessor.h, configure.in,
      tools/Makefile.am:
        - Added support for shared memory between Snort processes.
          This is used in the IP Reputation preprocessor to share a single copy
          of IP whitelists & blacklists.
        - Added a control channel, so that commands may be issued to
          a running Snort process by way of a Unix socket.

    * src/preprocessors/HttpInspect/utils/hi_paf.c:
        Ensure HTTP 1.1 responses without length indicators (e.g. 304)
        are flushed at the end of the headers.
        Preprocessor rule 120:8 is fired at end of headers if content-length
        and transfer-encoding: chunked are not present, but not for response
        codes 1XX, 204, 304.

    * doc/README.reputation, doc/snort_manual.pdf,
      doc/snort_manual.tex:
        Updated Snort documentation, added documentation for Shared Memory
        and the Control Socket.

    * src/: dynamic-preprocessors/reputation/sf_reputation.dsp,
      dynamic-preprocessors/sf_dynamic_initialize/sf_dynamic_initialize.dsp,
      win32/WIN32-Includes/stdint.h, win32/WIN32-Prj/snort.dsp,
      win32/WIN32-Prj/snort.dsw:
        Updated Win32 build files.

http://www.snort.org/
Titel: Snort 2.9.1.2
Beitrag von: SiLæncer am 21 Oktober, 2011, 12:00
The release notes for this release contain the following:

   
      * Fixed an issue where Snort would sometimes stop processing traffic in a
        persistent HTTP 1.1 connection with a UTF-32 encoded response followed by
        a UTF-16 encoded response.

http://www.snort.org/
Titel: Snort 2.9.2
Beitrag von: SiLæncer am 16 Dezember, 2011, 20:40
Release notes are as follows:
[*] New Additions
* SCADA (DNP3 and Modbus) preprocessors. Added two new preprocessors
to support writing rules for detecting attacks for control systems.
New rule keywords are supported, and DNP3 leverages Stream5 PAF
support for TCP reassembly. See the Snort Manual, README.dnp3 and
README.modbus for details of the configurations and new rule
options.

* GTP decoding and preprocessor. Updated the Snort packet decoders
and added a preprocessor to support detecting attacks over GTP (GPRS
Tunneling Protocol). Snort's GTP support handles multiple versions
of GTP and has a rich configuration set. See the Snort Manual and
README.GTP for details.

* Updates to the HTTP preprocessor to normalize HTTP responses that
include javascript escaped data in the HTTP response body. This
expands Snort's coverage in detecting HTTP client-side attacks.
See the Snort Manual and README.http_inspect for configuration
details.

* Added Protocol-Aware Flushing (PAF) support for FTP.

[*] Improvements
* Updates to Stream preprocessor to be able to track and store
"stream" data for non TCP/UDP flows. Also improvements to handle
when memory associated with a blocked stream is released and usable
for other connections.

* Updates to dce_stub_data to make it act the same as file_data
and pkt_data rule option keywords in how it interacts with
subsequent content/pcre/etc rule options.

* Updates to how Snort handles and processes signals received
from the OS.

* Enabled logging of normalized JavaScript to unified2 without the
use of the --enable-sourcefire configuration option.

* Improved handling of gaps and overlaps for "first" and "vista"
policies in Stream5.

* Added support for signal handler customization. At compile-time,
Snort can be customized to use different signal numbers.
This allows problems with overlapping signals to be fixed on a
per-platform basis, which is especially helpful for the BSDs.
See the Snort Manual for more details.

http://www.snort.org/
Titel: Snort 2.9.3
Beitrag von: SiLæncer am 23 Juli, 2012, 13:40
Changelog:

Snort 2.9.3

    * src/build.h:
      Updated build number to 37

    * src/preprocessors/HttpInspect/server/hi_server.c:
      When paf is turned on, the flow depth on raw packets should be checking
      if max_seq was set.

    * src/preprocessors/HttpInspect/client/hi_client.c:
      Rearranged check in hi_client_extract_header() to stop processing when
      there is no more data.

    * src/dynamic-preprocessors/smtp/: smtp_util.c, snort_smtp.c:
      Clear flags for filename logging if there are no ending quotes for MIME
      attachement filename.  Thanks to Rick Chisholm for helping us track down
      the issue.

    * doc/CREDITS:
      Update rmkml's email address.

    * src/preprocessors/: snort_httpinspect.h, HttpInspect/server/hi_server.c:
      Fix application of flow_depth for transfers of files over 2GB.


http://www.snort.org/
Titel: Snort 2.9.4.1
Beitrag von: SiLæncer am 05 März, 2013, 06:00
Whats new: >>

* Updated File processing for partial HTTP content and MIME attachments.
* Addition of new config option max_attribute_services_per_host and improve memory usage within attribute table.
* Handle excessive overlaps in frag3.
* Stream API updates to return session key for a session.
* Reduce false positives for TCP window slam events.
* Updates to provide better encoding for TCP packets generated for respond and react.
* Disable non-ethernet decoders by default for performance reasons. If needed, use --enable-non-ether-decoders with configure.

http://www.snort.org/
Titel: Snort 2.9.5
Beitrag von: SiLæncer am 02 Juli, 2013, 15:03
Whats new: >>

[*] New additions

* Added tracking of FTP data channel for file transfers as file_data
  for Snort rules.

* Add support for doing PAF based on services loaded thru the
  attribute table and hardened PAF code/removed --disable-paf

* Added decoding support for Cisco ERSPAN

* Added tracking of HTTP uploads as file_data for Snort rules.

* Added ability to use event filters with PPM rules

* Added a control channel command to reload the Snort configuration to
  give feedback on new configuration.  This improves on the older sigHUP
  which would just result in Snort exiting and restarting if the new
  configuration required a restart.

* Added a configuration option to perfmon to write flow-ip data to a
  file

* New decoding alert for IPv6 Routing type 0 header.

* Added the ability to sync basic session state from one Snort to
  another via a side channel communication between the two Snort
  instances.  NOTE:  This is currently experimental.

[*] Improvements

* Improved Stream's midstream pickup handling for TCP state processing,
  sequence validation, and reassembly.  Thanks to John Eure.

* Added a parse error for a rule if there is a relative content used
  after a content that is 'fast_pattern only'.

* Improved HTTP PAF reassembly capabilities to be better aligned on PDU
  boundaries, terminate if not actually HTTP, and to include all
  appropriate line feeds.

* Hardened the code related to dynamic modules.  Removed --disable-
  dynamicplugin configuration option since rule and preprocessor shared
  libraries are here to stay.

* Improved parsing of IP lists for reputation

* Update to Teredo processing and Snort rule evaluation when the inner
  IPv6 packet doesn't have payload.  Thanks to Yun Zheng Hu &
  L0rd Ch0de1m0rt for reporting the issue & crafting traffic to reproduce.

* Improved logging of packets associated with alerts when a Stream
  reassembled packet triggers multiple Snort rules.

* Improvements to the Snort manual including documentation of specific
  rule options and configuration items.  Thanks to Nicholas Horton and many others.

* Removed a bunch of dead code paths, updated to use more current memory
  functions for easier code maintenance and portability.  Thanks to William Parker.

[*] Deletions

* Remove deprecated unified support, use unified2 for all of your
  logging needs.

http://www.snort.org/
Titel: Snort 2.9.5.3 Stable
Beitrag von: SiLæncer am 30 Juli, 2013, 21:00
Snort 2.9.5.3

    * src/preprocessors/Stream5/snort_stream5_tcp.c:
      Fixed handling of partial segment purging.  Thanks to Lode Mertens
      for reporting the issue.

http://www.snort.org/
Titel: Snort 2.9.5.5
Beitrag von: SiLæncer am 17 September, 2013, 13:30
Improvements:

· Address issue with SMTP preprocessor and the ignore_tls_data configuration to correctly stop inspection after an SMTP session is encrypted.
· Disable all rule evaluation (as opposed to just rules with fast patterns) for packets on a previously blocked session.
· Corrected when perfmon preprocessor writes stats to occur as soon as both the time and packet count criteria are met.
· Enforce same restrictions on relative PCRE for HTTP buffers from shared library rules as already existed with text rules.

http://www.snort.org/
Titel: Snort 2.9.6.0
Beitrag von: SiLæncer am 28 Januar, 2014, 20:00
Whats new: >>

    [*] New additions
    * Add support to do file specific processing within DCERPC preprocessor for
    files being transferred over SMB.

    * File capture and storage -- saves files as they traverse the network via a
    new preprocessor that ties in support within HTTP, FTP, SMTP, POP, IMAP,
    and SMB. See README.file and README.file_server (under tools/file_server)
    for details.

    * Add <= and >= operators to byte_test rule option.

    * Update SMTP to detect Cyrus SASL authentication attack.

    * Add capability to capture a single session from start to end.

    * EXPERIMENTAL: Add support to leverage file type identification in snort
    rules. See README.file_ips for details.

    [*] Improvements

    * Only inject active responses when a TCP session is established.

    * Update the POP and IMAP protocols to support simple PAF for improved
    identification and capture of files.

    * Update SMTP, POP, IMAP to improve inspection when mime boundaries are
    split across packets.

    * Address issue to address end of line incorrectly for Quoted Printable
    email attachments.

    * Handle out of order SSL handshake in SMTP when STARTTLS is used and
    fix checks for SSL type only within the SSL hand shake.

    * Update sensitive data preprocessor to handle a stateful search of
    patterns across multiple packets.

    * Address a few issues in the Snort manual and other READMEs for flowbits
    and tunneling.

    * Save off packet data for quicker debugging in case of a SIGABRT or SIGBUS.

    * Fix alignment of sfxhash node for SPARC platforms.

http://www.snort.org/

Titel: Snort 2.9.6.1
Beitrag von: SiLæncer am 24 April, 2014, 09:14
Whats new: >>

Improvements:

Added a control command to dump all packets matching a BPF to a pcap file for capturing specific traffic for further analysis
Address issue for encoded packets and icmp header length determination
Provide more detailed error output for parsing of invalid rules when byte_test, byte_check, content, and isdataat use a byte_extract value
Updated sensitive data to better address partial matches between packets

http://www.snort.org/

Titel: Snort 2.9.7.0 Beta
Beitrag von: SiLæncer am 02 Juli, 2014, 12:17
Release Notes
New additions:
Application Identification Preprocessor, when used in conjunction with open app ID detector content, that will identify application protocol, client, server, and web applications (including those using SSL) and include the info in Snort alert data. In addition, a new rule option keyword 'appid' that can be used to constrain Snort rules based on one or more applications that are identified for the connection. See README.appid for details.
A new protected_content rule option that is used to match against a content that is hashed. It can be used to obscure the full context of the rule from the administrator.
Protocol Aware Flushing (PAF) improvements for SMTP, POP, and IMAP to more accurately process different portions of email messages and file attachments.
Added ability to test normalization behavior without modifying network traffic.
When configured using na_policy_mode:inline-test, statistics will be gathered on packet normalizations that would have occurred, allowing less disruptive testing of inline deployments.
The HTTP Inspection preprocessor now has the ability to decompress DEFLATE and LZMA compressed flash content and DEFLATE compressed PDF content from http responses when configured with the new decompress_swf and decompress_pdf options. This enhancement can be used with existing rule options that already match against decompressed equivalents.
Added improved XFF support to HttpInspect. It is now possible to specify custom HTTP headers to use in place of 'X-Fowarded-For'. In situations where traffic may contain multiple XFF-like headers, it is possible to specify which headers hold precedence.
Added control socket command to dump packets.
The Stream5 preprocessor functionality is now split between the new Session and Stream preprocessors. This makes for easier tracking of sessions independent of TCP stream reassembly.
Improvements:
Update active response to allow for responses of 1500+ bytes that span multiple TCP packets.
Check limits of multiple configurations to not exceed a maximum ID of 4095.
Updated the error output of byte_test, byte_jump, byte_extract to including details on offending options for a given rule.
Update build and install scripts to install preprocessor and engine libraries into user specified libdir.
Improved performance of IP Reputation preprocessor.
The control socket will now report success when reloading empty IP Reputation whitelists/blacklists.
All TCP normalizations can now be enabled individually. See README.normalize for details on usingthe new options. For consistency with other options, the "urp" tcp normalization keyword nowenables the normalization instead of disabling it.
Lowered memory demand of Unicode -> ASCII mapping in HttpInspect.
Updated profiler output to remove duplicate results when using multiple configurations.
Improved performance of FTP reassembly.
Improved compatibility with Mac OSX 10.9 (Mavericks), OpenBSD, FreeBSD, and DragonFlyBSD.
[close]

http://www.snort.org/
Titel: Snort 2.9.6.2 Stable
Beitrag von: SiLæncer am 17 Juli, 2014, 17:01
Changelog

Snort 2.9.6.2

   * src/build.h:
     updating build number to 77

   * src/: encode.c, encode.h :    
     Fixed handling of ICMPv6 traffic.

   * src/preprocessors/Stream5/snort_stream5_tcp.c :    
     Fixed inline stream reassembly during file processing.

   * src/preprocessors/spp_perfmonitor.c :    
     Fixed race condition in performance monitor.

   * src/preprocessors/:
     snort_httpinspect.c,
     HttpInspect/client/hi_client.c,
     HttpInspect/include/hi_client.h,
     HttpInspect/include/hi_ui_config.h,
     HttpInspect/user_interface/hi_ui_config.c :
     Added the ability to specify additional custom 'x-forwarder-for'
     http field names. A new http inspection configuration element is used to
     specify a set of field names and their respective precedence order. 
    
   * src/preprocessors/Stream5/snort_stream5_session.c :
     Add cache flow timeout for ip.

[close]

http://www.snort.org/
Titel: Snort 2.9.7.0 RC
Beitrag von: SiLæncer am 09 Oktober, 2014, 14:00
Changelog

New additions:

Application Identification Preprocessor, when used in conjunction with open app ID detector content, that will identify application protocol, client, server, and web applications (including those using SSL) and include the info in Snort alert data. In addition, a new rule option keyword 'appid' that can be used to constrain Snort rules based on one or more applications that are identified for the connection.
A new protected_content rule option that is used to match against a content that is hashed. It can be used to obscure the full context of the rule from the administrator.
Protocol Aware Flushing (PAF) improvements for SMTP, POP, and IMAP to more accurately process different portions of email messages and file attachments.
Added ability to test normalization behavior without modifying network traffic. When configured using na_policy_mode:inline-test, statistics will be gathered on packet normalizations that would have occurred, allowing less disruptive testing of inline deployments.
The HTTP Inspection preprocessor now has the ability to decompress DEFLATE and LZMA compressed flash content and DEFLATE compressed PDF content from http responses when configured with the new decompress_swf and decompress_pdf options. This enhancement can be used with existing rule options that already match against decompressed equivalents.
Added improved XFF support to HttpInspect. It is now possible to specify custom HTTP headers to use in place of 'X-Fowarded-For'. In situations where traffic may contain multiple XFF-like headers, it is possible to specify which headers hold precedence.
Added support for Heartbleed detection.
Added control socket command to dump packets.
Added an option to suppress configuration information logging to output.
The Stream5 preprocessor functionality is now split between the new Session and Stream preprocessors.

Improvements:

Maximum IP6 extensions decoded is now configurable.
Update active response to allow for responses of 1500+ bytes that span multiple TCP packets.
Check limits of multiple configurations to not exceed a maximum ID of 4095.
Updated the error output of byte_test, byte_jump, byte_extract to including details on offending options for a given rule.
Update build and install scripts to install preprocessor and engine libraries into user specified libdir.
Improved performance of IP Reputation preprocessor.
The control socket will now report success when reloading empty IP Reputation whitelists/blacklists.
All TCP normalizations can now be enabled individually. See README.normalize for details on using the new options. For consistency with other options, the "urp" tcp normalization keyword now enables the normalization instead of disabling it.
Lowered memory demand of Unicode -> ASCII mapping in HttpInspect.
Updated profiler output to remove duplicate results when using multiple configurations.
Improved performance of FTP reassembly.
Improved compatibility with Mac OSX 10.9 (Mavericks), OpenBSD, FreeBSD, and DragonFlyBSD
Stability improvements in Stream6 preprocessor and FTP preprocessor.

[close]

http://www.snort.org/
Titel: Snort 2.9.7.0 Final
Beitrag von: SiLæncer am 28 Oktober, 2014, 17:00
Changelog

  • New additions

* Application Identification Preprocessor, when used in conjunction with
OpenAppID detector content, that will identify application protocol,
client, server, and web applications (including those using SSL) and
include the info in Snort alert data. In addition, a new rule option
keyword 'appid' that can be used to constrain Snort rules based on one
or more applications that are identified for the connection. Separate
prepackaged RPMs with App Open ID are available. See README.appid
for further details.

* A new protected_content rule option that is used to match against a
content that is hashed. It can be used to obscure the full context
of the rule from the administrator.

* Protocol Aware Flushing (PAF) improvements for SMTP, POP, and IMAP to
more accurately process different portions of email messages and file
attachments.

* Added ability to test normalization behavior without modifying
network traffic. When configured using na_policy_mode:inline-test,
statistics will be gathered on packet normalizations that would have
occurred, allowing less disruptive testing of inline deployments.

* The HTTP Inspection preprocessor now has the ability to decompress
DEFLATE and LZMA compressed flash content and DEFLATE compressed PDF
content from http responses when configured with the new
decompress_swf and decompress_pdf options. This enhancement can be
used with existing rule options that already match against
decompressed equivalents.

* Added improved XFF support to HttpInspect. It is now possible to
specify custom HTTP headers to use in place of 'X-Forwarded-For'. In
situations where traffic may contain multiple XFF-like headers, it is
possible to specify which headers hold precedence.

* Added additional support for Heartbleed detection within the SSL
preprocessor to improve performance.

* Added control socket command to dump packets to a file. See
README.snort_dump_packets_control for details.

* Added an option to suppress configuration information logging to
output.

* The Stream5 preprocessor functionality is now split between the new
Session and Stream6 preprocessors.

  • Improvements

* Maximum IP6 extensions decoded is now configurable.

* Update active response to allow for responses of 1500+ bytes that span
multiple TCP packets.

* Check limits of multiple configurations to not exceed a maximum ID of
4095.

* Updated the error output of byte_test, byte_jump, byte_extract to
including details on offending options for a given rule.

* Update build and install scripts to install preprocessor and engine
libraries into user specified libdir.

* Improved performance of IP Reputation preprocessor.

* The control socket will now report success when reloading empty IP
Reputation whitelists/blacklists.

* All TCP normalizations can now be enabled individually. See
README.normalize for details on using the new options. For
consistency with other options, the "urp" tcp normalization keyword
now enables the normalization instead of disabling it.

* Lowered memory demand of Unicode -> ASCII mapping in HttpInspect.

* Updated profiler output to remove duplicate results when using
multiple configurations.

* Improved performance of FTP reassembly.

* Improved compatibility with Mac OSX 10.9 (Mavericks), OpenBSD,
FreeBSD, and DragonFlyBSD

[close]

http://www.snort.org/
Titel: Snort 2.9.7.2
Beitrag von: SiLæncer am 13 März, 2015, 12:11
Changelog

New additions:


Support for Cisco FabricPath decoding/encoding

Improvements:

Resolved an issue where the inline normalization preprocessor incorrectly
resized packets when 'preprocessor normalize_tcp: trim' was enabled
Resolved crash in file processing of HTTP continuations

[close]

http://www.snort.org/
Titel: Snort 2.9.7.3
Beitrag von: SiLæncer am 20 Mai, 2015, 09:04
Changelog

New additions:

Added PAF support for SIP based traffic

Improvements:

Resolved a backtracking issue where the 'protected_content' rule option was not matching on content following a content rule option that is not matched
Resolved an issue where snort dropped privilege levels before attempting to delete its PID file created during the higher privilege level
Improved processing of SSLv3 traffic, IPv6 extensions, HTTPS session reassembly and normalization
Performance improvements for file preprocessor
Stability improvements for ftp_telnet preprocessor

[close]

http://www.snort.org/
Titel: Snort 2.9.7.5
Beitrag von: SiLæncer am 24 Juli, 2015, 09:18
Changelog

Added improved support to the Stream preprocessor for asynchronous TCP traffic
Active response no longer sets the FIN flag on the last segment sent

[close]

http://www.snort.org/
Titel: Snort 2.9.8.0 Beta
Beitrag von: SiLæncer am 17 August, 2015, 22:00
Changelog
New additions:

AppID is no longer experimental.
SMBv2/SMBv3 support for file inspection.
Port override for metadata service in IPS rules.
AppID Lua detector performance profiling.
Perfmon dumps stats at fixed intervals from absolute time.
New preprocessor alert (18:120) to detect SSH tunneling over HTTP
New config option |disable_replace| to disable replace rule option.
New Stream configraution |log_asymmetric_traffic| to control logging to syslog.
New shell script in tools to create simple Lua detetors for AppID.

Improvements:

sfip_t refactored to use struct in6_addr for all ip addresses.
Post-detection callback for preprocessors.
AppID support for multiple server/client detectors evaluting on same flow.
AppID API for DNS packets.
Memory optimizations throughout.
Support sending UDP active responses.
Fix permon tracking of pruned packets.
Improved support for expected sessions.
[close]

http://www.snort.org/
Titel: Snort 2.9.7.6
Beitrag von: SiLæncer am 01 Oktober, 2015, 05:30
Changelog
Snort 2.9.7.6
    * src/build.h:
     updating build number to 285

    * src/dynamic-preprocessors/reputation/reputation_config.c:
          Fixed unexpected behaviour in reputation config where blacklist is displayed
     in priority field even though whitelist option is set [reported by Mike Cox].   

    * src/preprocessors/Stream6/snort_stream_tcp.c:
     Fixed issue where XFF/ExtraData is not always logged when 'drop' rules trigger [reported by Mike Cox].
     Fixed issue in TCP session deletion when being called from Stream5 HA.

    * src/: active.h, file-process/file_service.c:
     ACTIVE_DROP is changed to ACTIVE_FORCE_DROP when file_verdict is pending.

    * src/dynamic-preprocessors/appid/fw_appid.c:
     Fixed issue where openappid does not provide the Content-Type field for use with CHPAddAction.

    * doc/snort_manual.tex:
     Corrected errors in snort_manual.tex [reported by Gabriel Corre].
    
    * preproc_rules/preprocessor.rules
     src/preprocessors/: session_api.h, snort_httpinspect.c,
     HttpInspect/event_output/hi_eo_log.c, HttpInspect/include/hi_eo_events.h
     Stream6/snort_stream_tcp.c:
     Enhancement done to detect 'SSH tunneling over HTTP'.

    * src/sfutil/sfportobject.c:
     Fixed Memory leaks [reported by Bill Parker].

    * doc/snort_manual.tex:
     Corrected the information about unified2 record structure [reported by Avery Rozar].
   
    * etc/snort.conf, src/preprocessors/snort_httpinspect.c,
          src/preprocessors/snort_httpinspect.h,
          src/preprocessors/HttpInspect/client/hi_client.c,
          src/preprocessors/HttpInspect/server/hi_server.c,
          src/preprocessors/Stream6/stream_paf.c:
     Fixed issue where original client IP in intrusion event is incorrectly
     populated with XFF of the last GET request.

    * src/preprocessors/: snort_httpinspect.c, snort_httpinspect.h,
          HttpInspect/server/hi_server.c,
          snort_httpinspect.c, snort_httpinspect.h,
          HttpInspect/server/hi_server.c:
     Http unlimited decompression will now decompress the entire stream.

    * src/decode.c:
     Added a check so that min_ttl decoder do not drop packet in alert mode.
    
    * etc/snort.conf, src/preprocessors/snort_httpinspect.c,
          src/preprocessors/snort_httpinspect.h,
          src/preprocessors/HttpInspect/client/hi_client.c,
          src/preprocessors/HttpInspect/server/hi_server.c
     Fixed issue where original client IP in intrusion event is incorrectly populated with XFF of the last GET request.   
[close]

http://www.snort.org/
Titel: Snort 2.9.8.0 RC
Beitrag von: SiLæncer am 08 Oktober, 2015, 09:06
Changelog
New additions:

SMBv2/SMBv3 support for file inspection
Port override for metadata service in IPS rules
AppID Lua detector performance profiling
Perfmon dumps stats at fixed intervals from absolute time
New preprocessor alert (18:120) to detect SSH tunneling over HTTP
New config option |disable_replace| to disable replace rule option
New Stream configuration |log_asymmetric_traffic| to control logging to syslog
New shell script in tools to create simple Lua detectors for AppID

Improvements:

sfip_t refactored to use struct in6_addr for all ip addresses
Post-detection callback for preprocessors
AppID support for multiple server/client detectors evaluating on same flow
AppID API for DNS packets
Memory optimizations throughout
Support sending UDP active responses
Fix perfmon tracking of pruned packets
Stability improvements for AppID
Stability improvements for Stream6 preprocessor
Added improved support to block malware in FTP preprocessor
Added support to differentiate between active and passive FTP connections
Improvements done in Stream6 preprocessor to avoid having duplicate packets
in the DAQ retry queue
Resolved an issue where reputation config incorrectly displayed 'blacklist' in
priority field even though 'whitelist' option was configured
[close]

http://www.snort.org/
Titel: Snort 2.9.8.0 Final
Beitrag von: SiLæncer am 01 Dezember, 2015, 06:00
Changelog

NEW ADDITIONS:

SMBv2/SMBv3 support for file inspection.
Port override for metadata service in IPS rules.
AppID Lua detector performance profiling.
Perfmon dumps stats at fixed intervals from absolute time.
New preprocessor alert (120:18) to detect SSH tunneling over HTTP
New config option |disable_replace| to disable replace rule option.
New Stream configuration |log_asymmetric_traffic| to control logging to syslog.
New shell script in tools to create simple Lua detectors for AppID.

IMPROVEMENTS:

sfip_t refactored to use struct in6_addr for all ip addresses.
Post-detection callback for preprocessors.
AppID support for multiple server/client detectors evaluating on same flow.
AppID API for DNS packets.
Memory optimizations throughout.
Support sending UDP active responses.
Fix perfmon tracking of pruned packets.
Stability improvements for AppID.
Stability improvements for Stream6 preprocessor.
Added improved support to block malware in FTP preprocessor.
Added support to differentiate between active and passive FTP connections.
Improvements done in Stream6 preprocessor to avoid having duplicate packets
in the DAQ retry queue.
Resolved an issue where reputation config incorrectly displayed 'blacklist' in
priority field even though 'whitelist' option was configured.
Added support for multiple expected sessions created per packet
Active response now supports MPLS

[close]

http://www.snort.org/
Titel: Snort 2.9.8.2
Beitrag von: SiLæncer am 31 März, 2016, 06:00
Changelog

New additions:

Future-flow and DNS API exposed to lua detector.
Double VLAN tagging support.

Improvements:

Performance improvements to AppID.
Stability improvements to file and ftp_telnet preprocessor.
Fixed several issues with SDF and obfuscation.
Resolved an issue of improper handling of malformed DNS host
in AppID.
HTTP PAF accepts all tokens between method and version strings in a request URI.
Resolved snort build issue with "--disable-perfprofiling" configure option.
Enhanced mime parsing by adding support for detecting files after unknown headers and no headers.
Fixed issue with gzip decompression. If the server response specifies Content-Encoding as GZIP, but no Content-Length field for HTTP ver 1.0.
End of Header(EOH) identification for HTTP response header spanning multiple packets.
Improved packet reassembly for HTTP.
Fixed Flash LZMA decompression issue.

[close]

http://www.snort.org/
Titel: Snort 2.9.8.3
Beitrag von: SiLæncer am 24 Juni, 2016, 06:00
Whats new:>>

*  Stability improvement for Stream6 preprocessor
*  Fixed multiple issues in HttpInspect preprocessor
*  Fixed an issue of incorrect masking of sensitive data

http://www.snort.org/
Titel: Snort 2.9.9.0
Beitrag von: SiLæncer am 14 Dezember, 2016, 20:00
Changelog

New additions:

New rule option for byte_math. See the Snort manual for details.
Added bitmask and from_end operations to byte_test. See the Snort manual for details.
Added a Buffer Dump utility to trace all of the buffers used by snort during inspection.
Enable this by --enable-buffer-dump option to configure prior to building. See the Snort manual for details.
Added new HTTP preprocessor alerts to detect multiple content encoding and multiple content length.
Added support for SMTP Traffic detection over SSL (SMTPS).

Improvements:

Fixed an issue which reduces extra service discovery to improve performance.
Fixed multiple issues in AppID.
Reconstructed the call to port-service detection.
Fixed issue where AppId for Facebook over SPDY/HTTP 1.1 was incorrect.
Preventing third-party application identification for expected connections.
Stability improvement for Stream preprocessor.
Addressed incorrect flushing of packets whose size is greater than MAXIMUM_PAF_MAX.
Fixed an issue where incorrect length argument in memcpy caused out of bound memory access.
Fixed multiple issues in HttpInspect preprocessor.
Handling chunk encoding followed by rrrn and nnnrrn.
Fixed an issue with LZMA flash decompression.
Fixed mime data processing issue in SMTP stateless inspection.
Added support to decode packets that contains VLAN with Secure Group Tag (SGT).
Fixed Issue related to DLL-Load in Snort on windows platforms for CVE-2016-1417.

[close]

http://www.snort.org/
Titel: Snort 2.9.11 Beta
Beitrag von: SiLæncer am 11 August, 2017, 12:00
Changelog

New additions:

Changes to eliminate Snort restart when there are changes to the memory allocated for preprocessors, by releasing unused or least recently used memory when needed.

Improvements:

Enhanced RTSP metadata parsing to match the user-agent field to detect RTSP traffic over Windows Media.
Performance improvement when SYN rate limit has reached and drop is configured as next action
Control-socket and side-channel support for FreeBSD platform.
Fixed an issue where IoQ driver was getting into bad state due to non-graceful exit.
Fixed issue in file signature lookup for retransmitted FTP packet.
Enhanced the processing of SIP/RTP future flows without ignoring them.
Changes made in PDF/SWF decompression by adding boundary to the size of the decompressed data.
Added a null check to prevent copy unless debugHostIp is configured in AppId.
Fixed issue where FTP file type block doesn't work for retried download.
Resolved issue where Snort is inappropriately handling traffic for which
AppId was creating future flow.
Performance improvements for SIP/RTP audio and video data flow in AppId.
Performance and stability improvements in FTP preprocessor like incorrect
referencing of ftp_data_session after its pruned.
Stability improvement by resolving valgrind reported issues in AppId.
Improved flushing mechanism for HTTP POST header.

[close]

http://www.snort.org/
Titel: Snort 2.9.11 Final
Beitrag von: SiLæncer am 12 Oktober, 2017, 06:00
Changelog

New additions:

Changes to eliminate Snort restart when there are changes to the memory allocated for preprocessors, by releasing unused or least recently used memory when needed.
Added support for storing filenames in Unicode for SMB protocol.
Added implementation of hostPortCache versioning for unknown flows in AppID to detect and block BitTorrent.

Improvements:

Enhanced RTSP metadata parsing to match the user-agent field to detect RTSP traffic over Windows Media.
Performance improvement when SYN rate limit has reached and drop is configured as next action
Control-socket and side-channel support for FreeBSD platform.
Fixed issue in file signature lookup for retransmitted FTP packet.
Enhanced the processing of SIP/RTP future flows without ignoring them.
Changes made in PDF/SWF decompression by adding boundary to the size of the decompressed data.
Added a null check to prevent copy unless debugHostIp is configured in AppId.
Fixed issue where FTP file type block doesn't work for retried download.
Resolved issue where Snort is inappropriately handling traffic for which AppId was creating future flow.
Performance improvements for SIP/RTP audio and video data flow in AppId.
Performance and stability improvements in FTP preprocessor like incorrect referencing of ftp_data_session after its pruned.
Stability improvement by resolving valgrind reported issues in AppId.
Improved flushing mechanism for HTTP POST header.
Added changes to display AppId for IPv6 unified events.
Fixed issues with printing of messages for out-of-order packets.
Fixed issue in increment of detection filter counter when rule is used in multiple configurations.
Fixed dynamic preprocessor compilation failure in OpenBSD platform.
Added changes to improve performance of ipvar list comparison.
Enhanced SMTP client detection by allowing line folding and all authentication methods.

[close]

http://www.snort.org/
Titel: Snort 2.9.11.1
Beitrag von: SiLæncer am 05 Januar, 2018, 19:00
Changelog

New Additions:

Added support to block portscan. In addition to tracking the scanning packets, action(drop/sdrop/reject) will be taken for all the packets, which means Snort will block the packet and generate logs.
Added support to re-evaluate reputation after reputation update for all flows except those that have already been blacklisted.

Improvements:

Fixed issue to detect RTP up to two SSRC switches in each traffic direction.
Fixed issues related to HTTP POST header flushing, calling file processing directly if it is not a multipart header and changes to avoid expensive copy of segment data by not splitting them when flushing headers.
Fixed issue of triggering protocol sweep alert when there are multiple destinations from single source ip protocol scan.
Added changes to fix IP portscan for protocol other than ICMP and fixed issue of bad fragment size event not being generated for oversized packets.
Added changes to use raw data in case of PDF and SWF files during file processing for SHA calculation and Malware Cloud Lookup.
Fixed issue of correct session matching for TCP SYN packets without window scale option so that FTP data channels match the same rule as FTP control channels.
Fixed issue of applying new configuration in file inspection after Snort reload.

[close]

http://www.snort.org/
Titel: Snort 2.9.12
Beitrag von: SiLæncer am 12 Oktober, 2018, 20:00
Release Notes

  • New Additions


 * Parsing HTTP CONNECT to extract the tunnel IP and port information.
 * Alerting and dechunking for chunked encoding in HTTP1.0 request and response.

  • Improvements


 * Fixed an issue where in if we have a junk line before HTTP response header, the header was wrongly parsed.
  * Fixed GZIP evasions wherein a HTTP response with content-encoding:gzip contains a body which has some gzip related anomaly.
 * Fixed an issue in a scenario where BitTorrent pattern is seen only on the 3rd packet of the session because of which we miss our client detection.
 * SMB improvements for file detection and processing.

[close]

http://www.snort.org/
Titel: Snort 2.9.13
Beitrag von: SiLæncer am 11 April, 2019, 20:00
Changelog

New Additions:

Snort now supports reload on snort rules update.
Addition of a scenario to add a packet to blacklist verdict to ensure the new session will be allowed.
Handled a new pre-processor alert in case of the improper end of t HTTP header.

Improvements:

Modified the calculation of file hash for FTP/HTTP with offset values.
Fixed portal authentication connection stuck in half closed state.
Updated UDP global timeout for a non-standard port.

[close]

http://www.snort.org/
Titel: Snort 2.9.14
Beitrag von: SiLæncer am 19 Juli, 2019, 06:00
Changelog

    New Additions:

    Added support for wild card port numbers in host cache and overwriting port service AppId.
    Added new client patterns to prompt client validation.
    Added SMTP Microsoft Outlook client for Mac.
    Added a new preprocessor alert 120:27 to alert if there is no proper end-of-header.

    Improvements:

    Improved appId detection for proxied traffic.
    Fix to ensure Snort is ready for packet commencing before DAQ starts.
    Fix for enabling flow profiling mode without restarting Snort detection engine.

[close]

http://www.snort.org/
Titel: Snort 2.9.14.1
Beitrag von: SiLæncer am 06 August, 2019, 19:30
Whats new:>>

* src/sfdaq.c :
     Fixed packet drop scenario.

http://www.snort.org/
Titel: Snort 2.9.15
Beitrag von: SiLæncer am 11 Oktober, 2019, 06:00
Changelog

    New Additions:

    Added new debugs to print detection, file_processing and Preproc time consumption info and verdict.
    Added support to detect new Korean file formats .egg and .alg in the file preprocessor.
    Added support to detect new RAR file-type in the file preprocessor.

    Improvements / Fix:

    Fix to generate ALERT if TEID value is zero in GTP v1 and v2 packets.
    Fix to whitelist ftp data sessions when no file policy exists.
    Fix RTF file magic to a more generic value to prevent evasions.
    Added debug logs during HTTP reload
    Added rule SID check during validation
    Fix an issue where HTTP was processing non-HTTP traffic on port 443
    Added new debugs to print detection, file processing, and Prepro time consumption info and verdicts

[close]

http://www.snort.org/
Titel: Snort 2.9.15.1
Beitrag von: SiLæncer am 06 Januar, 2020, 21:30
Changelog

   * src/file-process/file_ss.c :
     Fixed the right order of precedence. Thanks to David Binderman for reporting this.

   * src/dynamic-preprocessors/ssl_common/ssl_config.c :
     Fixed snort core seen during ssl re-configuration.

   * src/fpdetect.c,
     src/log_text.c, src/profiler.h :
     Fixed compiler warnings.

   * src/file-process/file_segment_process.c :
     Fixed file access issues on files from SMB share.

   * configure.in,
     src/reload.c, src/side-channel/sidechannel.c,
     src/snort.c, src/target-based/sftarget_reader.c, src/util.h :
     Added support for glibc version 2.30.

[close]

http://www.snort.org/
Titel: Snort 2.9.16
Beitrag von: SiLæncer am 14 April, 2020, 06:00
Changelog

    New Additions:

    Added support for early inspection of HTTP payload before flushing in pre-ack mode.
    This feature can be enabled using fast_blocking in http inspect configuration.
    Added 64-bit support for Windows 10 operating system.
    Added support for glibc version 2.30.

    Improvements / Fix:

    Fixed file policy not working with character prefix in chunk size.
    Updated the file magic to detect ALZ file types.
    Addressed an issue when out-of-order FIN is received by dropping it.
    Normalize randomly encoded nulls interspersed in the HTTP server response to UTF-8.

[close]

http://www.snort.org/
Titel: Snort 2.9.16.1
Beitrag von: SiLæncer am 05 August, 2020, 14:00
Changelog

    New Additions:

    Added support for GCC version 10.1.1.

    Improvements / Fix:

    Added packet counters to make sure flows with one-way data don't pend forever.
    Fixed potential race condition between reload and exit path.

[close]

http://www.snort.org/
Titel: Snort 2.9.17
Beitrag von: SiLæncer am 20 November, 2020, 09:00
Changelog

  • New Additions


   Added support for s7Commplus protocol.

   Support for allowing common names across rule options.

   Added support to detect TCP Fast Open packets.

  • Improvements / Fix


   Added support for HTTP range field parsing to detect if HTTP response/request is indeed partial or full content.

   Fixed TCP segment queue hole issue as per the RFC793 recommendation for OOO Ack packet handling.

   Fixed multiple static analysis issues.

   Miscellaneous SMB bug fixes.

[close]

http://www.snort.org/
Titel: Snort 2.9.17.1
Beitrag von: SiLæncer am 29 März, 2021, 21:00
Changelog

  • Improvements / Fix


     Fixed wrong reference to configuration during reload.
     Fixed possible memleak in appid.
     Fixed a race-condition in http preproc and IPS.
     Fixed a race-condition in stream preproc.

[close]

http://www.snort.org/
Titel: Snort 2.9.18.0
Beitrag von: SiLæncer am 16 Juni, 2021, 10:00
Changelog

    New Additions:

    Added range field support in HTTP preprocessor.
    Added alert for HTTP chunk size mismatch.
    Added support to detect SNMP 'report pdu'.
    Added additional stats for SMB preprocessor.

    Improvements and fixes:

    Fixed a condition in which an alert would not be generated.
    Fixed possible memory corruption in SMB preprocessor.
    Fixed handling ICMP error code -4 .
    Fixed an error when the debugmsgs option enabled in compilation.

[close]

http://www.snort.org/
Titel: Snort 2.9.18.1
Beitrag von: SiLæncer am 03 September, 2021, 11:00
Whats new:>>

Fixed possible memory corruption in SMB preprocessor.

http://www.snort.org/
Titel: Snort 2.9.19
Beitrag von: SiLæncer am 08 Dezember, 2021, 20:00
Changelog

    New Additions:

    Added support for AppID to detect login success and failure for IMAP and POP3 protocols.

    Improvements / Fix:

    Fixed an issue where the verdict will be applied to the next session when a timeout occurs in some scenarios.
    Removed an excessively flooding log.
    Fixed possible integer overflow.
    Added fix to GCC compiled snort to use AC-BNFA-Q search-method when Intel-CPM is enabled.
    Fixed terminology to be bias-free in log/error messages.
    Fixed a potential race condition.
    Added fix to not to drop packets when the window size is 0 by TCP normalizer and added a new alert with GID 129 and SID 21 when such packets are seen.

[close]

http://www.snort.org/
Titel: Snort 2.9.20
Beitrag von: SiLæncer am 09 Juni, 2022, 12:00
Release Notes

  • New Additions


        Added support for dns root queries and underflow.
        Added support to get extra data from SMTP and HTTP into IPS event.
        Added support for login success and failure eventing for IMAP and POP3.
        Added support to handle empty string for SNI/CN/SAN/ORG.

  • Improvements / Fix


        Fixed a scenario where SSL traffic was not detected correctly.
        Fixed security zones info in intrusion events.
        Fixed URL lookup failure.

[close]

Changelog


snort 2.9.20

   * src/dynamic-preprocessors/appid/service_plugins/service_ssl.c :
     Fixed a scenario where SSL traffic was not detected correctly.

   * src/dynamic-preprocessors/smtp/snort_smtp.c :
     Fixed a possible memory corruption.

   * src/dynamic-preprocessors/imap/imap_util.c
     src/dynamic-preprocessors/pop/pop_util.c
     src/dynamic-preprocessors/smtp/smtp_util.c
     src/preprocessors/spp_httpinspect.c :
     Fixed malformed packet debug engine output.

   * src/preprocessors/Stream6/snort_stream_tcp.c :
     Fixed security zones info in intrusion events.

   * src/dynamic-preprocessors/appid/fw_appid.c :
     Fixed URL lookup failure.

   * src/preprocessors/HttpInspect/server/hi_server.c :
     Fixed a possible memory leak.

   * src/dynamic-preprocessors/appid/detector_plugins/detector_dns.c
     src/dynamic-preprocessors/appid/fw_appid.c
     src/dynamic-preprocessors/appid/fw_appid.h
     src/dynamic-preprocessors/appid/detector_plugins/service_plugins/service_api.h :
     Added support for dns root queries and underflow.

   * src/dynamic-preprocessors/smtp/snort_smtp.c
     src/Makefile.am
     src/dynamic-examples/Makefile.am
     src/dynamic-plugins/sf_dynamic_plugins.c
     src/dynamic-plugins/sf_dynamic_preprocessor.h
     src/dynamic-preprocessors/Makefile.am
     src/dynamic-preprocessors/smtp/snort_smtp.h
     src/dynamic-preprocessors/smtp/spp_smtp.c
     src/smtp_api.h :
     Added support to get extra data from SMTP and HTTP into IPS event.

   * src/dynamic-preprocessors/appid/detector_plugins/detector_imap.c
     src/dynamic-preprocessors/appid/detector_plugins/detector_pop3.c :
     Added support for login success and failure eventing for IMAP and POP3.

   * src/dynamic-preprocessors/appid/hi_server.c :
     Added support to handle empty string for SNI/CN/SAN/ORG.

[close]

http://www.snort.org/
Titel: Snort v3.1.48.0
Beitrag von: SiLæncer am 03 Dezember, 2022, 19:00
Changelog


Changes in this release since 3.1.47.0:

    appid: added config for logging alpn service mappings
    appid: fixed addition of duplicate entries in app_info_table
    appid: make appid availability independent from TP state
    cmake: add FLEX build macro
    doc: update sensitive data documentation
    doc: update user/js_norm.txt for PDF
    flow: add an event for retry packets
    flow: added an event to allow post processing of new expected flows
    flow: fix deferred trust clear when packet is dropped
    flow, stream: added code to track and event for one-sided TCP sessions and generate an event for established or one-sided flows
    http_inspect: add decompression failure check before normalization
    http_inspect: remove port from xff header
    ips_option: keep cursor intact for a negated content mismatched
    ips_option: keep cursor intact for a negated hash mismatched
    js_norm: implement Enhanced JS Normalization for PDF
    js_norm: use FLEX macro to build parser
    process: watchdog to abort snort when multiple packet thread becomes unresponsive
    smb: handling smb duplicate sessions
    stream: add logic to ensure metaACKs cause flushing

[close]

Quelle : https://github.com/snort3/snort3

http://www.snort.org/
Titel: Snort 3.1.50.0
Beitrag von: SiLæncer am 21 Dezember, 2022, 12:00
Changelog


Dependencies:

    LibDAQ v3.0.10

Changes in this release since 3.1.48.0:

    alert_fast: fix initialization of http_inspect cheat codes
    appid: appid_detector_builder.sh addPortPatternService call fixed
    appid: do not reset session data when built-in discovery is not done
    appid: fixed assert condition for odp_ctxt and odp_thread_local_ctxt
    config: ensure table state is reset when starting a new shell
    config: fix talos tweaks for the daq module
    data_bus: improve pub-sub performance
    doc: add decompression mention to js_norm reference
    doc: update user/js_norm.txt for PDF in email protocols
    geneve: if daq has the capability, do not bypass geneve tunnel
    host_cache: fix initialization from Lua
    ips_options: fix offset related bug in byte_test eval()
    js_norm: add PDF stream processing
    js_norm: add support for email protocols
    js_norm: fix pdf_tokenizer_test on FreeBSD platform
    js_norm: update PDF tokenizer to use glue input streambuf
    pop, imap, smtp: gracefully decline buffer requests when flow data is not present
    stream: ignore PAWS timestamp checks when in no_ack mode
    wizard: remove client_first option

[close]

Quelle : https://github.com/snort3/snort3

http://www.snort.org/
Titel: Snort 3.1.53.0
Beitrag von: SiLæncer am 27 Januar, 2023, 18:00
Changelog


    appid: publish tls host set in eve process event handler only when appid discovery is complete
    detection: show search algorithm configured
    file_api: handling filedata in multithreading context
    flow: add stream interface to get parent flow from child flow
    memory: added memusage pegs
    memory: fix unit test build w/o reg test

[close]

http://www.snort.org/
Titel: Snort 3.1.55.0
Beitrag von: SiLæncer am 10 Februar, 2023, 11:00
Changelog


Changes in this release since 3.1.53.0:

    appid: first packet detector creation support in appid detector builder script
    appid: support for IPv4 and IPv6 subnets for First Packet API
    appid: updating lua API to accomodate netbios domain extraction, substring search, and substring index.
    appid: use packet thread's odp context instead of inspector's context for packet processing
    build: fix configure_cmake.sh 'too many arguments' error
    detection: add new pegcount
    main: avoid race conditions when accessing id to tid map
    ssl: refactor ssl client hello parser to be used by appid/ssl inspectors
    stream_tcp: fix passive pickups with missing packets. Thanks to nagmtuc and hedayat for reporting and helping debug the issue.
    wizard: ensure Wizard is refcounted by MagicSplitter to prevent snort crashes due to memory corruption

[close]

http://www.snort.org/
Titel: Snort 3.1.56.0
Beitrag von: SiLæncer am 24 Februar, 2023, 10:00
Changelog


Changes in this release since 3.1.55.0:

    appid: add validation for rpcbind universal address
    appid: merge cname pattern matchers with ssl pattern matchers
    configure: fix typo in jemalloc with tcmalloc error message
    copyright: update for year 2023
    doc: update sd_pattern docs after obfuscation changes
    sd_pattern: keep obfuscation blocks per buffer

[close]

http://www.snort.org/
Titel: Snort 3.1.57.0
Beitrag von: SiLæncer am 13 März, 2023, 11:00
Whats new:>>

    ftp_telnet: updated flushing around subnegotiation parameters
    profiler: add rule time percentage table field
    search_engine: allocate a single shared scratch space

http://www.snort.org/
Titel: Snort 3.1.59.0
Beitrag von: SiLæncer am 07 April, 2023, 22:00
Whats new:>>

    file_api: handling file cache context
    flow_cache: prune multiple flows
    http2_inspect: clear flow stream_intf with flow_data
    http2_inspect: make flow data reload safe
    memory: subtract the allocated memory from the thread pruned before comparing to the target
    stream: store thread local flow control pointer in global
    thread_config: add preemptive watchdog kick for flow deletion
    thread_config: remove message use in watchdog timer

http://www.snort.org/
Titel: Snort 3.1.60.0
Beitrag von: SiLæncer am 22 April, 2023, 10:00
Whats new:>>

    appid: fixed TSAN warnings
    appid: log max rss difference and pattern count during appid initialization and reload detectors
    appid: make ssl app group id lookup set payload and client
    appid: making free_servicematch_list thread local
    src: change a few operator bool functions to named functions
    src: fix broken unit test/tweak define related to previous operator bool fixes

http://www.snort.org/
Titel: Snort 3.1.61.0
Beitrag von: SiLæncer am 08 Mai, 2023, 11:00
Changelog


    appid: appIdPegCounters thread data handling refactored to prevent data races
    appid: ensure that TP SSL detection is not overwrite SMTPS service and client in a starttls session
    appid: validate data size of SSL certificate record before parsing
    build: remove unused header. Thanks to Rui Chen for reporting the issue.
    cmake: update sed call. Thanks to graysky for reporting the issue.
    flow: defensive fix to prevent crash if flow->prev is nullptr.
    flow, hash, stream: add a free list node count that is output as a peg count
    managers: check main SnortConfig pointer in InspectorManager::get_inspector() to avoid memory bad access calls
    memory: fix memory pruning race condition and bail on reap failure
    memory: provide a default value for pointers if the module has not been initialized
    profiler: add shell commands
    profiler: move profiler module to separate files
    snort: add show_config_generation() command
    stream_tcp: populate TCP pseudopackets with VLAN ids in TCP reassembler to avoid issues with secondary flow creation / expected flow cache

[close]

http://www.snort.org/
Titel: Snort 3.1.62.0
Beitrag von: SiLæncer am 22 Mai, 2023, 11:00
Changelog


    appid: added logic to check for encrypted appid before assigning SSL service based on port
    decompress, detetion, file_api, framework: cppcheck fixes
    flow: clean up flow termination
    flow: do not recycle flow cache entries
    http_inspect: add support for file transfer using Partial Content
    main: disable watchdog when Snort 3 process exits gracefully
    main, managers: set the network policy using the user id during inspector delete
    memory: add extra jemalloc counts for tracking
    memory: use jemalloc stats.mapped for process total
    profiler: add json formatter
    protocols: add check for missing Geneve layer in get_geneve_options.
    protocols,codecs: decode Geneve variable length options.
    sfip/test: fix a miscalculation of the number of codes entries.
    snort2lua: remove 'reference' option during conversion

[close]

http://www.snort.org/
Titel: Snort 3.1.66.0
Beitrag von: SiLæncer am 19 Juli, 2023, 10:00
Changelog


Changes in this release since 3.1.65.0:

    appid: cache Complex HTTP Pattern glossary before detectors reload
    appid: early detection of ssh and ignoring third-party detection
    appid: fix for opportunistic tls detected as ssl
    binder: in case of a service change, remove flags indicating an abort of the direction
    flow: changes to support derived classes of parent class Flow
    ftp: remove file_data dependency on file_id
    helpers: added additional log in print_backtrace for debugging purpose
    ips_options: add gadget check for vba_data
    ips_options: add unit tests for vba_data
    ips_options: update dev_notes about IPS options input values
    perf_mon: fix dump_stats collision with perf mon
    rna: add stats for rna graphs
    stream_tcp: validate proper update of stream_tcp state when seglist head follows a hole

[close]

http://www.snort.org/
Titel: Snort 3.1.69.0
Beitrag von: SiLæncer am 29 August, 2023, 20:00
Changelog


    appid, cip: parsing cip safety segments
    appid: mark ssl appid lookup successful if a service id is available
    appid: prefer eve client over appid detected client after decryption and use appid detected client version if eve client equals appid client
    dce_rpc: fix stats for client/server segments reassembled. Thanks to Bader-eddine Ouaich for addressing the issue.
    dns: parse and publish dns response with ip, fqdn/ttl data
    dns: updates to allow DNS to be compiled dynamically.
    doc: udpate tutorial
    framework: add virtual for inspectors that publish data when no ips policy is enabled.
    http2_inspect: add frame when logging a packet
    http2_inspect: handle empty header name
    http2_inspect: update connection settings on ack
    http2_inspect: update test tool configurations
    http_inspect: adjust formatting
    http_inspect: disable rule evaluation caching for MIME attachments
    inspector: export get_service_inspector_by_service method
    managers: fix get_inspector to use the passed in snort config for context and inspection inspectors
    mime: fix boundary search
    mime: postpone boundary-look-alike data till the next PDU arrives
    mime: support transport padding in boundary strings
    sfip: Add < operator so SfIp can be used in std::map and std::set.
    src: remove ips option asn1
    stream: init meta ack packet action field
    wizard: refactoring - split curses to multiple files by protocol

[close]

http://www.snort.org/
Titel: Snort 3.1.70.0
Beitrag von: SiLæncer am 12 September, 2023, 20:00
Changelog


Changes in this release since 3.1.69.0:

    appid: makes regex error more of a warning
    detection: fix assert expression
    helpers: improve hyperscan_search error message
    host_cache: added segmented host cache
    main: prevent reloading unprepared thread
    search_engines: allow a snort config to be passed to find_all

[close]

http://www.snort.org/
Titel: Snort 3.1.71.0
Beitrag von: SiLæncer am 26 September, 2023, 20:00
Changelog


Changes in this release since 3.1.70.0:

    appid, http_inspect, http2_inspect: create appid session if not present in decrypt event handler, add message section as part of StreamFlowIntf for httpx
    codecs: Add IPv6 Reserved Address to GID:116 Rules
    detection: avoid multiple fixups of duplicated trees
    detection: fix of default ips policy switching
    flow: allow reinspection for blocked icmp flows after reload
    flow: generate flow setup and established events for ha flows
    host_cache: cppcheck fix
    http2_inspect: fix http2 frame length for logging
    main: fix signals handling after failed started instances
    main: reset_stats argument type improvement
    parser: add file_id rule syntax evaluation
    smtp: add alert for mixed LF and CRLF
    smtp: process DATA\n (no \r)
    stream: extend list of arguments for extra data logging
    stream_tcp: ensure all data segments after a zero window are blocked when NAP is inline
    stream_tcp: examine whether a segment plugs a hole before blocking due to exceeding queue_limit

[close]

http://www.snort.org/
Titel: Snort 3.1.75.0
Beitrag von: SiLæncer am 22 November, 2023, 19:00
Whats new:>>

    appid: add appId for DNS over QUIC and DNS over HTTP/3 to application_ids.h
    decompress: use list for OLE file entries to guarantee their order in file_data
    detection: setting flag for flows with affected logging due to event filter

http://www.snort.org/
Titel: Snort 3.1.81.0
Beitrag von: SiLæncer am 20 Februar, 2024, 23:00
Changelog


Changes in this release (since 3.1.78.0)

3.1.81.0

    appid: check tenant_match() if required
    appid: log error message instead of fatal error if appid stats logfile is not accessible
    appid: Lowering max packet count before service fail
    control: Adds counting to ctrlcon blocked to allow for nested commands
    detection: add c'tors, use new instead of snort_calloc
    detection: copy ip var name in dup_rtn
    flow: added ips event suppression flags
    host_cache: fixed update_stats to remove race_condition
    http_inspect: recreate JSNorm if reload takes place inside transaction
    ips_context: add lazy-allocation of alt buffer
    kaizen: provide an option to enable Kaizen's mock
    kaizen: remove redundant semicolon and add explicit cast
    kaizen: rename modules
    lua: improve spell of wizard for HTTP
    memory: prevent data race between main and packet threads
    service_inspectors: add check for JSNorm config actuality
    stream_tcp: add alerts for exceeding thresholds for max queued bytes or segments
    stream_tcp: add check to verify seglist head is not nullptr and only initialize PAF when it is not
    utils: add macro for setting thread name

3.1.79.0

    appid: add tenants filter for appid debug
    appid: process organization unit instead of organization name
    appid: return false in is_appid_inspecting_session for quic if not decrypting
    appid: update peg counts to be thread safe
    coverity: fix for stream and hash
    filters: make rate_filter multithreaded + some cleanup
    kaizen: add dev_notes.txt
    kaizen: change default value of uri_depth to -1
    kaizen: change kaizen gid to 411
    kaizen: extend mock object with simple matching mechanism
    kaizen: make kaizen configurable per policy
    kaizen: register module only when LibML present or REG_TEST defined
    kaizen: update copyright
    mercury: updating alpn info without sni in 7.6
    network_inspectors: add kaizen ML based exploit detector
    packet_tracer: add tenants to filters
    profiler: improve multithread rule percentage calculation
    ssl: heap overflow issue when processing handshake records
    stream_tcp: correct labeling of in-sequence and out-of-sequence packets
    stream_tcp: persist disable_reassembly in Flow
    stream_tcp: set packet direction flag based on direction saved in reassembly state


[close]

http://www.snort.org/
Titel: Snort 3.1.84.0
Beitrag von: SiLæncer am 12 April, 2024, 11:00
Changelog


Dependencies:

    No 'new' dependencies introduced

Changes in this release since 3.1.84.0:

    appid: enhanced appid config parsing
    appid: remove locks from peg counts
    appid: separate main thread and packet thread appid_pub_id
    dce_smb: fixing an ASAN memory corruption issue
    detection: handle policy changes in continuation
    framework: add correct cast from double to unsigned
    http_inspect: add file_data to buffer list
    packet_capture: include cstdint in a header file. Thanks to Plup plup@plup.io and Hauke Mehrtens hauke@hauke-m.de for reporting this!
    xhash: fixed typo

[close]

http://www.snort.org/