We’re pleased to announce Suricata 4.1.5. This release fixes a number of issues found in the 4.1 branch. Some of the issues are security issues, so upgrading is highly recommended.
This release also adds VXLAN support, contributed by Henrik Lund Kramshoej. This was accepted into the stable branch to support Suricata deployment in AWS. Next GeoIP2 support was contributed by Bill Meeks. This was added to stable as GeoIP1 is end of life and the databases are no longer updated.
Get the release here: https://www.openinfosecfoundation.org/download/suricata-4.1.5.tar.gz
- Feature #3068: protocol parser: vxlan (4.1.x)
- Bug #2841: False positive alerts firing after upgrade suricata 3.0 -> 4.1.0 (4.1.x)
- Bug #2966: filestore (v1 and v2): dropping of “unwanted” files (4.1.x)
- Bug #3008: rust: updated libc crate causes depration warnings (4.1.x)
- Bug #3044: tftp: missing logs because of broken tx handling (4.1.x)
- Bug #3067: GeoIP keyword depends on now discontinued legacy GeoIP database (4.1.x)
- Bug #3094: Fedora rawhide af-packet compilation err (4.1.x)
- Bug #3123: bypass keyword: Suricata 4.1.x Segmentation Faults (4.1.x)
- Bug #3129: Fixes warning about size of integers in string formats (4.1.x)
- Bug #3159: SC_ERR_PCAP_DISPATCH with message “error code -2” upon rule reload completion (4.1.x)
- Bug #3164: Suricata 4.1.4: NSS Shutdown triggers crashes in test mode
- Bug #3168: tls: out of bounds read
- Bug #3170: defrag: out of bounds read
- Bug #3173: ipv4: ts field decoding oob read
- Bug #3175: File_data inspection depth while inspecting base64 decoded data (4.1.x)
- Bug #3184: decode/der: crafted input can lead to resource starvation
- Bug #3186: Multiple Content-Length headers causes HTP_STREAM_ERROR (4.1.x)
- Bug #3187: GET/POST HTTP-request with no Content-Length, http_client_body miss (4.1.x)
Bill Meeks, Henrik Lund Kramshoej, Yujie Zhao, Alexander Bluhm
Sirko Höer — Code Intelligence GmbH, DCSO.
See https://suricata_events.eventbrite.com/ for the current list of planned training sessions.
Suricon 2019 will happen in Amsterdam in little over a month! For tickets, trainings and sponsorships, see: https://suricon.net/
Suricata is a high performance Network Threat Detection, IDS, IPS and Network Security Monitoring engine. Open source and owned by a community run non-profit foundation, the Open Information Security Foundation (OISF). Suricata is developed by OISF, its supporting vendors and the community.
The OISF development team is proud to announce Suricata 1.4.1. This is a major update over the 1.4 release, adding some exiting features, many improvements and fixing some important bugs.
Get the new release here: suricata-1.4.1.tar.gz
The most interesting new feature is the GeoIP support. Great contribution by Ignacio Sanchez. It adds “geoip” rule keyword that allows you to match on source of destination of a packet per country.
- GeoIP keyword, allowing matching on Maxmind’s database, contributed by Ignacio Sanchez (#559)
- Introduce http_host and http_raw_host keywords (#733, #743)
- Add python module for interacting with unix socket (#767)
- Add new unix socket commands: fetching config, counters, basic runtime info (#764, #765)
- Big Napatech support update by Matt Keeler
- Configurable sensor id in unified2 output, contributed by Jake Gionet (#667)
- FreeBSD IPFW fixes by Nikolay Denev
- Add “default” interface setting to capture configuration in yaml (#679)
- Make sure “snaplen” can be set by the user (#680)
- Improve HTTP URI query string normalization (#739)
- Improved error reporting in MD5 loading (#693)
- Improve reference.config parser error reporting (#737)
- Improve build info output to include all configure options (#738)
- Segfault in TLS parsing reported by Charles Smutz (#725)
- Fix crash in teredo decoding, reported by Rmkml (#736)
- fixed UDPv4 packets without checksum being detected as invalid (#760)
- fixed DCE/SMB parsers getting confused in some fragmented cases (#764)
- parsing ipv6 address/subnet parsing in thresholding was fixed by Jamie Strandboge (#697)
- FN: IP-only rule ip_proto not matching for some protocols (#689)
- Fix build failure with other libhtp installs (#688)
- Fix malformed yaml loading leading to a crash (#694)
- Various Mac OS X fixes (#700, #701, #703)
- Fix for autotools on Mac OS X by Jason Ish (#704)
- Fix AF_PACKET under high load not updating stats (#706)
- Ignacio Sanchez
- Matt Keeler — nPulse
- Jake Gionet
- Nikolay Denev
- Jason Ish — Endace
- Jamie Strandboge
- Charles Smutz
Known issues & missing features
As always, we are doing our best to make you aware of continuing development and items within the engine that are not yet complete or optimal. With this in mind, please notice the list we have included of known items we are working on.
Suricata is a high performance Network IDS, IPS and Network Security Monitoring engine. Open Source and owned by a community run non-profit foundation, the Open Information Security Foundation (OISF). Suricata is developed by the OISF, its supporting vendors and the community.