3
0
Fork 0
forked from mirrors/nixpkgs

snort: 2.9.7.0 -> 2.9.7.2

This includes a slight refactor.

2014-11-24 - Snort 2.9.7.2
[*] New additions
* Application Identification Preprocessor, when used in conjunction with
  open app ID detector content, that will identify application protocol,
  client, server, and web applications (including those using SSL) and
  include the info in Snort alert data. In addition, a new rule option
  keyword 'appid' that can be used to constrain Snort rules based on one
  or more applications that are identified for the connection.
  See README.appid for details.

* A new protected_content rule option that is used to match against a content
  that is hashed.  It can be used to obscure the full context of the rule from
  the administrator.

* Protocol Aware Flushing (PAF) improvements for SMTP, POP, and IMAP to
  more accurately process different portions of email messages and file
  attachments.

* Added ability to test normalization behavior without modifying network traffic.
  When configured using na_policy_mode:inline-test, statistics will be gathered
  on packet normalizations that would have occurred, allowing less disruptive
  testing of inline deployments.

* The HTTP Inspection preprocessor now has the ability to decompress
  DEFLATE and LZMA compressed flash content and DEFLATE compressed PDF
  content from http responses when configured with the new decompress_swf
  and decompress_pdf options. This enhancement can be used with existing rule
  options that already match against decompressed equivalents.

* Added improved XFF support to HttpInspect. It is now possible to specify custom
  HTTP headers to use in place of 'X-Fowarded-For'. In situations where traffic may
  contain multiple XFF-like headers, it is possible to specify which headers hold
  precedence.

* Added control socket command to dump packets.

* The Stream5 preprocessor functionality is now split between the new Session and Stream preprocessors.

* Added decoding capaiblity for Cisco FabricPath

[*] Improvements
* Update active response to allow for responses of 1500+ bytes that span
  multiple TCP packets.

* Check limits of multiple configurations to not exceed a maximum ID of 4095.

* Updated the error output of byte_test, byte_jump, byte_extract to
  including details on offending options for a given rule.

* Update build and install scripts to install preprocessor and engine libraries
  into user specified libdir.

* Improved performance of IP Reputation preprocessor.

* The control socket will now report success when reloading empty IP Reputation whitelists/blacklists.

* All TCP normalizations can now be enabled individually. See README.normalize for details on using
  the new options. For consistency with other options, the "urp" tcp normalization keyword now
  enables the normalization instead of disabling it.

* Lowered memory demand of Unicode -> ASCII mapping in HttpInspect.

* Updated profiler output to remove duplicate results when using multiple configurations.

* Improved performance of FTP reassembly.
This commit is contained in:
devhell 2015-03-16 00:07:00 +00:00
parent 79f3689289
commit 77c40224d2

View file

@ -1,12 +1,13 @@
{stdenv, fetchurl, libpcap, pcre, libdnet, daq, zlib, flex, bison}:
stdenv.mkDerivation rec {
name = "snort-2.9.7.0";
version = "2.9.7.2";
name = "snort-${version}";
src = fetchurl {
name = "${name}.tar.gz";
url = "http://www.snort.org/downloads/snort/${name}.tar.gz";
sha256 = "16z4mi7bri7ygvc0j4hhl2pgcw6xwxah1h3wk5vpy2yj8pmayf4p";
sha256 = "1gmlrh9ygpd5h6nnrr4090wk5n2yq2yrvwi7q6xbm6lxj4rcamyv";
};
buildInputs = [ libpcap pcre libdnet daq zlib flex bison ];