(https://www.heise.de/software/screenshots/t112868.jpg)
Network-Intrusion-Detection-System (NIDS), das den Netzwerkverkehr überwacht und versucht, verdächtige Aktivitäten, Pakete und Verbindungen zu erkennen; wird eine solche erkannt, bietet das Programm dem Benutzer weitere Optionen wie Blockieren, Umgehen oder Reinigen an.
Lizenz: Open Source
Whats new: >>
Suricata 2.0 Beta 1:
New features:
· Luajit flow vars and flow ints support
· DNS parser, logger and keyword support
· deflate support for HTTP response bodies
Improvements:
· update to libhtp 0.5
· improved gzip support for HTTP response bodies
· redesigned transaction handling, improving both accuracy and performance
· redesigned CUDA support
· Be sure to always apply verdict to NFQ packet
· stream engine: SACK allocs should adhere to memcap
· stream: deal with multiple different SYN/ACK’s better
· stream: Randomize stream chunk size for raw stream inspection
· Introduce per stream thread ssn pool
· pass” IP-only rules should bypass detection engine after matching
· Generate error if bpf is used in IPS mode
· Add support for batch verdicts in NFQ
· Update Doxygen config
· Improve libnss detection
Fixes:
· Fix a FP on rules looking for port 0 and fragments
· OS X unix socket build fixed
· bytetest, bytejump and byteextract negative offset failure
· Fix fast.log formatting issues
· Invalidate negative depth
· Fixed accuracy issues with relative pcre matching
· Fix deadlock in flowvar capture code
· Improved accuracy of file_data keyword
· Fix af-packet ips mode rule processing bug
· stream: fix injecting pseudo packet too soon leading to FP
Suricata 1.4.5:
· ipv6 extension header parsing issue causing Suricata to hang
· icmp_seq and icmp_id keyword with icmpv6 traffic FP & FN
http://suricata-ids.org/
Changelog
New Features:
Feature #549: Extract file attachments from emails
Feature #1312: Lua output support
Feature #899: MPLS over Ethernet support
Feature #383: Stream logging
Improvements:
Feature #1263: Lua: Access to Stream Payloads
Feature #1264: Lua: access to TCP quad / Flow Tuple
Feature #707: ip reputation files – network range inclusion availability (cidr)
Bugs:
Bug #1048: PF_RING/DNA config – suricata.yaml
Bug #1230: byte_extract, within combination not working
Bug #1257: Flow switch is missing from the eve-log section in suricata.yaml
Bug #1259: AF_PACKET IPS is broken in 2.1beta1
Bug #1260: flow logging at shutdown broken
Bug #1279: BUG: NULL pointer dereference when suricata was debug mode.
Bug #1280: BUG: IPv6 address vars issue
Bug #1285: Lua – http.request_line not working (2.1)
Bug #1287: Lua Output has dependency on eve-log:http
Bug #1288: Filestore keyword in wrong place will cause entire rule not to trigger
Bug #1294: Configure doesn’t use –with-libpcap-libraries when testing PF_RING library
Bug #1301: suricata yaml – PF_RING load balance per hash option
Bug #1308: http_header keyword not matching when SYN|ACK and ACK missing (master)
Bug #1311: EVE output Unix domain socket not working (2.1)
http://suricata-ids.org/
Changelog
Bug #977: WARNING on empty rules file is fatal (should not be)
Bug #1184: pfring: cppcheck warnings
Bug #1321: Flow memuse bookkeeping error
Bug #1327: pcre pkt/flowvar capture broken for non-relative matches (master)
Bug #1332: cppcheck: ioctl
Bug #1336: modbus: CID 1257762: Logically dead code (DEADCODE)
Bug #1351: output-json: duplicate logging (2.1.x)
Bug #1354: coredumps on quitting on OpenBSD
Bug #1355: Bus error when reading pcap-file on OpenBSD
Bug #1363: Suricata does not compile on OS X/Clang due to redefinition of string functions (2.1.x)
Bug #1365: evasion issues (2.1.x)
Feature #1261: Request for Additional Lua Capabilities
Feature #1309: Lua support for Stats output
Feature #1310: Modbus parsing and matching
Feature #1317: Lua: Indicator for end of flow
Feature #1333: unix-socket: allow (easier) non-root usage
Optimization #1339: flow timeout optimization
Optimization #1339: flow timeout optimization
Optimization #1371: mpm optimization
http://suricata-ids.org/
2.0.8
Whats new: >>
Changes
Bug #1450: tls parsing issue
Bug #1460: pcap parsing issue
Bug #1461: potential deadlock
Bug #1404: Alert-Debuglog not being rotated on SIGHUP
Bug #1420: inverted matching on incomplete session
Bug #1462: various issues in rule and yaml parsing
Security
The TLS/DER parsing issue has CVE-2015-0971 assigned to it.
2.1 Beta 4
Changelog
New Features
Feature #1448: xbits support
Feature #336: Add support for NETMAP to Suricata
Feature #885: smtp file_data support
Feature #1394: Improve TCP reuse support
Feature #1445: Suricata does not work on pfSense/FreeBSD interfaces using PPPoE
Feature #1447: Ability to reject ICMP traffic
Feature #1410: add alerts to EVE’s drop logs
Improvements
Optimization #1014: app layer reassembly fast-path
Optimization #1377: flow manager: reduce (try)locking
Optimization #1403: autofp packet pool performance problems
Optimization #1409: http pipeline support for stateful detection
Bug #1314: http-events performance issues
Bugs
Bug #1340: null ptr dereference in Suricata v2.1beta2
Bug #1352: file list is not cleaned up
Bug #1358: Gradual memory leak using reload (kill -USR2 $pid)
Bug #1366: Crash if default_packet_size is below 32 bytes
Bug #1378: stats api doesn’t call thread deinit funcs
Bug #1384: tcp midstream window issue (master)
Bug #1388: pcap-file hangs on systems w/o atomics support (master)
Bug #1392: http uri parsing issue (master)
Bug #1393: CentOS 5.11 build failures
Bug #1398: DCERPC traffic parsing issue (master)
Bug #1401: inverted matching on incomplete session
Bug #1402: When re-opening files on HUP (rotation) always use the append flag.
Bug #1417: no rules loaded – latest git – rev e250040
Bug #1425: dead lock in de_state vs flowints/flowvars
Bug #1426: Files prematurely truncated by detection engine even though force-md5 is enabled
Bug #1429: stream: last_ack update issue leading to stream gaps
Bug #1435: EVE-Log alert payload option loses data
Bug #1441: Local timestamps in json events
Bug #1446: Unit ID check in Modbus packet error
Bug #1449: smtp parsing issue
Bug #1451: Fix list-keywords regressions
Bug #1463: modbus parsing issue
http://suricata-ids.org/
Features and Improvements
improved detection options, including multi-tenancy and xbits
performance and scalability much improved
much improved accuracy and robustness
Lua scripting capabilities expanded significantly
many output improvements, including much more JSON
NETMAP capture method support, especially interesting to FreeBSD users
SMTP inspection and file extraction
For a full list of features added, please see: Full Changelog
Detection
Feature #885: smtp file_data support
Feature #707: ip reputation files - network range inclusion availability (cidr)
Feature #1448: xbits
Feature #1282: support for base64_decode keyword
Feature #1137: Support IP lists in threshold.config
Feature #1440: wildcard rule loading
Feature #1281: support content keyword length greater than 255
Feature #1408: multi tenancy for detection
Feature #1514: SSH softwareversion regex should allow colon
Outputs
Feature #1582: Redis output support
Feature #1228: stats.log in JSON format
Feature #1155: Log packet payloads in eve alerts
Feature #1208: JSON Output Enhancement - Include Payload(s)
Feature #1248: flow/connection logging
Feature #1258: json: include HTTP info with Alert output
Feature #383: stream data logging
Feature #893: feature, put more info in the "drop.log"
Feature #1123: JSON logs timestamp option
Feature #1154: Get the rule when packets are dropped
Feature #1116: ips packet stats in stats.log
Feature #1410: add alerts to EVE's drop logs
Feature #1586: Add flow memcap counter
Feature #1599: rule profiling: json output
Feature #1605: more descriptive err msg - getting MTU via ioctl
Feature #1635: unified2 output: disable by default
Feature #1498: color output
Feature #1499: json output for engine messages
Feature #1374: Write pre-aggregated counters for all threads
Feature #1454: JSON output prefix
Feature #1492: Add HUP coverage to output json-log
Packet Decoding & Protocol Parsing
Feature #899: MPLS over Ethernet support
Feature #1310: Modbus parsing and matching
Feature #1438: DNS Type nxdomain
Feature #1394: Improve TCP reuse support
Feature #1342: Support Cisco erspan traffic
Feature #1265: Replace response on Suricata dns decoder when dns error please
Feature #549: Extract file attachments from emails
Scripting
Feature #1263: Lua: Access to Stream Payloads
Feature #1264: Lua: access to TCP quad / Flow Tuple
Feature #1312: Lua output support
Feature #1261: Request for Additional Lua Capabilities
Feature #1309: Lua support for Stats output
Feature #1317: Lua: Indicator for end of flow
Feature #1502: Expose tls fields to lua
Feature #1568: TLS lua output support
Feature #1569: SSH lua support
Packet Capture & IPS
Feature #336: Add support for NETMAP to Suricata.
Feature #1445: Suricata does not work on pfSense/FreeBSD interfaces using PPPoE
Feature #1447: Ability to reject ICMP traffic
Misc
Feature #1333: unix-socket: allow (easier) non-root usage
Feature #1527: Add ability to compile as a Position-Independent Executable (PIE)
Zugehörige Tickets
Bug #1673: smtp: crash during mime parsing
Quelle & DL : http://suricata-ids.org/2016/01/27/suricata-3-0-available/
Changelog
Feature #1830: support ‘tag’ in eve log
Feature #1870: make logged flow_id more unique
Feature #1874: support Cisco Fabric Path / DCE
Feature #1885: eve: add option to log all dropped packets
Feature #1886: dns: output filtering
Bug #1849: ICMPv6 incorrect checksum alert if Ethernet FCS is present
Bug #1853: fix dce_stub_data buffer
Bug #1854: unified2: logging of tagged packets not working
Bug #1856: PCAP mode device not found
Bug #1858: Lots of TCP ‘duplicated option/DNS malformed request data’
after upgrading from 3.0.1 to 3.1.1
Bug #1878: dns: crash while logging sshfp records
Bug #1880: icmpv4 error packets can lead to missed detection in tcp/udp
Bug #1884: libhtp 0.5.22
http://suricata-ids.org/
Changelog
Changes you can expect from this new release include:
Feature #1830: support ‘tag’ in eve log
Feature #1870: make logged flow_id more unique
Feature #1874: support Cisco Fabric Path / DCE
Feature #1885: eve: add option to log all dropped packets
Feature #1886: dns: output filtering
Bug #1849: ICMPv6 incorrect checksum alert if Ethernet FCS is present
Bug #1853: fix dce_stub_data buffer
Bug #1854: unified2: logging of tagged packets not working
Bug #1856: PCAP mode device not found
Bug #1858: Lots of TCP ‘duplicated option/DNS malformed request data’
after upgrading from 3.0.1 to 3.1.1
Bug #1878: dns: crash while logging sshfp records
Bug #1880: icmpv4 error packets can lead to missed detection in tcp/udp
Bug #1884: libhtp 0.5.22
http://suricata-ids.org/
Changelog
Bug #2089: engine file logging race condition (3.2.x)
Bug #2173: openbsd: pcap with raw datalink not supported (3.2.x)
Bug #2178: asn1/der: stack overflow (3.2.x)
Bug #2179: Possible confusion or bypass within the stream engine with retransmits. (3.2.x)
Bug #2183: gcc 7.1.1 ‘format truncation’ compiler warnings (3.2.x)
http://suricata-ids.org/
Changelog
Feature #744: Teredo configuration
Feature #1748: lua: expose tx in alert lua scripts
Bug #1855: alert number output
Bug #1888: noalert in a pass rule disables the rule
Bug #1957: PCRE lowercase enforcement in http_host buffer does not allow for upper case in hex-encoding
Bug #1958: Possible confusion or bypass within the stream engine with retransmits.
Bug #2110: isdataat: keyword memleak
Bug #2162: rust/nfs: reachable asserting rust panic
Bug #2175: rust/nfs: panic – 4.0.0-dev (rev 7c25a2d)
Bug #2176: gcc 7.1.1 ‘format truncation’ compiler warnings
Bug #2177: asn1/der: stack overflow
http://suricata-ids.org/
Release Notes
We are thrilled to announce Suricata 4.0 is now available!
This is a major release, improving detection capabilities, more protocols, adding new output options, Rust support, and much more. Thanks to valuable feedback from the rule writing teams at Emerging Threats, Positive Technologies, and many others Suricata 4.0 includes many rule keywords for inspecting HTTP, SSH and other protocols. New features allow for greater context with alerts. Also, Suricata 4.0 is the first release in which implemented parts in the Rust language using the Nom parser framework have been incorporated. This work was inspired by presentations from SuriCon 2016.
Quelle & weitere Infos : https://oisf.net/2017/08/01/suricata-4-0-kicks-it-up-a-notch/
http://suricata-ids.org/
Changelog
Feature #2114: Redis output: add RPUSH support
Feature #2152: Packet and Drop Counters for Napatech
Bug #2050: TLS rule mixes up server and client certificates
Bug #2064: Rules with dual classtype do not error
Bug #2074: detect msg: memory leak
Bug #2102: Rules with dual sid do not error
Bug #2103: Rules with dual rev do not error
Bug #2151: The documentation does not reflect current suricata.yaml regarding cpu-affinity
Bug #2194: rust/nfs: sigabrt/rust panic – 4.0.0-dev (rev fc22943)
Bug #2197: rust build with lua enabled fails on x86
Bug #2201: af_packet: suricata leaks memory with use-mmap enabled and incorrect BPF filter
Bug #2207: DNS UDP “Response” parsing recording an incorrect value
Bug #2208: mis-structured JSON stats output if interface name is shortened
Bug #2226: improve error message if stream memcaps too low
Bug #2228: enforcing specific number of threads with autofp does not seem to work
Bug #2244: detect state uses broken offset logic (4.0.x)
Quelle: https://suricata-ids.org/2017/10/18/suricata-4-0-1-available/
http://suricata-ids.org/
Changelog
Feature #2245: decoder for ieee802.1AH traffic
Bug #798: stats.log in yaml config – append option – missing
Bug #891: detect-engine.profile does not err out in incorrect values – suricata.yaml
Bug #961: max pending packets variable parsing
Bug #1185: napatech: cppcheck warning
Bug #2215: Lost events writing to unix socket
Bug #2230: valgrind memcheck – 4.0.0-dev (rev 1180687)
Bug #2250: detect: mixing byte_extract and isdataat leads to FP & FN
Bug #2263: content matches disregarded when using dns_query on udp traffic
Bug #2274: ParseSizeString in util-misc.c: Null-pointer dereference
Bug #2275: ConfGetInt in conf.c: NULL-pointer dereference
Bug #2276: conf: NULL-pointer dereference in CoredumpLoadConfig
Bug #2293: rules: depth < content rules not rejected
Bug #2324: segfault in http_start (4.0.x)
Bug #2325: Suricata segfaults on ICMP and flowint check (4.0.x)
Quelle: https://suricata-ids.org/2017/12/06/suricata-4-0-3-available/
http://suricata-ids.org/
Changelog
Security:
CVE-2018-6794 was requested for issue #2440
Changes:
Bug #2306: suricata 4 deadlocks during failed output log reopening
Bug #2361: rule reload hangup
Bug #2389: BUG_ON asserts in AppLayerIncFlowCounter (4.0.x)
Bug #2392: libhtp 0.5.26 (4.0.x)
Bug #2422: [4.0.3] af_packet: a leak that (possibly) breaks an inline channel
Bug #2438: various config parsing issues
Bug #2439: Fix timestamp offline when pcap timestamp is zero (4.0.x)
Bug #2440: stream engine bypass issue (4.0.x)
Bug #2441: der parser: bad input consumes cpu and memory (4.0.x)
Bug #2443: DNP3 memcpy buffer overflow (4.0.x)
Bug #2444: rust/dns: Core Dump with malformed traffic (4.0.x)
Bug #2445: http bodies / file_data: thread space creation writing out of bounds
http://suricata-ids.org/
Changelog
Security:
CVE-2018-10242, CVE-2018-10244 (suricata)
CVE-2018-10243 (libhtp)
Changes:
Bug #2480: http eve log data source/dest flip (4.0.x)
Bug #2482: HTTP connect: difference in detection rates between 3.1 and 4.0.x
Bug #2531: yaml: ConfYamlHandleInclude memleak (4.0.x)
Bug #2532: memleak: when using app-layer event rules without rust
Bug #2533: Suricata gzip unpacker bypass (4.0.x)
Bug #2534: Suricata stops inspecting TCP stream if a TCP RST was met (4.0.x)
Bug #2535: Messages with SC_LOG_CONFIG level are logged to syslog with EMERG priority (4.0.x)
Bug #2537: libhtp 0.5.27 (4.0.x)
Bug #2540: getrandom prevents any suricata start commands on more later OS’s (4.0.x)
Bug #2544: ssh out of bounds read (4.0.x)
Bug #2545: enip out of bounds read (4.0.x)
http://suricata-ids.org/
Release Notes
It’s summer, so an excellent time for some testing! Suricata 4.1 release candidate 1 is here to be tried out. The release brings a lot of new features.
Get the release here: https://www.openinfosecfoundation.org/download/suricata-4.1.0-rc1.tar.gz
Main new features are inclusion of the protocols SMBv1/2/3, NFSv4, Kerberos, FTP, DHCP, IKEv2, as well as improvements on Linux capture side via AF_PACKET XDP support and on Windows IPS side via WinDivert. The progress in Rust usage inside Suricata continues as most of the new protocols have been implemented in Rust.
We invite everyone to test this release and report your experiences to us.
Protocol updates
SMBv1/2/3 parsing, logging, file extraction
JA3 TLS client fingerprinting (Mats Klepsland)
TFTP: basic logging (Pascal Delalande and Clément Galland)
FTP: file extraction
Kerberos parser and logger (Pierre Chifflier)
IKEv2 parser and logger (Pierre Chifflier)
DHCP parser and logger
Flow tracking for ICMPv4
Initial NFS4 support
HTTP: handle sessions that only have a response, or start with a response
HTTP Flash file decompression support (Giuseppe Longo)
Output and logging
File extraction v2: deduplication; hash-based naming; json metadata and cleanup tooling
Eve metadata: from rules (metadata keyword) and traffic (flowbits etc)
Eve: new more compact DNS record format (Giuseppe Longo)
Pcap directory mode: process all pcaps in a directory (Danny Browning)
Compressed PCAP logging (Max Fillinger)
Expanded XFF support (Maurizio Abba)
Packet Capture
AF_PACKET XDP and eBPF support for high speed packet capture
Windows IPS: WinDivert support (Jacob Masen-Smith)
Misc
Windows: MinGW is now supported
Detect: transformation keyword support
Bundled Suricata-Update
Major changes since 4.1beta1
WinDivert support
Kerberos parser and logger
IKEv2 parser and logger
DHCP parser and logger
Flow tracking for ICMPv4
Initial NFS4 support
Compressed PCAP logging
Expanded XFF support
Decode GRE over IP (Paulo Pacheco)
Multi-tenancy fixes
SMB improvements for midstream pickup
Update Suricata-Update to 1.0.0rc1
Security
CVE-2018-10242, CVE-2018-10244 (suricata)
CVE-2018-10243 (libhtp)
http://suricata-ids.org/
Release Notes
After a longer than intended release development cycle, the OISF development team is proud to present Suricata 4.1.
Main new features are inclusion of the protocols SMBv1/2/3, NFSv4, Kerberos, FTP, DHCP, IKEv2. All of them have been implemented in Rust to ensure their introduction will not be compromising to the security and the stability of the complete system.
Support for tracking and logging TLS 1.3 has been added, including JA3 support.
On performance side, one of the main improvements is the availability of capture bypass for AF_PACKET implemented on top of the new eXpress Data Path (XDP) capability of Linux kernel. Windows users will benefit from the 4.1 release with a new IPS mode based on WinDivert.
All new protocols require Rust so Suricata 4.1 is not really 4.1 if you don’t have Rust. This is why the build system is now enabling Rust by default if it is available on the build machine.
This is the first release where Suricata-Update 1.0, the new Suricata rule updater, is bundled.
Protocol updates
SMBv1/2/3 parsing, logging, file extraction
TLS 1.3 parsing and logging (Mats Klepsland)
JA3 TLS client fingerprinting (Mats Klepsland)
TFTP: basic logging (Pascal Delalande and Clément Galland)
FTP: file extraction
Kerberos parser and logger (Pierre Chifflier)
IKEv2 parser and logger (Pierre Chifflier)
DHCP parser and logger
Flow tracking for ICMPv4
Initial NFS4 support
HTTP: handle sessions that only have a response, or start with a response
HTTP Flash file decompression support (Giuseppe Longo)
Output and logging
File extraction v2: deduplication; hash-based naming; json metadata and cleanup tooling
Eve metadata: from rules (metadata keyword) and traffic (flowbits etc)
Eve: new more compact DNS record format (Giuseppe Longo)
Pcap directory mode: process all pcaps in a directory (Danny Browning)
Compressed PCAP logging (Max Fillinger)
Expanded XFF support (Maurizio Abba)
Community Flow Id support (common ID between Suricata and Bro/Zeek)
Packet Capture
AF_PACKET XDP and eBPF support for high speed packet capture
Windows IPS: WinDivert support (Jacob Masen-Smith)
PF_RING: usability improvements
Misc
Windows: MinGW is now supported
Detect: transformation keyword support
Bundled Suricata-Update
Per device multi-tenancy
Minor Changes since 4.1rc2
Coverity fixes and annotations
Update Suricata-Update to 1.0.0
Security
SMTP crash issue was fixed: CVE-2018-18956
Robustness of defrag against FragmentSmack was improved
Robustness of TCP reassembly against SegmentSmack was improved
Quelle & DL : https://suricata-ids.org/2018/11/06/suricata-4-1-released/
Release Notes
Much sooner than planned we are releasing 4.1.2. The 4.1.1 process didn’t go as planned. First the tarball was missing the vendored Rust crates. Then we found that Suricata-Update didn’t properly function on CentOS 7, Ubunut 14.04 and other slightly older distros. Then last minute we found yet another Suricata-Update bug.
So despite it being so close to the holidays for many, we decided to push 4.1.2 out already. Apologies for the inconvenience this may cause.
Other than the issues mention above, we did also fix some additional issues. SMB logging accuracy was improved, DNS detection and logging accuracy was improved and some documentation updates are included as well.
After the holidays are over we’re going to review our QA for both Suricata and Suricata-Update, so we can avoid issue like this in the future.
Changes
Feature #1863: smtp: improve pipelining support
Feature #2748: bundle libhtp 0.5.29
Feature #2749: bundle suricata-update 1.0.3
Bug #2682: python-yaml Not Listed As Ubuntu Prerequisite
Bug #2736: DNS Golden Transaction ID – detection bypass
Bug #2745: Invalid detect-engine config could lead to segfault
Bug #2752: smb: logs for IOCTL and DCERPC have tree_id value of 0
Quelle & DL : https://suricata-ids.org/2018/12/21/suricata-4-1-2-released/
(https://i.postimg.cc/9XnDTzh2/screenshot-1359.png)
RanSim gives you a quick look at the effectiveness of your existing network protection. Find out how vulnerable your network is against ransomware Find out how vulnerable your network is against ransomware and cryptomining attacks attacks. Bad guys are constantly coming out with new versions of ransomware strains to evade detection. Is your network effective in blocking ransomware when employees fall for social engineering attacks?
RanSim will simulate 13 ransomware infection scenarios and 1 cryptomining infection scenario and show you if a workstation is vulnerable.
Freeware
https://www.knowbe4.com/ransomware-simulator
Release Notes
We’re pleased to announce Suricata 4.1.3. This release fixes a number of issues found in the 4.1-series.
Get the release here: https://www.openinfosecfoundation.org/download/suricata-4.1.3.tar.gz
Changes
Bug #2225: when stats info dumping in redis,the decoder.ipv4.trunc_pkt can’t output.In the same time, in the stats.log this can output
Bug #2362: rule reload with workers mode and NFQUEUE not working stable
Bug #2761: Include ebpf files in distributed sources
Bug #2762: SSLv3 – AddressSanitizer heap-buffer-overflow
Bug #2770: TCP FIN/ACK, RST/ACK in HTTP – detection bypass
Bug #2788: afpacket doesn’t wait for all capture threads to start
Bug #2805: dns v1/2 with rust results in less app layer data available in the alert record (for dns related alerts/rules) (4.1.x)
Bug #2811: netmap/afpacket IPS: stream.inline: auto broken
Bug #2823: configure.ac: broken –{enable,disable}-xxx options (4.1.x)
Bug #2842: IPS mode crash under load
Bug #2855: Suricata does not bridge host <-> hw rings (Affects FreeBSD 11-STABLE, FreeBSD 12 and FreeBSD 13-CURRENT)
Bug #2862: pcre related FP in HTTP inspection (4.1.x)
Bug #2865: Suricata rule sid:2224005 SURICATA IKEv2 weak cryptographic parameters (Diffie-Hellman) not works (4.1.x)
Feature #2774: pcap multi dev support for Windows
Quelle & DL : https://suricata-ids.org/2019/03/07/suricata-4-1-3-released/
Changelog
We’re pleased to announce Suricata 4.1.4. This release fixes a number of issues found in the 4.1 branch.
Changes
Bug #2870: pcap logging with lz4 coverity warning
Bug #2883: ssh: heap buffer overflow
Bug #2884: mpls: heapbuffer overflow in file decode-mpls.c
Bug #2887: decode-ethernet: heapbuffer overflow in file decode-ethernet.c
Bug #2888: 4.1.3 core in HCBDCreateSpace
Bug #2894: smb 1 create andx request does not parse the filename correctly
Bug #2902: rust/dhcp: panic in dhcp parser
Bug #2903: mpls: cast of misaligned data leads to undefined behavior
Bug #2904: rust/ftp: panic in ftp parser
Bug #2943: rust/nfs: integer underflow
This release includes Suricata-Update 1.0.5
Quelle & DL : https://suricata-ids.org/2019/04/30/suricata-4-1-4-released/
Release Notes
The OISF’s Suricata development team is proud to announce Suricata 5.0.0. This release brings many new features and improvements.
RDP, SNMP, FTP and SIP
Three new protocol parsers and loggers, all community contributions. Zach Kelly created a Rust RDP parser, while Giuseppe Longo created SIP support. Rust master Pierre Chifflier contributed SNMP support. Since RDP and SIP were merged late in our development cycle they are disabled by default in the configuration. For FTP we have added an EVE logging facility.
JA3S
After contributing JA3 support in Suricata 4.1, Mats Klepsland has been working on JA3S support. JA3S is now available to the rule language and in the TLS logging output.
Datasets
Still experimental at this time, the initial work to support datasets is part of this release. It allows matching on large amounts of data. It is controlled from the rule language and will work with any ‘sticky buffer’.
See documentation at https://suricata.readthedocs.io/en/suricata-5.0.0/rules/datasets.html
We’ve already heard of people using this with millions of IOCs.
Documentation
With the help of many community members we’ve been improving the user documentation. Please see: https://suricata.readthedocs.io/en/suricata-5.0.0/
HTTP evader
We’ve been working hard to cover the final set of HTTP evader cases. This work has mostly gone into the bundled libhtp 0.5.31.
Rust
The most visible is that our Rust support is no longer optional. We’re convinced that Rust is a perfect match for Suricata, and we plan to increase its footprint in our code base steadily. By making it mandatory we’re able to remove parallel implementations and focus fully on making the Rust code better.
Protocol Detection
The protocol detection engine has been extended to provide better accuracy as well as support for dealing with asynchronous flows. These async flows are sometimes picked up in the wrong direction and the protocol detection engine can now reverse them.
Decoder Anomaly records in EVE
A new log record type has been added: ‘anomaly’. This logs the stream and decoder events that are set by the packet decoders. This is inspired by Zeeks (Bro) ‘weird’ log.
EVE improvements
VLAN and capture interface is now part of many more EVE records, even if they are flow records or records based on flow time out.
An option to log all HTTP headers to the EVE http records has been added.
Packet Capture
Eric Leblond has been working hard to getting hardware offload support working for eBPF. On Netronome cards the eBPF based flow bypass can now be offloaded to the NIC. As eBPF is becoming a standard in the Linux space, we are hoping to see other hardware offload soon as well.
Netmap support has been rewritten so the more advanced features of netmap, such as vale switches, can be used now.
Napatech usability has been improved.
Rule language: Sticky Buffers
As discussed at the Suricon 2018 brainstorm session, a new rule keyword scheme is being introduced. It takes the existing ‘sticky buffer’ approach with new keyword names to avoid confusion. The new scheme is <proto>.<buffer>, so for example ‘http.uri’ for the URI inspection.
A number of HTTP keywords have been added.
Unified Lua inspection mixed with the sticky buffers has also been implemented.
Python 3
With Python 2’s EOL approaching, we’ve made sure that all Suricata’s python code is Python 3 compliant.
Removals
Following our deprecation policy, we have removed the following parts: the plain text dns.log, the old files-json.log and support for the Tilera architecture.
https://suricata-ids.org/about/deprecation-policy/
https://suricata-ids.org/
Release Notes
We’re pleased to announce Suricata 5.0.1. This release fixes a number of issues found in the 5.0 branch. There are still a number of open issues that we are working on. See our 5.0.2 target here: https://redmine.openinfosecfoundation.org/versions/142
This release fixes a number of IPv4 and TCP evasion issues reported by Nicolas Adba.
Get the release here: https://www.openinfosecfoundation.org/download/suricata-5.0.1.tar.gz
Changes
Bug #1871: intermittent abort()s at shutdown and in unix-socket
Bug #2810: enabling add request/response http headers in master
Bug #3047: byte_extract does not work in some situations
Bug #3073: AC_CHECK_FILE on cross compile
Bug #3103: –engine-analysis warning for flow on an icmp request rule
Bug #3120: nfq_handle_packet error -1 Resource temporarily unavailable warnings
Bug #3237: http_accept not treated as sticky buffer by –engine-analysis
Bug #3254: tcp: empty SACK option leads to decoder event
Bug #3263: nfq: invalid number of bytes reported
Bug #3264: EVE DNS Warning about defaulting to v2 as version is not set.
Bug #3266: fast-log: icmp type prints wrong value
Bug #3267: Support for tcp.hdr Behavior
Bug #3275: address parsing: memory leak in error path
Bug #3277: segfault when test a nfs pcap file
Bug #3281: Impossible to cross-compile due to AC_CHECK_FILE
Bug #3284: hash function for string in dataset is not correct
Bug #3286: TCP evasion technique by faking a closed TCP session
Bug #3324: TCP evasion technique by overlapping a TCP segment with a fake packet
Bug #3328: bad ip option evasion
Bug #3340: DNS: DNS over TCP transactions logged with wrong direction.
Bug #3341: tcp.hdr content matches don’t work as expected
Bug #3345: App-Layer: Not all parsers register TX detect flags that should
Bug #3346: BPF filter on command line not honored for pcap file
Bug #3362: cross compiling not affecting rust component of surrcata
Bug #3376: http: pipelining tx id handling broken
Bug #3386: Suricata is unable to get MTU from NIC after 4.1.0
Bug #3389: EXTERNAL_NET no longer working in 5.0 as expected
Bug #3390: Eve log does not generate pcap_filename when Interacting via unix socket in pcap processing mode
Bug #3397: smtp: file tracking issues when more than one attachment in a tx
Bug #3398: smtp: ‘raw-message’ option file tracking issues with multi-tx
Bug #3399: smb: post-GAP some transactions never close
Bug #3401: smb1: ‘event only’ transactions for bad requests never close
Bug #3411: detect/asn1: crashes on packets smaller than offset setting
Task #3364: configure: Rust 1.37+ has cargo-vendor support bundled into cargo.
Documentation #2885: update documentation to indicate -i can be used multiple times
Bundle Suricata-Update 1.1.1
Bundle Libhtp 0.5.32
https://suricata-ids.org/
Release Notes
We’re pleased to announce Suricata 5.0.2. This release fixes a number of issues found in the 5.0 branch.
Get the release here: https://www.openinfosecfoundation.org/download/suricata-5.0.2.tar.gz
Changes
Bug #2993: Suricata 5.0.0beta1 memory allocation of 4294966034 bytes failed
Bug #3380: Segfault when using multi-detect
Bug #3400: smb: post-GAP file tx handling
Bug #3424: nfs: post-GAP some transactions never close
Bug #3425: nfs: post-GAP file tx handling
Bug #3433: coverity: CID 1456679: Memory – corruptions (NEGATIVE_RETURNS)
Bug #3434: coverity: CID 1456680: Incorrect expression (IDENTICAL_BRANCHES)
Bug #3469: gcc10: compilation failure unless -fcommon is supplied (5.0.x)
Bug #3473: Dropping privileges does not work with NFLOG (5.0.x)
Documentation #3423: readthedocs shows title of documentation as “Suricata unknown documentation”
https://suricata-ids.org/
Changelog
Feature #3481: GRE ERSPAN Type 1 Support
Feature #3613: Teredo port configuration
Feature #3673: datasets: add ‘dataset-remove’ unix command
Bug #3240: Dataset hash-size or prealloc invalid value logging
Bug #3241: Dataset reputation invalid value logging
Bug #3342: Suricata 5.0 crashes while parsing SMB data
Bug #3450: signature with sticky buffer with subsequent pcre check in a different buffer loads but will never match
Bug #3491: Backport 5 BUG_ON(strcasecmp(str, “any”) in DetectAddressParseString
Bug #3507: rule parsing: memory leaks
Bug #3526: 5.0.x Kerberos vulnerable to TCP splitting evasion
Bug #3534: Skip over ERF_TYPE_META records
Bug #3552: file logging: complete files sometimes marked ‘TRUNCATED’
Bug #3571: rust: smb compile warnings
Bug #3573: TCP Fast Open – Bypass of stateless alerts
Bug #3574: Behavior for tcp fastopen
Bug #3576: Segfault when facing malformed SNMP rules
Bug #3577: SIP: Input not parsed when header values contain trailing spaces
Bug #3580: Faulty signature with two threshold keywords does not generate an error and never match
Bug #3582: random failures on sip and http-evader suricata-verify tests
Bug #3585: htp: asan issue
Bug #3592: Segfault on SMTP TLS
Bug #3598: rules: memory leaks in pktvar keyword
Bug #3600: rules: bad address block leads to stack exhaustion
Bug #3602: rules: crash on ‘internal’-only keywords
Bug #3604: rules: missing ‘consumption’ of transforms before pkt_data would lead to crash
Bug #3606: rules: minor memory leak involving pcre_get_substring
Bug #3609: ssl/tls: ASAN issue in SSLv3ParseHandshakeType
Bug #3610: defrag: asan issue
Bug #3612: rules/bsize: memory issue during parsing
Bug #3614: build-info and configure wrongly display libnss status
Bug #3644: Invalid memory read on malformed rule with Lua script
Bug #3646: rules: memory leaks on failed rules
Bug #3649: CIDR Parsing Issue
Bug #3651: FTP response buffering against TCP stream
Bug #3653: Recursion stack-overflow in parsing YAML configuration
Bug #3660: Multiple DetectEngineReload and bad insertion into linked list lead to buffer overflow
Bug #3665: FTP: Incorrect ftp_memuse calculation.
Bug #3667: Signature with an IP range creates one IPOnlyCIDRItem by signe IP address
Bug #3669: Rules reload with Napatech can hang Suricata UNIX manager process
Bug #3672: coverity: data directory handling issues
Bug #3674: Protocol detection evasion by packet splitting
Optimization #3406: filestore rules are loaded without warning when filestore is not enabled
Task #3478: libhtp 0.5.33
Task #3514: SMTP should place restraints on variable length items (e.g., filenames)
Documentation #3543: doc: add ipv4.hdr and ipv6.hdr
Bundled libhtp 0.5.33
Bundled Suricata-Update 1.1.2
https://suricata-ids.org/
Changelog
initial HTTP/2 support
DCERPC logging
much improved EVE logging performance
RFB and MQTT protocol support, including detection and logging
HASSH support
conditional logging
https://suricata-ids.org/
Changelog
http2: support file inspection API #4121
fixed:
Bug #1275: ET Rule 2003927 not matchin in suricata Actions
Bug #3467: Alert metadata not present in EVE output when using Socket Control Pcap Processing Mode Actions
Bug #3616: strip_whitespace causes FN Actions
Bug #3726: Segmentation fault on rule reload when using libmagic Actions
Bug #3856: dcerpc: last response packet not logged Actions
Bug #3924: asan leak htp_connp_create Actions
Bug #3925: dcerpc: crash in eve logging Actions
Bug #3930: Out of memory from THashInitConfig called by DetectDatasetSetup Actions
Bug #3994: SIGABRT TCPProtoDetectCheckBailConditions Actions
Bug #4018: Napatech: Double release of packet possible in certain error cases. Actions
Bug #4069: dcerpc: fix UDP transaction handling, free_tx, etc Actions
Bug #4071: Null dereference in ipv4hdr GetData Actions
Bug #4072: ssl: Integer underflow in SSL parser Actions
Bug #4073: Protocol detection evasion by packet splitting on enip/SMB Actions
Bug #4074: Timeout while loading many rules with keyword ssl_version Actions
Bug #4076: http2: Memory leak when parsing signature with filestore Actions
Bug #4085: Assertion from AdjustToAcked Actions
Bug #4086: dns: memory leak in v1 dns eve logging Actions
Bug #4090: icmpv4: header handling issue(s) Actions
Bug #4091: byte_math: Offset is a signed value Actions
Bug #4094: AddressSanitizer: dynamic-stack-buffer-overflow (util-crypt) Actions
Bug #4100: ftp: Quadratic complexity in FTPGetOldestTx may lead to DOS Actions
Bug #4109: mac address logging crash Actions
Bug #4110: http: LibHTP wrong protocol with content duplication Actions
Bug #4111: dnp3: DOS in long loop of zero sized objects Actions
Bug #4120: http2: null ptr deref in http2 alert metadata Actions
Bug #4124: dcerpc: UDP request response pair match is incorrect Actions
Bug #4155: dnp3: memory leak when parsing objects with bytearrays Actions
Bug #4156: dnp3: signed integer overflow Actions
Bug #4158: PacketCopyData sets packet length even on failure Actions
Bug #4173: dnp3: SV tests fail on big endian Actions
Bug #4177: Rustc nightly warning getting the inner pointer of a temporary `CString` Actions
Feature #2689: http: Normalized HTTP client body buffer Actions
Feature #4121: http2: support file inspection API Actions
Optimization #4114: Optmize Rust logging macros: SCLogInfo, SCLogDebug and friends Actions
Task #4137: deprecate: eve.dns v1 record support Actions
Task #4180: libhtp 0.5.36
https://suricata-ids.org/