if (!config)
return;
- LogMessage("%s\n", FILE_ID_NAME);
LogMessage(" capture_memcap: %zu MB\n", config->capture_memcap);
LogMessage(" capture_max_size: %zu bytes\n", config->capture_max_size);
LogMessage(" capture_min_size: %zu bytes\n", config->capture_min_size);
void FileLog::show(SnortConfig*)
{
- LogMessage("%s config:\n", s_name);
LogMessage(" Log system time: %s\n", config.log_sys_time ? "true" : "false");
LogMessage(" Log packet time: %s\n", config.log_pkt_time ? "true" : "false");
}
return;
for ( auto* p : pi->framework_policy->ilist )
+ {
+ std::string inspector_name(p->pp_class.api.base.name);
+ if ( !p->name.empty() )
+ inspector_name += " (" + p->name + "):";
+ else
+ inspector_name += ":";
+ LogLabel(inspector_name.c_str());
p->handler->show(sc);
+ }
}
//-------------------------------------------------------------------------
}
}
- if ( s_current != key )
+ string unique_key = key;
+ if ( !s_name.empty() )
+ unique_key = s_name;
+
+ if ( s_current != unique_key )
{
if ( fqn != orig )
LogMessage("\t%s (%s)\n", key.c_str(), orig);
else
LogMessage("\t%s\n", key.c_str());
- s_current = key;
+ s_current = unique_key;
}
if ( !begin(m, p, s, idx, 0) )
void AppIdInspector::show(SnortConfig*)
{
- LogMessage("%s\n", MOD_NAME);
-
LogMessage(" Detector Path: %s\n", config->app_detector_dir);
LogMessage(" appStats Logging: %s\n", config->stats_logging_enabled ? "enabled" :
"disabled");
ArpSpoof(ArpSpoofModule*);
~ArpSpoof() override;
- void show(SnortConfig*) override;
void eval(Packet*) override;
private:
delete config;
}
-void ArpSpoof::show(SnortConfig*)
-{
- LogMessage("arpspoof configured\n");
-
-}
-
void ArpSpoof::eval(Packet* p)
{
Profile profile(arpPerfStats);
Binder(vector<Binding*>&);
~Binder() override;
- void show(SnortConfig*) override
- { LogMessage("Binder\n"); }
-
void remove_inspector_binding(SnortConfig*, const char*) override;
bool configure(SnortConfig*) override;
void Normalizer::show(SnortConfig* sc)
{
- LogMessage("Normalizer config:\n");
Print_IP4(sc, &config);
Print_IP6(sc, &config);
Print_ICMP4(&config);
void PerfMonitor::show(SnortConfig*)
{
- LogMessage("PerfMonitor config:\n");
LogMessage(" Sample Time: %d seconds\n", config->sample_interval);
LogMessage(" Packet Count: %d\n", config->pkt_cnt);
LogMessage(" Max File Size: " STDu64 "\n", config->max_file_size);
{
char buf[STD_BUF + 1];
- LogMessage("Portscan Detection Config:\n");
SnortSnprintf(buf, sizeof(buf), " Detect Protocols: ");
if ( config->detect_scans & PS_PROTO_TCP )
{
assert(config);
- LogMessage("%s\n", REPUTATION_NAME);
print_iplist_stats(config);
LogMessage(" Memcap: %d %s \n",
void RnaInspector::show(SnortConfig*)
{
- LogMessage("RNA Configuration\n");
-
if (mod_conf)
{
if (!mod_conf->rna_conf_path.empty())
{
public:
BackOrifice() = default;
-
- void show(SnortConfig*) override;
+
void eval(Packet*) override;
};
-void BackOrifice::show(SnortConfig*)
-{
- LogMessage("%s\n", s_name);
-}
-
void BackOrifice::eval(Packet* p)
{
Profile profile(boPerfStats);
{
if (config == nullptr)
return;
- LogMessage("CIP config: \n");
LogMessage(" Embedded Enabled: %s\n",
config->embedded_cip_enabled ? "ENABLED" : "DISABLED");
if (config->embedded_cip_enabled)
void print_dce2_smb_conf(dce2SmbProtoConf& config)
{
- LogMessage("DCE SMB config: \n");
-
print_dce2_co_config(config.common);
LogMessage(" SMB fingerprint policy : %s\n",
dce2SmbFingerprintPolicyStrings[config.smb_fingerprint_policy]);
void print_dce2_tcp_conf(dce2TcpProtoConf& config)
{
- LogMessage("DCE TCP config: \n");
print_dce2_co_config(config.common);
}
void print_dce2_udp_conf(dce2UdpProtoConf& config)
{
- LogMessage("DCE UDP config: \n");
print_dce2_common_config(config.common);
}
void print_dnp3_conf(const dnp3ProtoConf& config)
{
- LogMessage("DNP3 config: \n");
LogMessage(" Check CRC: %s\n",
config.check_crc ?
"ENABLED" : "DISABLED");
public:
Dns(DnsModule*);
- void show(SnortConfig*) override;
void eval(Packet*) override;
};
Dns::Dns(DnsModule*)
{ }
-void Dns::show(SnortConfig*)
-{
- LogMessage("DNS\n");
-}
-
void Dns::eval(Packet* p)
{
// precondition - what we registered for
FTP_SERVER_PROTO_CONF* ftp_server;
};
-FtpServer::FtpServer(FTP_SERVER_PROTO_CONF* server)
-{
- ftp_server = server;
-}
+FtpServer::FtpServer(FTP_SERVER_PROTO_CONF* server) :
+ ftp_server(server)
+{}
FtpServer::~FtpServer ()
{
return FTPP_INVALID_ARG;
}
- LogMessage(FTP_SERVER_NAME ":\n");
-
PrintConfOpt(ServerConf->telnet_cmds, "Check for Telnet Cmds");
PrintConfOpt(ServerConf->ignore_telnet_erase_cmds, "Ignore Telnet Cmd Operations");
LogMessage(" Ignore open data channels: %s\n",
return FTPP_INVALID_ARG;
}
- LogMessage(" TELNET CONFIG:\n");
LogMessage(" Are You There Threshold: %d\n",
TelnetConf->ayt_threshold);
LogMessage(" Normalize: %s\n", TelnetConf->normalize ? "YES" : "NO");
bool get_fp_buf(snort::InspectionBuffer::Type ibt, snort::Packet* p,
snort::InspectionBuffer& b) override;
bool configure(snort::SnortConfig*) override;
- void show(snort::SnortConfig*) override { snort::LogMessage("Http2Inspect\n"); }
void eval(snort::Packet* p) override;
void clear(snort::Packet* p) override;
Http2StreamSplitter* get_splitter(bool is_client_to_server) override
void HttpInspect::show(snort::SnortConfig*)
{
assert(params);
- LogMessage("http_inspect\n");
if ( params->request_depth == -1 )
LogMessage(" request_depth: " "%s" "\n", "unlimited");
if (config == nullptr)
return;
- LogMessage("IMAP config: \n");
-
config->decode_conf.print_decode_conf();
LogMessage("\n");
if (config == nullptr)
return;
- LogMessage("POP config: \n");
-
config->decode_conf.print_decode_conf();
LogMessage("\n");
public:
RpcDecode(RpcDecodeModule*);
- void show(SnortConfig*) override;
-
void eval(Packet*) override;
void clear(Packet*) override;
{
}
-void RpcDecode::show(SnortConfig*)
-{
- LogMessage("rpc_decode\n");
-}
-
/*
* Purpose: Inspects the packet's payload for fragment records and
* converts them into one unfragmented record.
SIPMethodNode* method;
if (config == nullptr)
return;
- LogMessage("SIP config: \n");
LogMessage(" Max number of dialogs in a session: %d %s \n",
config->maxNumDialogsInSession,
config->maxNumDialogsInSession
char buf[8192];
int alert_count = 0;
- LogMessage("SMTP Config:\n");
snprintf(buf, sizeof(buf) - 1, " Normalize: ");
if (config->normalize == NORMALIZE_ALL)
if ( !config )
return;
- LogMessage("SSH config: \n");
-
LogMessage(" Max Encrypted Packets: %d\n", config->MaxEncryptedPackets);
LogMessage(" Max Server Version String Length: %d\n", config->MaxServerVersionLen);
LogMessage(" MaxClientBytes: %d\n", config->MaxClientBytes);
{
if (config == nullptr)
return;
- LogMessage("SSL config:\n");
if ( config->trustservers )
{
LogMessage(" Server side data is trusted\n");
Wizard(WizardModule*);
~Wizard() override;
- void show(SnortConfig*) override
- { LogMessage("Wizard\n"); }
-
void eval(Packet*) override;
StreamSplitter* get_splitter(bool) override;
void StreamBase::show(SnortConfig*)
{
- LogMessage("Stream Base config:\n");
LogMessage(" Max flows: %d\n", config.flow_cache_cfg.max_flows);
LogMessage(" Pruning timeout: %d\n", config.flow_cache_cfg.pruning_timeout);
}
static void icmp_show(StreamIcmpConfig* pc)
{
- LogMessage("Stream ICMP config:\n");
LogMessage(" Timeout: %d seconds\n", pc->session_timeout);
}
static void FragPrintEngineConfig(FragEngine* engine)
{
- LogMessage("Defrag engine config:\n");
LogMessage(" engine-based policy: %s\n",
frag_policy_names[engine->frag_policy]);
LogMessage(" Fragment timeout: %d seconds\n",
static void ip_show(StreamIpConfig* pc)
{
- LogMessage("Stream IP config:\n");
LogMessage(" Timeout: %d seconds\n", pc->session_timeout);
}
void TcpStreamConfig::show_config(const TcpStreamConfig* config)
{
- LogMessage("Stream TCP Policy config:\n");
LogMessage(" Reassembly Policy: %s\n",
reassembly_policy_names[ static_cast<int>( config->reassembly_policy ) ]);
LogMessage(" Timeout: %d seconds\n", config->session_timeout);
static void udp_show(StreamUdpConfig* pc)
{
- LogMessage("Stream UDP config:\n");
LogMessage(" Timeout: %d seconds\n", pc->session_timeout);
#ifdef REG_TEST
static void user_show (StreamUserConfig* pc)
{
- LogMessage("Stream user config:\n");
LogMessage(" Timeout: %d seconds\n", pc->session_timeout);
}