./net/snort, The Open Source Network Intrusion Detection System

[ CVSweb ] [ Homepage ] [ RSS ] [ Required by ] [ Add to tracker ]


Branch: CURRENT, Version: 2.9.15.1nb3, Package name: snort-2.9.15.1nb3, Maintainer: pkgsrc-users

Snort is a libpcap-based packet sniffer/logger which can be used
as a lightweight network intrusion detection system. It features
rules based logging and can perform protocol analysis, content
searching/matching and can be used to detect a variety of attacks
and probes, such as buffer overflows, stealth port scans, CGI
attacks, SMB probes, OS fingerprinting attempts, and much more.

Snort has a real-time alerting capability, with alerts being sent
to syslog or a separate "alert" file. As of version 1.1 it can
also send WinPopup messages via Samba.


Required to run:
[net/libdnet] [security/openssl] [devel/pcre] [lang/LuaJIT2] [www/nghttp2] [net/daq]

Required to build:
[devel/flex] [devel/bison] [pkgtools/cwrappers]

Master sites:

SHA1: dc8c89125c27153ffd69f27fbd60b95b9d1cbfe0
RMD160: 10ed066819c6021367245f59598509aeaeaef197
Filesize: 6463.866 KB

Version history: (Expand)


CVS history: (Expand)


   2020-05-22 12:56:49 by Adam Ciarcinski | Files touched by this commit (624)
Log message:
revbump after updating security/nettle
   2020-05-06 16:05:09 by Adam Ciarcinski | Files touched by this commit (591) | Package updated
Log message:
revbump after boost update
   2020-04-25 22:13:50 by Roland Illig | Files touched by this commit (1)
Log message:
net/snort: clean up SUBST_FILES

src/snort.c neither contains "/usr" nor "../".
   2020-03-08 17:51:54 by Thomas Klausner | Files touched by this commit (2833)
Log message:
*: recursive bump for libffi
   2020-02-19 00:00:26 by Sevan Janiyan | Files touched by this commit (5) | Package updated
Log message:
Update to Snort 2.9.15.1

2019-12-15 - Snort 2.9.15.1
New Additions

    Added support for glibc version 2.30.

Improvements/Fix

    Fixed Snort core seen during SSL re-configuration.
    Fixed file access issues on files from SMB share.

Snort 2.9.15.0
New Additions

    Added new debugs to print detection, file_processing and Preproc time
consumption info and verdict.
    Added support to detect new Korean file formats .egg and .alg in the file
preprocessor.
    Added support to detect new RAR file-type in the file preprocessor.

Improvements / Fix

    Fix to generate ALERT if TEID value is zero in GTP v1 and v2 packets.
    Fix to whitelist FTP data sessions when no file policy exists.
    Fix RTF file magic to a more generic value to prevent evasions.
    Added debug logs during HTTP reload.
    Added rule SID check during validation.
    Fix an issue where HTTP was processing non-HTTP traffic on port 443.
    Added new debugs to print detection, file processing, and Prepro time
consumption info and verdicts.

Snort 2.9.14.1
[*] New Additions

 * Added support for wild card port numbers in host cache and overwriting port
service AppId.

 * Added support for new STLS client patterns to help better detect POP3S over
SSL.

 * Added support for detecting Mac based SMTP Microsoft Outlook client
application.

 * Added a new preprocessor alert 120:27 to alert if there is no proper end of
header.

[*] Improvements / Fix

 * Improved appId detection for proxied traffic.

 * Fix for enabling flow profiling mode without restarting snort detection
engine.

 * Fixed packet drop scenario.

Snort 2.9.13.0
New Additions

    Snort now supports reload on snort rules update.
    Addition of a scenario to add a packet to blacklist verdict to ensure the
new session will be allowed.
    Handled a new pre-processor alert in case of the improper end of t HTTP
header.

Improvements

    Modified the calculation of file hash for FTP/HTTP with offset values.
    Fixed portal authentication connection stuck in half closed state.
    Updated UDP global timeout for a non-standard port.

This release also patched the following two vulnerabilities:
https://tools.cisco.com/security/center … -smb-snort

Snort 2.9.12.0
New Additions

    Parsing HTTP CONNECT to extract the tunnel IP and port information.
    Alerting and dechunking for chunked encoding in HTTP1.0 request and
response.

Improvements

    Fixed an issue where, if we have a junk line before HTTP response header,
the header was wrongly parsed.
    Fixed GZIP evasions where an HTTP response with content-encoding:gzip
contains a body that has a GZIP-related anomaly.
    Fixed an issue in certain scenarios where a BitTorrent pattern is seen
only on the third packet of the session, causing us to miss our client
detection.
    SMB improvements for file detection and processing.

2017-12-06 - Snort 2.9.11.1
New Additions

    Added support to block portscan. In addition to tracking the scanning
packets, action(drop/sdrop/reject) will be taken for all the packets, which
means Snort will block the packet and generate logs.
    Added support to re-evaluate reputation after reputation update for all
flows except those that have already been blacklisted.

Improvements

    Fixed issue to detect RTP up to two SSRC switches in each traffic
direction.
    Fixed issues related to HTTP POST header flushing, calling file processing
directly if it is not a multipart header and changes to avoid expensive copy
of segment data by not splitting them when flushing headers.
    Fixed issue of triggering protocol sweep alert when there are multiple
destinations from single source ip protocol scan.
    Added changes to fix IP portscan for protocol other than ICMP and fixed
issue of bad fragment size event not being generated for oversized packets.
    Added changes to use raw data in case of PDF and SWF files during file
processing for SHA calculation and Malware Cloud Lookup.
    Fixed issue of correct session matching for TCP SYN packets without window
scale option so that FTP data channels match the same rule as FTP control
channels.
    Fixed issue of applying new configuration in file inspection after Snort
reload.

Snort 2.9.11
[*] New additions

    Changes to eliminate Snort restart when there are changes to the memory
allocated for preprocessors, by releasing unused or least recently used memory
when needed.
    Added support for storing filenames in Unicode for SMB protocol.
    Added implementation of hostPortCache versioning for unknown flows in
AppID to detect and block BitTorrent.

[*] Improvements

    Enhanced RTSP metadata parsing to match the user-agent field to detect
RTSP traffic over Windows Media.
    Performance improvement when SYN rate limit has reached and drop is
configured as next action
    Control-socket and side-channel support for FreeBSD platform.
    Fixed issue in file signature lookup for retransmitted FTP packet.
    Enhanced the processing of SIP/RTP future flows without ignoring them.
    Changes made in PDF/SWF decompression by adding boundary to the size of
the decompressed data.
    Added a null check to prevent copy unless debugHostIp is configured in
AppId.
    Fixed issue where FTP file type block doesn't work for retried download.
    Resolved issue where Snort is inappropriately handling traffic for which
AppId was creating future flow.
    Performance improvements for SIP/RTP audio and video data flow in AppId.
    Performance and stability improvements in FTP preprocessor like incorrect
referencing of ftp_data_session after its pruned.
    Stability improvement by resolving valgrind reported issues in AppId.
    Improved flushing mechanism for HTTP POST header.
    Added changes to display AppId for IPv6 unified events.
    Fixed issues with printing of messages for out-of-order packets.
    Fixed issue in increment of detection filter counter when rule is used in
multiple configurations.
    Fixed dynamic preprocessor compilation failure in OpenBSD platform.
    Added changes to improve performance of ipvar list comparison.
    Enhanced SMTP client detection by allowing line folding and all
authentication methods.
   2019-07-21 00:46:59 by Thomas Klausner | Files touched by this commit (595)
Log message:
*: recursive bump for nettle 3.5.1
   2018-07-04 15:40:45 by Jonathan Perkin | Files touched by this commit (423)
Log message:
*: Move SUBST_STAGE from post-patch to pre-configure

Performing substitutions during post-patch breaks tools such as mkpatches,
making it very difficult to regenerate correct patches after making changes,
and often leading to substituted string replacements being committed.
   2018-04-18 00:29:53 by Thomas Klausner | Files touched by this commit (286)
Log message:
Add p11-kit to gnutls/bl3.mk and bump dependencies.