Snort 2.9.4.0 has been released!
Snort® is an open source network intrusion prevention and detection system (IDS/IPS) developed by Sourcefire. Combining the benefits of signature, protocol, and anomaly-based inspection, Snort is the most widely deployed IDS/IPS technology worldwide. With millions of downloads and nearly 400,000 registered users, Snort has become the de facto standard for IPS.
Snort 2.9.4 is now available on snort.org, at http://www.snort.org/snort- downloads/ in the Latest Release section.
************ Please note: 2.9.3.1 & later packages are signed with a new PGP key (that key is signed with the previous key). ************
Snort 2.9.4 includes changes for the following:
[*] New additions
* Consolidation of IPv6 -- now only a single build supports both IPv4 & IPv6, and removal of the IPv4 "only" code paths.
* File API and improvements to file processing for HTTP downloads and email attachments via SMTP, POP, and IMAP to facilitate broader file support
* Use of address space ID for tracking Frag & Stream connections when it is available with the DAQ
* Logging of packet data that triggers PPM for post-analysis via Snort event
* Decoding of IPv6 with PPPoE
* Added an API call to add a service to a host in the attribute table. Remove the unused live attribute update code.
[*] Improvements
* Update to Stream5 PAF for handling gaps in the sequence numbers of packets being reassembled.
* Selection of the Stream TCP policy based on the server rather than the destination of first packet seen by Snort
* Allow disabling of global thresholds via a count of -1
* Prevent blocking duplicate SYNs when using inline normalization
* Add SSLv3 backwards compatibility support for SSLv2 ClientHello messages
* Allow active responses to packets without data (eg, a TCP SYN)
* Changed logic of option evaluations for shared library rules that use a custom evaluation function to match that of the builtin logic when the NOT_FLAG is used. The 'NOT' matching now happens within each of the individual rule option evaluation functions.
* Updated SMTP preprocessor to better handle commands that have corresponding data on a subsequent line to reduce false positives. 3 commands fall into this category - X-EXPS, XEXCH50, and BDAT.
* Improve support for encapsulated & tunneling protocols to block or fastpath a connection within the tunnel rather applying that to the whole tunnel.
Please see the Release Notes and ChangeLog for more details.
Source-
http://blog.snort.org/2012/12/snort-2940-has-been-released.html?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+Snort+%28Snort%29
Snort 2.9.4 is now available on snort.org, at http://www.snort.org/snort-
************ Please note: 2.9.3.1 & later packages are signed with a new PGP key (that key is signed with the previous key). ************
Snort 2.9.4 includes changes for the following:
[*] New additions
* Consolidation of IPv6 -- now only a single build supports both IPv4 & IPv6, and removal of the IPv4 "only" code paths.
* File API and improvements to file processing for HTTP downloads and email attachments via SMTP, POP, and IMAP to facilitate broader file support
* Use of address space ID for tracking Frag & Stream connections when it is available with the DAQ
* Logging of packet data that triggers PPM for post-analysis via Snort event
* Decoding of IPv6 with PPPoE
* Added an API call to add a service to a host in the attribute table. Remove the unused live attribute update code.
[*] Improvements
* Update to Stream5 PAF for handling gaps in the sequence numbers of packets being reassembled.
* Selection of the Stream TCP policy based on the server rather than the destination of first packet seen by Snort
* Allow disabling of global thresholds via a count of -1
* Prevent blocking duplicate SYNs when using inline normalization
* Add SSLv3 backwards compatibility support for SSLv2 ClientHello messages
* Allow active responses to packets without data (eg, a TCP SYN)
* Changed logic of option evaluations for shared library rules that use a custom evaluation function to match that of the builtin logic when the NOT_FLAG is used. The 'NOT' matching now happens within each of the individual rule option evaluation functions.
* Updated SMTP preprocessor to better handle commands that have corresponding data on a subsequent line to reduce false positives. 3 commands fall into this category - X-EXPS, XEXCH50, and BDAT.
* Improve support for encapsulated & tunneling protocols to block or fastpath a connection within the tunnel rather applying that to the whole tunnel.
Please see the Release Notes and ChangeLog for more details.
Source-
http://blog.snort.org/2012/12/snort-2940-has-been-released.html?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+Snort+%28Snort%29
Snort Downloads
If you are using RHEL5, CentOS 5.5, or Fedora Core 11, please click here.
The Snort Engine is distributed both as source code and binaries for popular Linux distributions and Windows. It’s important to note that the The Snort Engine and Snort Rules are distributed separately.
- » Latest Release
- » Latest Development Release
- » PGP Information
- » Download from the command line
- » Snort Add-Ons and Other Cool Projects
Latest Release
We strongly recommend that you keep pace with the latest production release. Snort is evolving all the time and to stay current with latest detection capabilities you should always have both your Snort engine and ruleset up to date.