The following edits were also made to the
snort.conf
recently, and we suggest you make the same changes:
- Add Port 81 to
HTTP_PORTS
and also to thehttp_inspect
preprocessor.- Replace your stream5 global line with the following:
preprocessor stream5_global: track_tcp yes, \
track_udp yes, \
track_icmp no, \
max_tcp 262144, \
max_udp 131072, \
max_active_responses 2, \
min_response_seconds 5
- Remove the line "
base 36 no\
" from thehttp_inspect
preprocessor
In VRT's rule release:
The Sourcefire VRT has added and modified multiple rules in the
backdoor, botnet-cnc, dos, exploit, imap, mysql, netbios, oracle,
phishing-spam, policy, smtp, specific-threats, spyware-put, tftp,
web-cgi and web-misc rule sets to provide coverage for emerging threats
from these technologies.
In order to subscribe now to the VRT's newest rule detection functionality, you can subscribe for as low as $29 US dollars a year for personal users, be sure and see our business pricing as well at http://www.snort.org/store. Make sure and stay up to date to catch the most emerging threats!