Friday, October 31, 2014

Snort OpenAppID Detectors have been updated!

A new update has been released today for the Snort OpenAppID Detector content.

In this release, build 223, includes
- A total of 2,584 detectors.
- One fix that was also reported by the Open Source community about the getShortHostFormat call from our API.

Available now for download from our downloads page, we look forward to your downloading and using the new features of 2.9.7.0's OpenAppId preprocessor and sharing your experiences with the community.

The OpenAppId community has a mailing list specifically dedicated to the exchange and discussion of detector content.  Please visit the mailing lists page to sign up.

Thursday, October 30, 2014

Snort Subscriber Rule Set Update for 10/30/2014

Just released:
Snort Subscriber Rule Set Update for 10/30/2014

We welcome the introduction of the newest rule release from Talos. In this release we introduced 14 new rules and made modifications to 46 additional rules.

There were no changes made to the snort.conf in this release.

Talos would like to thank the following individuals for their contributions, their rules are included in the Community Ruleset:

Avery Tarasov
32367


Talos's rule release:
The VRT has added and modified multiple rules in the browser-ie, browser-plugins, exploit-kit, file-flash, file-other, file-pdf, indicator-obfuscation, malware-cnc, os-other, os-windows, policy-other, protocol-nntp and protocol-scada rule sets to provide coverage for emerging threats from these technologies.


In order to subscribe now to Talos's newest rule detection functionality, you can subscribe for as low as $29 US dollars a year for personal users, be sure and see our business pricing as well at https://www.snort.org/products. Make sure and stay up to date to catch the most emerging threats!

Tuesday, October 28, 2014

Snort Subscriber Rule Set Update for 10/28/2014

Just released:
Snort Subscriber Rule Set Update for 10/28/2014

We welcome the introduction of the newest rule release from Talos. In this release we introduced 13 new rules and made modifications to 44 additional rules.

There were no changes made to the snort.conf in this release.

Talos's rule release:
The VRT has added and modified multiple rules in the browser-chrome, malware-cnc, server-other and sql rule sets to provide coverage for emerging threats from these technologies.


In order to subscribe now to Talos's newest rule detection functionality, you can subscribe for as low as $29 US dollars a year for personal users, be sure and see our business pricing as well at https://www.snort.org/products. Make sure and stay up to date to catch the most emerging threats!

Thursday, October 23, 2014

Snort Subscriber Rule Set Update for 10/23/2014, Release 2

Just released:
Snort Subscriber Rule Set Update for 10/23/2014


We welcome the introduction of the newest rule release from Talos. In this release we introduced 29 new rules and made modifications to 16 additional rules.

There were no changes made to the snort.conf in this release.

Talos's rule release:
The VRT has added and modified multiple rules in the blacklist, browser-ie, file-other, file-pdf, malware-cnc, os-other, pua-adware, server-mail and server-webapp rule sets to provide coverage for emerging threats from these technologies.
In order to subscribe now to Talos's newest rule detection functionality, you can subscribe for as low as $29 US dollars a year for personal users, be sure and see our business pricing as well at https://www.snort.org/products. Make sure and stay up to date to catch the most emerging threats!

Snort EOL dates have been updated!

With the release of Snort 2.9.7.0, in accordance with our EOL policy, we've placed an EOL date on Snort version 2.9.5.6.

Please take a moment and review our EOL policy on our webpage, and review the 2.9.5.6 EOL date (January 21, 2015)

If there are any questions, please head on over to the Snort-users mailing list found on our Community Page.

Snort Subscriber Rule Set Update for 10/23/2014, 2.9.7.0 Release

Just released:
Snort Subscriber Rule Set Update for 10/23/2014

We welcome the introduction of the newest rule release from Talos. In this release we introduced 45 new rules and made modifications to 9 additional rules.

There were no changes made to the snort.conf in this release.

Talos's rule release:
The VRT has added and modified multiple rules in the blacklist, deleted, file-flash, file-multimedia, file-other, malware-cnc, os-mobile, protocol-snmp, server-oracle and server-webapp rule sets to provide coverage for emerging threats from these technologies.
In order to subscribe now to Talos's newest rule detection functionality, you can subscribe for as low as $29 US dollars a year for personal users, be sure and see our business pricing as well at https://www.snort.org/products. Make sure and stay up to date to catch the most emerging threats!

Snort 2.9.7.0 has been released!

Snort 2.9.7.0 is now available on snort.org at
http://www.snort.org/downloads in the Snort Stable Release section.

A new DAQ build is also available that updates support for a few
operating systems.

Snort 2.9.7.0 includes a major new feature for Application Identification, our OpenAppID capability.

In conjunction with this release, are shifting the license for the OpenAppId content to GPLv2 to encourage more use and submission back to Cisco. If you are interested in learning and writing OpenAppId content, please join us on the OpenAppId mailing list at https://www.snort.org/community. Any submissions to the OpenAppId ecosystem will receive public thanks and perhaps some nice swag!

2014-10-24 - Snort 2.9.7.0
[*] New additions
* Application Identification Preprocessor, when used in conjunction with
OpenAppID detector content, that will identify application protocol,
client, server, and web applications (including those using SSL) and
include the info in Snort alert data. In addition, a new rule option
keyword 'appid' that can be used to constrain Snort rules based on one
or more applications that are identified for the connection. Separate
prepackaged RPMs with App Open ID are available. See README.appid
for further details.

* A new protected_content rule option that is used to match against a
content that is hashed. It can be used to obscure the full context
of the rule from the administrator.

* Protocol Aware Flushing (PAF) improvements for SMTP, POP, and IMAP to
more accurately process different portions of email messages and file
attachments.

* Added ability to test normalization behavior without modifying
network traffic. When configured using na_policy_mode:inline-test,
statistics will be gathered on packet normalizations that would have
occurred, allowing less disruptive testing of inline deployments.

* The HTTP Inspection preprocessor now has the ability to decompress
DEFLATE and LZMA compressed flash content and DEFLATE compressed PDF
content from http responses when configured with the new
decompress_swf and decompress_pdf options. This enhancement can be
used with existing rule options that already match against
decompressed equivalents.

* Added improved XFF support to HttpInspect. It is now possible to
specify custom HTTP headers to use in place of 'X-Forwarded-For'. In
situations where traffic may contain multiple XFF-like headers, it is
possible to specify which headers hold precedence.

* Added additional support for Heartbleed detection within the SSL
preprocessor to improve performance.

* Added control socket command to dump packets to a file. See
README.snort_dump_packets_control for details.

* Added an option to suppress configuration information logging to
output.

* The Stream5 preprocessor functionality is now split between the new
Session and Stream6 preprocessors.

[*] Improvements
* Maximum IP6 extensions decoded is now configurable.

* Update active response to allow for responses of 1500+ bytes that span
multiple TCP packets.

* Check limits of multiple configurations to not exceed a maximum ID of
4095.

* Updated the error output of byte_test, byte_jump, byte_extract to
including details on offending options for a given rule.

* Update build and install scripts to install preprocessor and engine
libraries into user specified libdir.

* Improved performance of IP Reputation preprocessor.

* The control socket will now report success when reloading empty IP
Reputation whitelists/blacklists.

* All TCP normalizations can now be enabled individually. See
README.normalize for details on using the new options. For
consistency with other options, the "urp" tcp normalization keyword
now enables the normalization instead of disabling it.

* Lowered memory demand of Unicode -> ASCII mapping in HttpInspect.

* Updated profiler output to remove duplicate results when using
multiple configurations.

* Improved performance of FTP reassembly.

* Improved compatibility with Mac OSX 10.9 (Mavericks), OpenBSD,
FreeBSD, and DragonFlyBSD