The following edits were also made to the
snort.confrecently, and we suggest you make the same changes:
- Add Port 81 to
HTTP_PORTSand also to the
- Replace your stream5 global line with the following:
preprocessor stream5_global: track_tcp yes, \
track_udp yes, \
track_icmp no, \
max_tcp 262144, \
max_udp 131072, \
max_active_responses 2, \
- Remove the line "
base 36 no\" from the
In VRT's rule release:
The Sourcefire VRT has added and modified multiple rules in the
backdoor, botnet-cnc, dos, exploit, imap, mysql, netbios, oracle,
phishing-spam, policy, smtp, specific-threats, spyware-put, tftp,
web-cgi and web-misc rule sets to provide coverage for emerging threats
from these technologies.
In order to subscribe now to the VRT's newest rule detection functionality, you can subscribe for as low as $29 US dollars a year for personal users, be sure and see our business pricing as well at http://www.snort.org/store. Make sure and stay up to date to catch the most emerging threats!