From: Russ Combs (rucombs)
-116:450 (decode) bad IP protocol
+116:150 (decode) loopback IP
-116:293 (decode) two or more IP (v4 and/or v6) encapsulation layers present
+116:151 (decode) same src/dst IP
-116:459 (decode) fragment with zero length
+116:293 (decode) two or more IP (v4 and/or v6) encapsulation layers present
-116:150 (decode) loopback IP
+116:449 (decode) unassigned/reserved IP protocol
-116:151 (decode) same src/dst IP
+116:450 (decode) bad IP protocol
-116:449 (decode) unassigned/reserved IP protocol
+116:459 (decode) fragment with zero length
-string ips.rules: snort rules and includes
+bool ips.obfuscate_pii = false: mask all but the last 4 characters of credit card and social security numbers
-bool ips.obfuscate_pii = false: mask all but the last 4 characters of credit card and social security numbers
+string ips.rules: snort rules and includes (may contain states too)
+
+string ips.states: snort rule states and includes (may contain rules too)
-bool output.wide_hex_dump = false: output 20 bytes per lines instead of 16 when dumping buffers
+bool output.wide_hex_dump = true: output 20 bytes per lines instead of 16 when dumping buffers
What: enable/disable and set actions for specific IPS rules What: enable/disable and set actions for specific IPS rules; deprecated, use rule state stubs with enable instead Type: basic Usage: detect Configuration:
-enum
+int search_engine.queue_limit = 128: maximum number of fast pattern matches to queue per packet (0 means no maximum) { 0:max32 }
+ Peg counts:
-search_engine.total_flushed: fast pattern matches discarded due to overflow (sum)
+search_engine.total_flushed: total fast pattern matches processed (sum)
+search_engine.total_overruns: fast pattern matches discarded due to overflow (sum)
+
search_engine.total_unique: total unique fast pattern hits (sum)
+int snort.--pause-after-n: <count> pause after count packets { 1:max53 }
+
string snort.--pcap-file: <file> file that contains a list of pcaps to read - read mode is implied
+implied snort.--piglet: enable piglet test harness mode
+
string snort.--plugin-path: <path> where to find plugins
+string snort.--catch-test: comma separated list of cat unit test tags or all
+
implied snort.--version: show version number (same as -V)
+116:426 (icmp4) truncated ICMP4 header
+
116:434 (icmp4) ICMP ping Nmap
-116:426 (icmp4) truncated ICMP4 header
- Peg counts:
-116:427 (icmp6) truncated ICMPv6 header
+116:285 (icmp6) ICMPv6 packet of type 2 (message too big) with MTU field < 1280
-116:431 (icmp6) ICMPv6 type not decoded
+116:286 (icmp6) ICMPv6 packet of type 1 (destination unreachable) with non-RFC 2463 code
-116:432 (icmp6) ICMPv6 packet to multicast address
+116:287 (icmp6) ICMPv6 router solicitation packet with a code not equal to 0
-116:285 (icmp6) ICMPv6 packet of type 2 (message too big) with MTU field < 1280
+116:288 (icmp6) ICMPv6 router advertisement packet with a code not equal to 0
-116:286 (icmp6) ICMPv6 packet of type 1 (destination unreachable) with non-RFC 2463 code
+116:289 (icmp6) ICMPv6 router solicitation packet with the reserved field not equal to 0
-116:287 (icmp6) ICMPv6 router solicitation packet with a code not equal to 0
+116:290 (icmp6) ICMPv6 router advertisement packet with the reachable time field set > 1 hour
-116:288 (icmp6) ICMPv6 router advertisement packet with a code not equal to 0
+116:427 (icmp6) truncated ICMPv6 header
-116:289 (icmp6) ICMPv6 router solicitation packet with the reserved field not equal to 0
+116:431 (icmp6) ICMPv6 type not decoded
-116:290 (icmp6) ICMPv6 router advertisement packet with the reachable time field set > 1 hour
+116:432 (icmp6) ICMPv6 packet to multicast address
-116:428 (ipv4) IPv4 packet below TTL limit
+116:425 (ipv4) truncated IPv4 header
-116:430 (ipv4) IPv4 packet both DF and offset set
+116:428 (ipv4) IPv4 packet below TTL limit
-116:448 (ipv4) IPv4 reserved bit set
+116:430 (ipv4) IPv4 packet both DF and offset set
-116:425 (ipv4) truncated IPv4 header
+116:448 (ipv4) IPv4 reserved bit set
-116:292 (ipv6) IPv6 header has destination options followed by a routing header
+116:291 (ipv6) IPV6 tunneled over IPv4, IPv6 header truncated, possible Linux kernel attack
-116:291 (ipv6) IPV6 tunneled over IPv4, IPv6 header truncated, possible Linux kernel attack
+116:292 (ipv6) IPv6 header has destination options followed by a routing header
-116:458 (ipv6) bogus fragmentation packet, possible BSD attack
+116:456 (ipv6) too many IPv6 extension headers
-116:461 (ipv6) IPv6 routing type 0 extension header
+116:458 (ipv6) bogus fragmentation packet, possible BSD attack
-116:456 (ipv6) too many IPv6 extension headers
+116:461 (ipv6) IPv6 routing type 0 extension header
-116:419 (tcp) TCP urgent pointer exceeds payload length or no payload
+116:402 (tcp) DOS NAPTHA vulnerability detected
-116:420 (tcp) TCP SYN with FIN
+116:403 (tcp) SYN to multicast address
-116:421 (tcp) TCP SYN with RST
+116:419 (tcp) TCP urgent pointer exceeds payload length or no payload
-116:422 (tcp) TCP PDU missing ack for established session
+116:420 (tcp) TCP SYN with FIN
-116:423 (tcp) TCP has no SYN, ACK, or RST
+116:421 (tcp) TCP SYN with RST
-116:433 (tcp) DDOS shaft SYN flood
+116:422 (tcp) TCP PDU missing ack for established session
-116:446 (tcp) TCP port 0 traffic
+116:423 (tcp) TCP has no SYN, ACK, or RST
-116:402 (tcp) DOS NAPTHA vulnerability detected
+116:433 (tcp) DDOS shaft SYN flood
-116:403 (tcp) SYN to multicast address
+116:446 (tcp) TCP port 0 traffic
+int appid.first_decrypted_packet_debug = 0: the first packet of an already decrypted SSL flow (debug single session only) { 0:max32 }
+
int appid.memcap = 1048576: max size of the service cache before we start pruning the cache { 1024:maxSZ }
What: HTTP/2 inspector Type: inspector Usage: inspect Configuration:
+bool http2_inspect.test_input = false: read HTTP/2 messages from text file
+
+bool http2_inspect.test_output = false: print out HTTP section data
+
+int http2_inspect.print_amount = 1200: number of characters to print from a Field { 1:max53 }
+
+bool http2_inspect.print_hex = false: nonprinting characters printed in [HH] format instead of using an asterisk
+
+bool http2_inspect.show_pegs = true: display peg counts with test output
+
+bool http2_inspect.show_scan = false: display scanned segments
+ Rules:
+bool http_inspect.test_input = false: read HTTP messages from text file
+
+bool http_inspect.test_output = false: print out HTTP section data
+
+int http_inspect.print_amount = 1200: number of characters to print from a Field { 1:max53 }
+
+bool http_inspect.print_hex = false: nonprinting characters printed in [HH] format instead of using an asterisk
+
+bool http_inspect.show_pegs = true: display peg counts with test output
+
+bool http_inspect.show_scan = false: display scanned segments
+ Rules: What: stub rule option to enable or disable full rule Type: ips_option Usage: detect Configuration:
+enum enable.~enable = yes: enable or disable rule in current ips policy or use default defined by ips policy { no | yes | inherit }
+ What: rule option to set detection cursor to file data Type: ips_option
+--print-binding-order
+ Print sorting priority used when generating binder table
+
--print-differences Same as -d. output the differences, and only the
differences, between the Snort and Snort++ configurations to
the <out_file>
@@ -24178,6 +24296,11 @@ these libraries see the Getting Started section of the manual.
+--pause-after-n <count> pause after count packets (1:max53)
+
--pcap-file <file> file that contains a list of pcaps to read - read mode is implied
references[].url: where this reference is d
rule_state
-
rule_state.$gid_sid[].action = inherit: apply action if rule matches or inherit from rule definition { log | pass | alert | drop | block | reset | react | reject | rewrite | inherit }
+enum rule_state.$gid_sid[].action = alert: apply action if rule matches or inherit from rule definition { log | pass | alert | drop | block | reset }
@@ -8648,7 +8658,7 @@ bool search_engine.split_any_any = true: evaluate any-any rules
@@ -9879,47 +9909,47 @@ bool esp.decode_esp = false: enable for inspection of esp traff
+
@@ -18163,6 +18261,20 @@ interval dsize.~range: check if packet payload size is in the g
enable
+
+
file_data
+--piglet enable piglet test harness mode +
+--plugin-path <path> where to find plugins
+--catch-test comma separated list of cat unit test tags or all +
+--version show version number (same as -V)
+int appid.first_decrypted_packet_debug = 0: the first packet of an already decrypted SSL flow (debug single session only) { 0:max32 } +
+int appid.instance_id = 0: instance id - ignored { 0:max32 }
+enum enable.~enable = yes: enable or disable rule in current ips policy or use default defined by ips policy { no | yes | inherit } +
+bool esp.decode_esp = false: enable for inspection of esp traffic that has authentication but not encryption
host_tracker[].services[].proto: IP protocol
+int http2_inspect.print_amount = 1200: number of characters to print from a Field { 1:max53 } +
++bool http2_inspect.print_hex = false: nonprinting characters printed in [HH] format instead of using an asterisk +
++bool http2_inspect.show_pegs = true: display peg counts with test output +
++bool http2_inspect.show_scan = false: display scanned segments +
++bool http2_inspect.test_input = false: read HTTP/2 messages from text file +
++bool http2_inspect.test_output = false: print out HTTP section data +
+implied http_cookie.request: match against the cookie from the request message even when examining the response
+int http_inspect.print_amount = 1200: number of characters to print from a Field { 1:max53 } +
++bool http_inspect.print_hex = false: nonprinting characters printed in [HH] format instead of using an asterisk +
+int http_inspect.request_depth = -1: maximum request message body bytes to examine (-1 no limit) { -1:max53 }
+bool http_inspect.show_pegs = true: display peg counts with test output +
++bool http_inspect.show_scan = false: display scanned segments +
+bool http_inspect.simplify_path = true: reduce URI directory path to simplest form
+bool http_inspect.test_input = false: read HTTP messages from text file +
++bool http_inspect.test_output = false: print out HTTP section data +
+bool http_inspect.unzip = true: decompress gzip and deflate message bodies
-string ips.rules: snort rules and includes +string ips.rules: snort rules and includes (may contain states too) +
++string ips.states: snort rule states and includes (may contain rules too)
-bool output.wide_hex_dump = false: output 20 bytes per lines instead of 16 when dumping buffers +bool output.wide_hex_dump = true: output 20 bytes per lines instead of 16 when dumping buffers
-enum rule_state.$gid_sid[].action = inherit: apply action if rule matches or inherit from rule definition { log | pass | alert | drop | block | reset | react | reject | rewrite | inherit }
+enum rule_state.$gid_sid[].action = alert: apply action if rule matches or inherit from rule definition { log | pass | alert | drop | block | reset }
+int search_engine.queue_limit = 128: maximum number of fast pattern matches to queue per packet (0 means no maximum) { 0:max32 } +
+dynamic search_engine.search_method = ac_bnfa: set fast pattern algorithm - choose available search engine { ac_banded | ac_bnfa | ac_full | ac_sparse | ac_sparse_bands | ac_std | hyperscan | lowmem }
+string snort.--catch-test: comma separated list of cat unit test tags or all +
+string snort.-c: <conf> use this configuration
+int snort.--pause-after-n: <count> pause after count packets { 1:max53 } +
+implied snort.--pause: wait for resume/quit command before processing packets/terminating
+implied snort.--piglet: enable piglet test harness mode +
+string snort.--plugin-path: <path> where to find plugins
-search_engine.total_flushed: fast pattern matches discarded due to overflow (sum) +search_engine.total_flushed: total fast pattern matches processed (sum)
+search_engine.total_overruns: fast pattern matches discarded due to overflow (sum) +
+search_engine.total_unique: total unique fast pattern hits (sum)
+enable (ips_option): stub rule option to enable or disable full rule +
+erspan2 (codec): support for encapsulated remote switched port analyzer - type 2
-rule_state (basic): enable/disable and set actions for specific IPS rules +rule_state (basic): enable/disable and set actions for specific IPS rules; deprecated, use rule state stubs with enable instead
+ips_option::enable: stub rule option to enable or disable full rule +
+ips_option::file_data: rule option to set detection cursor to file data
+piglet::pp_codec: Codec piglet +
++piglet::pp_inspector: Inspector piglet +
++piglet::pp_ips_action: Ips action piglet +
++piglet::pp_ips_option: Ips option piglet +
++piglet::pp_logger: Logger piglet +
++piglet::pp_search_engine: Search engine piglet +
++piglet::pp_so_rule: SO rule piglet +
++piglet::pp_test: Test piglet +
+search_engine::ac_banded: Aho-Corasick Banded (high memory, moderate performance)