@@ -13364,6 +13408,11 @@ string
port_scan.ignore_scanned: list of CIDRs with optional po
+bool port_scan.alert_all = false: alert on all events over threshold within window if true; else alert on first only
+
+
+
+
bool port_scan.include_midstream = false: list of CIDRs with optional ports
@@ -14878,7 +14927,7 @@ int
stream.tcp_cache.pruning_timeout = 30: minimum inactive tim
-int stream.tcp_cache.idle_timeout = 180: maximum inactive time before retiring session tracker { 1: }
+int stream.tcp_cache.idle_timeout = 3600: maximum inactive time before retiring session tracker { 1: }
@@ -15491,7 +15540,7 @@ int stream_tcp.overlap_limit = 0: maximum number of allowed ove
-int stream_tcp.max_pdu = 16384: maximum reassembled PDU size { 1460:65535 }
+int stream_tcp.max_pdu = 16384: maximum reassembled PDU size { 1460:32768 }
@@ -15977,7 +16026,7 @@ bool telnet.normalize = false: eliminate escape sequences
wizard
What: inspector that implements port-independent protocol identification
-
+
-
@@ -17989,7 +18038,7 @@ string so.~func: name of eval function
@@ -18310,7 +18359,7 @@ bool alert_csv.file = false: output to alert_csv.txt instead of
-
-multi alert_csv.fields = timestamp pkt_num proto pkt_gen pkt_len dir src_ap dst_ap rule action: selected fields will be output in given order left to right { action | class | b64_data | dir | dst_addr | dst_ap | dst_port | eth_dst | eth_len | eth_src | eth_type | gid | icmp_code | icmp_id | icmp_seq | icmp_type | iface | ip_id | ip_len | msg | mpls | pkt_gen | pkt_len | pkt_num | priority | proto | rev | rule | service | sid | src_addr | src_ap | src_port | target | tcp_ack | tcp_flags | tcp_len | tcp_seq | tcp_win | timestamp | tos | ttl | udp_len | vlan }
+multi alert_csv.fields = timestamp pkt_num proto pkt_gen pkt_len dir src_ap dst_ap rule action: selected fields will be output in given order left to right { action | class | b64_data | dir | dst_addr | dst_ap | dst_port | eth_dst | eth_len | eth_src | eth_type | gid | icmp_code | icmp_id | icmp_seq | icmp_type | iface | ip_id | ip_len | msg | mpls | pkt_gen | pkt_len | pkt_num | priority | proto | rev | rule | seconds | service | sid | src_addr | src_ap | src_port | target | tcp_ack | tcp_flags | tcp_len | tcp_seq | tcp_win | timestamp | tos | ttl | udp_len | vlan }
-
@@ -18396,7 +18445,7 @@ bool alert_json.file = false: output to alert_json.txt instead
-
-multi alert_json.fields = timestamp pkt_num proto pkt_gen pkt_len dir src_ap dst_ap rule action: selected fields will be output in given order left to right { action | class | b64_data | dir | dst_addr | dst_ap | dst_port | eth_dst | eth_len | eth_src | eth_type | gid | icmp_code | icmp_id | icmp_seq | icmp_type | iface | ip_id | ip_len | msg | mpls | pkt_gen | pkt_len | pkt_num | priority | proto | rev | rule | service | sid | src_addr | src_ap | src_port | target | tcp_ack | tcp_flags | tcp_len | tcp_seq | tcp_win | timestamp | tos | ttl | udp_len | vlan }
+multi alert_json.fields = timestamp pkt_num proto pkt_gen pkt_len dir src_ap dst_ap rule action: selected fields will be output in given order left to right { action | class | b64_data | dir | dst_addr | dst_ap | dst_port | eth_dst | eth_len | eth_src | eth_type | gid | icmp_code | icmp_id | icmp_seq | icmp_type | iface | ip_id | ip_len | msg | mpls | pkt_gen | pkt_len | pkt_num | priority | proto | rev | rule | seconds | service | sid | src_addr | src_ap | src_port | target | tcp_ack | tcp_flags | tcp_len | tcp_seq | tcp_win | timestamp | tos | ttl | udp_len | vlan }
-
@@ -19930,6 +19979,11 @@ options into a Snort++ configuration file
+--bind-wizard Add default wizard to bindings
+
+
+
+
--conf-file Same as -c. A Snort <snort_conf> file which will be
converted
@@ -21552,7 +21606,7 @@ Write comments sparingly with a mind towards future proofing. Often the
-Heed Tim Ottinger’s Rule on Comments (https://disqus.com/by/tim_ottinger/):
+Heed Tim Ottinger’s Rules on Comments (https://disqus.com/by/tim_ottinger/):
-
@@ -22482,6 +22536,11 @@ these libraries see the Getting Started section of the manual.
+--parsing-follows-files parse relative paths from the perspective of the current configuration file
+
+
+
+
--pause wait for resume/quit command before processing packets/terminating
@@ -22792,7 +22851,7 @@ int
active.min_interval = 255: minimum number of seconds betwee
-multi alert_csv.fields = timestamp pkt_num proto pkt_gen pkt_len dir src_ap dst_ap rule action: selected fields will be output in given order left to right { action | class | b64_data | dir | dst_addr | dst_ap | dst_port | eth_dst | eth_len | eth_src | eth_type | gid | icmp_code | icmp_id | icmp_seq | icmp_type | iface | ip_id | ip_len | msg | mpls | pkt_gen | pkt_len | pkt_num | priority | proto | rev | rule | service | sid | src_addr | src_ap | src_port | target | tcp_ack | tcp_flags | tcp_len | tcp_seq | tcp_win | timestamp | tos | ttl | udp_len | vlan }
+multi alert_csv.fields = timestamp pkt_num proto pkt_gen pkt_len dir src_ap dst_ap rule action: selected fields will be output in given order left to right { action | class | b64_data | dir | dst_addr | dst_ap | dst_port | eth_dst | eth_len | eth_src | eth_type | gid | icmp_code | icmp_id | icmp_seq | icmp_type | iface | ip_id | ip_len | msg | mpls | pkt_gen | pkt_len | pkt_num | priority | proto | rev | rule | seconds | service | sid | src_addr | src_ap | src_port | target | tcp_ack | tcp_flags | tcp_len | tcp_seq | tcp_win | timestamp | tos | ttl | udp_len | vlan }
@@ -22842,7 +22901,7 @@ int alert_full.limit = 0: set maximum size in MB before rollove
-multi alert_json.fields = timestamp pkt_num proto pkt_gen pkt_len dir src_ap dst_ap rule action: selected fields will be output in given order left to right { action | class | b64_data | dir | dst_addr | dst_ap | dst_port | eth_dst | eth_len | eth_src | eth_type | gid | icmp_code | icmp_id | icmp_seq | icmp_type | iface | ip_id | ip_len | msg | mpls | pkt_gen | pkt_len | pkt_num | priority | proto | rev | rule | service | sid | src_addr | src_ap | src_port | target | tcp_ack | tcp_flags | tcp_len | tcp_seq | tcp_win | timestamp | tos | ttl | udp_len | vlan }
+multi alert_json.fields = timestamp pkt_num proto pkt_gen pkt_len dir src_ap dst_ap rule action: selected fields will be output in given order left to right { action | class | b64_data | dir | dst_addr | dst_ap | dst_port | eth_dst | eth_len | eth_src | eth_type | gid | icmp_code | icmp_id | icmp_seq | icmp_type | iface | ip_id | ip_len | msg | mpls | pkt_gen | pkt_len | pkt_num | priority | proto | rev | rule | seconds | service | sid | src_addr | src_ap | src_port | target | tcp_ack | tcp_flags | tcp_len | tcp_seq | tcp_win | timestamp | tos | ttl | udp_len | vlan }
@@ -23962,6 +24021,11 @@ string file_id.file_rules[].category: file type category
+string file_id.file_rules[].group: comma separated list of groups associated with file type
+
+
+
+
int file_id.file_rules[].id = 0: file type id { 0: }
@@ -24037,6 +24101,11 @@ int
file_id.type_depth = 1460: stop type ID at this point { 0:
+int file_id.verdict_delay = 0: number of queries to return final verdict { 0: }
+
+
+
+
bool file_log.log_pkt_time = true: log the packet time when event generated
@@ -24852,6 +24921,21 @@ int
imap.uu_decode_depth = 1460: Unix-to-Unix decoding depth {
+int inspection.id = 0: correlate policy and events with other items in configuration { 0:65535 }
+
+
+
+
+enum inspection.mode = inline-test: set policy mode { inline | inline-test }
+
+
+
+
+string inspection.uuid: correlate events by uuid
+
+
+
+
select ipopts.~opt: output format { rr|eol|nop|ts|sec|esec|lsrr|lsrre|ssrr|satid|any }
@@ -24887,7 +24971,7 @@ string
ips.rules: snort rules and includes
-string ips.uuid: IPS policy uuid
+string ips.uuid = 00000000-0000-0000-0000-000000000000: IPS policy uuid
@@ -25437,6 +25521,11 @@ int pop.uu_decode_depth = 1460: Unix-to-Unix decoding depth {
+bool port_scan.alert_all = false: alert on all events over threshold within window if true; else alert on first only
+
+
+
+
int port_scan.icmp_sweep.nets = 25: number of times address changed from prior attempt { 0: }
@@ -26717,6 +26806,11 @@ string
snort.-?: <option prefix> output matching command
+implied snort.--parsing-follows-files: parse relative paths from the perspective of the current configuration file
+
+
+
+
implied snort.--pause: wait for resume/quit command before processing packets/terminating
@@ -26997,7 +27091,7 @@ string
so.~func: name of eval function
-string soid.~: SO rule ID has <gid>|<sid> format, like 3|12345
+string soid.~: SO rule ID is unique key, eg <gid>_<sid>_<rev> like 3_45678_9
@@ -27257,7 +27351,7 @@ interval stream_size.~range: check if the stream size is in the
-int stream.tcp_cache.idle_timeout = 180: maximum inactive time before retiring session tracker { 1: }
+int stream.tcp_cache.idle_timeout = 3600: maximum inactive time before retiring session tracker { 1: }
@@ -27282,7 +27376,7 @@ bool stream_tcp.ignore_any_rules = false: process tcp content r
-int stream_tcp.max_pdu = 16384: maximum reassembled PDU size { 1460:65535 }
+int stream_tcp.max_pdu = 16384: maximum reassembled PDU size { 1460:32768 }
@@ -31487,6 +31581,11 @@ interval wscale.~range: check if TCP window scale is in given r
+116:475 (ipv6) IPv6 mobility header includes an invalid value for the payload protocol field
+
+
+
+
119:1 (http_inspect) ascii encoding
@@ -33993,6 +34092,11 @@ deleted -> unified2: 'filename'
+inspection (basic): configure basic inspection policy parameters
+
+
+
+
ip_proto (ips_option): rule option to check the IP protocol number
@@ -34523,6 +34627,11 @@ deleted -> unified2: 'filename'
+codec::bad_proto: bad protocol id
+
+
+
+
codec::ciscometadata: support for cisco metadata
@@ -34668,11 +34777,6 @@ deleted -> unified2: 'filename'
-codec::pim: support for protocol independent multicast
-
-
-
-
codec::ppp: support for point-to-point encapsulation (DLT 9)
@@ -34708,16 +34812,6 @@ deleted -> unified2: 'filename'
-codec::sun_nd: support for Sun ND
-
-
-
-
-codec::swipe: support for Swipe
-
-
-
-
codec::tcp: support for transmission control protocol
@@ -36449,7 +36543,7 @@ Note that on OpenBSD, divert sockets don’t work with bridges!