From: Russ Combs
-bool output.wide_hex_dump = false: output 20 bytes per lines instead of 16 when dumping buffers
+bool output.wide_hex_dump = true: output 20 bytes per lines instead of 16 when dumping buffers
+int snort.--pause-after-n: <count> pause after count packets { 1:max53 }
+
string snort.--pcap-file: <file> file that contains a list of pcaps to read - read mode is implied
-string snort.--plugin-path: <path> where to find plugins
+implied snort.--piglet: enable piglet test harness mode
+
+string snort.--plugin-path: <path> a colon separated list of directories or plugin libraries
+string snort.--catch-test: comma separated list of cat unit test tags or all
+
implied snort.--version: show version number (same as -V)
+int appid.first_decrypted_packet_debug = 0: the first packet of an already decrypted SSL flow (debug single session only) { 0:max32 } +
+int appid.memcap = 1048576: max size of the service cache before we start pruning the cache { 1024:maxSZ }
binder[].use.name: symbol name (defaults to
What: cip inspection
Type: inspector
Usage: inspect
Configuration:
+string cip.embedded_cip_path = false: check embedded CIP path +
++int cip.unconnected_timeout = 300: unconnected timeout in seconds { 0:360 } +
++int cip.max_cip_connections = 100: max cip connections { 1:10000 } +
++int cip.max_unconnected_messages = 100: max unconnected cip messages { 1:10000 } +
+Rules:
+148:1 (cip) CIP data is malformed. +
++148:2 (cip) CIP data is non-conforming to ODVA standard. +
++148:3 (cip) CIP connection limit exceeded. Least recently used connection removed. +
++148:4 (cip) CIP unconnected request limit exceeded. Oldest request removed. +
+Peg counts:
+cip.packets: total packets (sum) +
++cip.session: total sessions (sum) +
++cip.concurrent_sessions: total concurrent SIP sessions (now) +
++cip.max_concurrent_sessions: maximum concurrent SIP sessions (max) +
+What: log selected published data to data.log
Type: inspector
What: HTTP/2 inspector
Type: inspector
Usage: inspect
Configuration:
+bool http2_inspect.test_input = false: read HTTP/2 messages from text file +
++bool http2_inspect.test_output = false: print out HTTP section data +
++int http2_inspect.print_amount = 1200: number of characters to print from a Field { 1:max53 } +
++bool http2_inspect.print_hex = false: nonprinting characters printed in [HH] format instead of using an asterisk +
++bool http2_inspect.show_pegs = true: display peg counts with test output +
++bool http2_inspect.show_scan = false: display scanned segments +
+Rules:
+bool http_inspect.test_input = false: read HTTP messages from text file +
++bool http_inspect.test_output = false: print out HTTP section data +
++int http_inspect.print_amount = 1200: number of characters to print from a Field { 1:max53 } +
++bool http_inspect.print_hex = false: nonprinting characters printed in [HH] format instead of using an asterisk +
++bool http_inspect.show_pegs = true: display peg counts with test output +
++bool http_inspect.show_scan = false: display scanned segments +
+Rules:
-enum reject.reset: send TCP reset to one or both ends { source|dest|both } +enum reject.reset = both: send TCP reset to one or both ends { none|source|dest|both }
-enum reject.control: send ICMP unreachable(s) { network|host|port|forward|all } +enum reject.control = none: send ICMP unreachable(s) { none|network|host|port|forward|all }
What: detection option to match CIP attribute
Type: ips_option
Usage: detect
Configuration:
+interval cip_attribute.~range: match CIP attribute { 0:65535 } +
+What: detection option to match CIP class
Type: ips_option
Usage: detect
Configuration:
+interval cip_class.~range: match CIP class { 0:65535 } +
+What: detection option to match CIP Connection Path Class
Type: ips_option
Usage: detect
Configuration:
+interval cip_conn_path_class.~range: match CIP Connection Path Class { 0:65535 } +
+What: detection option to match CIP instance
Type: ips_option
Usage: detect
Configuration:
+interval cip_instance.~range: match CIP instance { 0:4294967295 } +
+What: detection option to match CIP request
Type: ips_option
Usage: detect
What: detection option to match CIP response
Type: ips_option
Usage: detect
What: detection option to match CIP service
Type: ips_option
Usage: detect
Configuration:
+interval cip_service.~range: match CIP service { 0:127 } +
+What: detection option to match CIP response status
Type: ips_option
Usage: detect
Configuration:
+interval cip_status.~range: match CIP response status { 0:255 } +
+What: general rule option for rule classification
Type: ips_option
What: detection option to match CIP Enip Command
Type: ips_option
Usage: detect
Configuration:
+interval enip_command.~range: match CIP Enip Command { 0:65535 } +
+What: detection option to match ENIP Request
Type: ips_option
Usage: detect
What: detection option to match ENIP response
Type: ips_option
Usage: detect
What: rule option to set detection cursor to file data
Type: ips_option
+--print-binding-order + Print sorting priority used when generating binder table +
+--print-differences Same as -d. output the differences, and only the differences, between the Snort and Snort++ configurations to the <out_file> @@ -24318,6 +24604,11 @@ these libraries see the Getting Started section of the manual.
+--pause-after-n <count> pause after count packets (1:max53) +
+--pcap-file <file> file that contains a list of pcaps to read - read mode is implied
---plugin-path <path> where to find plugins +--piglet enable piglet test harness mode +
++--plugin-path <path> a colon separated list of directories or plugin libraries
+--catch-test comma separated list of cat unit test tags or all +
+--version show version number (same as -V)
+int appid.first_decrypted_packet_debug = 0: the first packet of an already decrypted SSL flow (debug single session only) { 0:max32 } +
+int appid.instance_id = 0: instance id - ignored { 0:max32 }
+interval cip_attribute.~range: match CIP attribute { 0:65535 } +
++interval cip_class.~range: match CIP class { 0:65535 } +
++interval cip_conn_path_class.~range: match CIP Connection Path Class { 0:65535 } +
++string cip.embedded_cip_path = false: check embedded CIP path +
++interval cip_instance.~range: match CIP instance { 0:4294967295 } +
++int cip.max_cip_connections = 100: max cip connections { 1:10000 } +
++int cip.max_unconnected_messages = 100: max unconnected cip messages { 1:10000 } +
++interval cip_service.~range: match CIP service { 0:127 } +
++interval cip_status.~range: match CIP response status { 0:255 } +
++int cip.unconnected_timeout = 300: unconnected timeout in seconds { 0:360 } +
+
string classifications[].name: name used with classtype rule option
+interval enip_command.~range: match CIP Enip Command { 0:65535 } +
+bool esp.decode_esp = false: enable for inspection of esp traffic that has authentication but not encryption
host_tracker[].services[].proto: IP protocol
+int http2_inspect.print_amount = 1200: number of characters to print from a Field { 1:max53 } +
++bool http2_inspect.print_hex = false: nonprinting characters printed in [HH] format instead of using an asterisk +
++bool http2_inspect.show_pegs = true: display peg counts with test output +
++bool http2_inspect.show_scan = false: display scanned segments +
++bool http2_inspect.test_input = false: read HTTP/2 messages from text file +
++bool http2_inspect.test_output = false: print out HTTP section data +
+implied http_cookie.request: match against the cookie from the request message even when examining the response
+int http_inspect.print_amount = 1200: number of characters to print from a Field { 1:max53 } +
++bool http_inspect.print_hex = false: nonprinting characters printed in [HH] format instead of using an asterisk +
+int http_inspect.request_depth = -1: maximum request message body bytes to examine (-1 no limit) { -1:max53 }
+bool http_inspect.show_pegs = true: display peg counts with test output +
++bool http_inspect.show_scan = false: display scanned segments +
+bool http_inspect.simplify_path = true: reduce URI directory path to simplest form
+bool http_inspect.test_input = false: read HTTP messages from text file +
++bool http_inspect.test_output = false: print out HTTP section data +
+bool http_inspect.unzip = true: decompress gzip and deflate message bodies
-bool output.wide_hex_dump = false: output 20 bytes per lines instead of 16 when dumping buffers +bool output.wide_hex_dump = true: output 20 bytes per lines instead of 16 when dumping buffers
-enum reject.control: send ICMP unreachable(s) { network|host|port|forward|all } +enum reject.control = none: send ICMP unreachable(s) { none|network|host|port|forward|all }
-enum reject.reset: send TCP reset to one or both ends { source|dest|both } +enum reject.reset = both: send TCP reset to one or both ends { none|source|dest|both }
+string snort.--catch-test: comma separated list of cat unit test tags or all +
+string snort.-c: <conf> use this configuration
+int snort.--pause-after-n: <count> pause after count packets { 1:max53 } +
+implied snort.--pause: wait for resume/quit command before processing packets/terminating
-string snort.--plugin-path: <path> where to find plugins +implied snort.--piglet: enable piglet test harness mode +
++string snort.--plugin-path: <path> a colon separated list of directories or plugin libraries
+cip.concurrent_sessions: total concurrent SIP sessions (now) +
++cip.max_concurrent_sessions: maximum concurrent SIP sessions (max) +
++cip.packets: total packets (sum) +
++cip.session: total sessions (sum) +
+daq.allow: total allow verdicts (sum)
+148: cip +
+149: s7commplus
+148:1 (cip) CIP data is malformed. +
++148:2 (cip) CIP data is non-conforming to ODVA standard. +
++148:3 (cip) CIP connection limit exceeded. Least recently used connection removed. +
++148:4 (cip) CIP unconnected request limit exceeded. Oldest request removed. +
+149:1 (s7commplus) length in S7commplus MBAP header does not match the length needed for the given S7commplus function
+cip (inspector): cip inspection +
++cip_attribute (ips_option): detection option to match CIP attribute +
++cip_class (ips_option): detection option to match CIP class +
++cip_conn_path_class (ips_option): detection option to match CIP Connection Path Class +
++cip_instance (ips_option): detection option to match CIP instance +
++cip_req (ips_option): detection option to match CIP request +
++cip_rsp (ips_option): detection option to match CIP response +
++cip_service (ips_option): detection option to match CIP service +
++cip_status (ips_option): detection option to match CIP response status +
+ciscometadata (codec): support for cisco metadata
+enip_command (ips_option): detection option to match CIP Enip Command +
++enip_req (ips_option): detection option to match ENIP Request +
++enip_rsp (ips_option): detection option to match ENIP response +
+erspan2 (codec): support for encapsulated remote switched port analyzer - type 2
+inspector::cip: cip inspection +
+inspector::data_log: log selected published data to data.log
+ips_option::cip_attribute: detection option to match CIP attribute +
++ips_option::cip_class: detection option to match CIP class +
++ips_option::cip_conn_path_class: detection option to match CIP Connection Path Class +
++ips_option::cip_instance: detection option to match CIP instance +
++ips_option::cip_req: detection option to match CIP request +
++ips_option::cip_rsp: detection option to match CIP response +
++ips_option::cip_service: detection option to match CIP service +
++ips_option::cip_status: detection option to match CIP response status +
+ips_option::classtype: general rule option for rule classification
+ips_option::enip_command: detection option to match CIP Enip Command +
++ips_option::enip_req: detection option to match ENIP Request +
++ips_option::enip_rsp: detection option to match ENIP response +
+ips_option::file_data: rule option to set detection cursor to file data
+piglet::pp_codec: Codec piglet +
++piglet::pp_inspector: Inspector piglet +
++piglet::pp_ips_action: Ips action piglet +
++piglet::pp_ips_option: Ips option piglet +
++piglet::pp_logger: Logger piglet +
++piglet::pp_search_engine: Search engine piglet +
++piglet::pp_so_rule: SO rule piglet +
++piglet::pp_test: Test piglet +
+search_engine::ac_banded: Aho-Corasick Banded (high memory, moderate performance)