@@ -23903,10 +23924,49 @@ Use FIXIT (not FIXTHIS or TODO or whatever) to mark things left for a
-
-Presently using FIXIT-X where X = A | W | P | H | M | L | D, indicating
- analysis, warning, perf, high, med, low priority, or deprecated. Place A and
- W comments on the exact warning line so we can match up comments and build
- output. Supporting comments can be added above.
+Presently using FIXIT-X where X is one of the characters below. Place A
+ and W comments on the exact warning line so we can match up comments and
+ build output. Supporting comments can be added above.
+
+
+-
+
+A = known static analysis issue
+
+
+-
+
+D = deprecated - code to be removed after users update
+
+
+-
+
+E = enhancement - next steps for incomplete features (not a bug)
+
+
+-
+
+H = high priority - urgent deficiency
+
+
+-
+
+L = low priority - cleanup or similar technical debt (not a bug)
+
+
+-
+
+M = medium priority - suspected non-urgent deficiency
+
+
+-
+
+P = performance issue (not a bug)
+
+
+-
+
+W = warning - known compiler warning
-
@@ -25348,7 +25408,7 @@ bool appid.tp_appid_stats_enable: enable collection of stats an
-
-int appid.trace.all = 0: enabling traces in module { 0:max32 }
+int appid.trace.all = 0: enable traces in module { 0:255 }
-
@@ -26073,7 +26133,7 @@ int dce_smb.smb_max_compound = 3: SMB max compound size { 0:255
-
-int dce_smb.trace.all = 0: enabling traces in module { 0:max32 }
+int dce_smb.trace.all = 0: enable traces in module { 0:255 }
-
@@ -26123,12 +26183,12 @@ int dce_udp.max_frag_len = 65535: maximum fragment size for def
-
-int dce_udp.trace.all = 0: enabling traces in module { 0:max32 }
+int dce_udp.trace.all = 0: enable traces in module { 0:255 }
-
-int decode.trace.all = 0: enabling traces in module { 0:max32 }
+int decode.trace.all = 0: enable traces in module { 0:255 }
-
@@ -26208,47 +26268,47 @@ bool detection.pcre_to_regex = false: enable the use of regex i
-
-int detection.trace.buf_min = 0: enable min buffer trace logging { 0:max53 }
+int detection.trace.all = 0: enable detection module trace logging options { 0:255 }
-
-int detection.trace.buf_verbose = 0: enable verbose buffer trace logging { 0:max53 }
+int detection.trace.buffer = 0: enable buffer trace logging { 0:255 }
-
-int detection.trace.detect_engine = 0: enable detection engine trace logging { 0:max53 }
+int detection.trace.detect_engine = 0: enable detection engine trace logging { 0:255 }
-
-int detection.trace.fp_search = 0: enable fast pattern search trace logging { 0:max53 }
+int detection.trace.fp_search = 0: enable fast pattern search trace logging { 0:255 }
-
-int detection.trace.opt_tree = 0: enable tree option trace logging { 0:max53 }
+int detection.trace.opt_tree = 0: enable tree option trace logging { 0:255 }
-
-int detection.trace.pkt_detect = 0: enable packet detection trace logging { 0:max53 }
+int detection.trace.pkt_detect = 0: enable packet detection trace logging { 0:255 }
-
-int detection.trace.rule_eval = 0: enable rule evaluation trace logging { 0:max53 }
+int detection.trace.rule_eval = 0: enable rule evaluation trace logging { 0:255 }
-
-int detection.trace.rule_vars = 0: enable rule variables trace logging { 0:max53 }
+int detection.trace.rule_vars = 0: enable rule variables trace logging { 0:255 }
-
-int detection.trace.tag = 0: enable tag trace logging { 0:max53 }
+int detection.trace.tag = 0: enable tag trace logging { 0:255 }
-
@@ -26883,7 +26943,7 @@ int
gtp_inspect[].messages[].type = 0: message typ
-
-int gtp_inspect.trace.all = 0: enabling traces in module { 0:max32 }
+int gtp_inspect.trace.all = 0: enable traces in module { 0:255 }
-
@@ -27558,11 +27618,6 @@ interval itype.~range: check if ICMP type is in given range { 0
-
-enum latency.packet.action = none: event action if packet times out and is fastpathed { none | alert | log | alert_and_log }
-
-
--
-
bool latency.packet.fastpath = false: fastpath expensive packets (max_time exceeded)
@@ -27573,11 +27628,6 @@ int latency.packet.max_time = 500: set timeout for packet laten
-
-enum latency.rule.action = none: event action for rule latency enable and suspend events { none | alert | log | alert_and_log }
-
-
--
-
int latency.rule.max_suspend_time = 30000: set max time for suspending a rule (ms, 0 means permanently disable rule) { 0:max32 }
@@ -27598,6 +27648,11 @@ int latency.rule.suspend_threshold = 5: set threshold for numbe
-
+int latency.trace.all = 0: enable traces in module { 0:255 }
+
+
+-
+
bool log_codecs.file = false: output to log_codecs.txt instead of stdout
@@ -29633,7 +29688,7 @@ string snort.-t: <dir> chroots process to <dir> aft
-
-int snort.trace.all = 0: enabling traces in module { 0:max32 }
+int snort.trace.all = 0: enable traces in module { 0:255 }
-
@@ -29988,7 +30043,7 @@ int stream_ip.session_timeout = 30: session tracking timeout {
-
-int stream_ip.trace.all = 0: enabling traces in module { 0:max32 }
+int stream_ip.trace.all = 0: enable traces in module { 0:255 }
-
@@ -30118,7 +30173,7 @@ bool stream_tcp.track_only = false: disable reassembly if true
-
-int stream.trace.all = 0: enabling traces in module { 0:max32 }
+int stream.trace.all = 0: enable traces in module { 0:255 }
-
@@ -30153,7 +30208,7 @@ int stream_user.session_timeout = 30: session tracking timeout
-
-int stream_user.trace.all = 0: enabling traces in module { 0:max32 }
+int stream_user.trace.all = 0: enable traces in module { 0:255 }
-
@@ -30348,6 +30403,11 @@ string
wizard.spells[].to_server[].spell: sequence
-
+int wizard.trace.all = 0: enable traces in module { 0:255 }
+
+
+-
+
interval wscale.~range: check if TCP window scale is in given range { 0:65535 }
@@ -35283,6 +35343,21 @@ interval wscale.~range: check if TCP window scale is in given r
-
+119:250 (http_inspect) HTTP/2 Transfer-Encoding header other than identity
+
+
+-
+
+119:251 (http_inspect) HTTP/2 message body overruns Content-Length header value
+
+
+-
+
+119:252 (http_inspect) HTTP/2 message body smaller than Content-Length header value
+
+
+-
+
121:1 (http2_inspect) error in HPACK integer value
@@ -36792,13 +36867,10 @@ change -> perfmonitor: 'snortfile' ==> 'output = 'file''
change -> perfmonitor: 'time' ==> 'seconds'
change -> policy_mode: 'inline_test' ==> 'inline-test'
change -> pop: 'ports' ==> 'bindings'
-change -> ppm: ''both'' ==> ''alert_and_log''
change -> ppm: 'fastpath-expensive-packets' ==> 'packet.fastpath'
change -> ppm: 'max-pkt-time' ==> 'packet.max_time'
change -> ppm: 'max-rule-time' ==> 'rule.max_time'
-change -> ppm: 'pkt-log' ==> 'packet.action'
change -> ppm: 'ppm' ==> 'latency'
-change -> ppm: 'rule-log' ==> 'rule.action'
change -> ppm: 'suspend-expensive-rules' ==> 'rule.suspend'
change -> ppm: 'suspend-timeout' ==> 'max_suspend_time'
change -> ppm: 'threshold' ==> 'rule.suspend_threshold'
@@ -38105,6 +38177,11 @@ deleted -> unified2: 'vlan_event_types'
-
+so_proxy (inspector): a proxy inspector to track flow data from SO rules (internal use only)
+
+
+-
+
soid (ips_option): rule option to specify a shared object rule ID
@@ -38715,6 +38792,11 @@ deleted -> unified2: 'vlan_event_types'
-
+inspector::so_proxy: a proxy inspector to track flow data from SO rules (internal use only)
+
+
+-
+
inspector::ssh: ssh inspection
@@ -39623,7 +39705,7 @@ Adding/removing stream_* inspectors if stream was already configured