[Snort-devel] Snort 2.9.7 is now available
snortreleases at ...835...
Thu Oct 23 13:30:11 EDT 2014
Snort 2.9.7 is now available on snort.org at
http://www.snort.org/downloads in the Snort Stable Release section.
A new DAQ build is also available that updates support for a few
Snort 2.9.7 includes a major new feature for Application Identification,
our OpenAppID capability.
In conjunction with this release, are shifting the license for the OpenAppId
content to GPLv2 to encourage more use and submission back to Cisco. If
you are interested in learning and writing OpenAppId content, please join
us on the OpenAppId mailing list at https://www.snort.org/community.
Any submissions to the OpenAppId ecosystem will receive public thanks
and perhaps some nice swag!
2014-10-24 - Snort 126.96.36.199
[*] New additions
* Application Identification Preprocessor, when used in conjunction with
OpenAppID detector content, that will identify application protocol,
client, server, and web applications (including those using SSL) and
include the info in Snort alert data. In addition, a new rule option
keyword 'appid' that can be used to constrain Snort rules based on one
or more applications that are identified for the connection. Separate
prepackaged RPMs with App Open ID are available. See README.appid
for further details.
* A new protected_content rule option that is used to match against a
content that is hashed. It can be used to obscure the full context
of the rule from the administrator.
* Protocol Aware Flushing (PAF) improvements for SMTP, POP, and IMAP to
more accurately process different portions of email messages and file
* Added ability to test normalization behavior without modifying
network traffic. When configured using na_policy_mode:inline-test,
statistics will be gathered on packet normalizations that would have
occurred, allowing less disruptive testing of inline deployments.
* The HTTP Inspection preprocessor now has the ability to decompress
DEFLATE and LZMA compressed flash content and DEFLATE compressed PDF
content from http responses when configured with the new
decompress_swf and decompress_pdf options. This enhancement can be
used with existing rule options that already match against
* Added improved XFF support to HttpInspect. It is now possible to
specify custom HTTP headers to use in place of 'X-Forwarded-For'. In
situations where traffic may contain multiple XFF-like headers, it is
possible to specify which headers hold precedence.
* Added additional support for Heartbleed detection within the SSL
preprocessor to improve performance.
* Added control socket command to dump packets to a file. See
README.snort_dump_packets_control for details.
* Added an option to suppress configuration information logging to output.
* The Stream5 preprocessor functionality is now split between the new
Session and Stream6 preprocessors.
* Maximum IP6 extensions decoded is now configurable.
* Update active response to allow for responses of 1500+ bytes that span
multiple TCP packets.
* Check limits of multiple configurations to not exceed a maximum ID of
* Updated the error output of byte_test, byte_jump, byte_extract to
including details on offending options for a given rule.
* Update build and install scripts to install preprocessor and engine
libraries into user specified libdir.
* Improved performance of IP Reputation preprocessor.
* The control socket will now report success when reloading empty IP
* All TCP normalizations can now be enabled individually. See
README.normalize for details on using the new options. For
consistency with other options, the "urp" tcp normalization keyword
now enables the normalization instead of disabling it.
* Lowered memory demand of Unicode -> ASCII mapping in HttpInspect.
* Updated profiler output to remove duplicate results when using
* Improved performance of FTP reassembly.
* Improved compatibility with Mac OSX 10.9 (Mavericks), OpenBSD,
FreeBSD, and DragonFlyBSD
More information about the Snort-devel