Tag Archive | suricata

Suricata 6.0.0 beta 1 released

We’re happy to announce Suricata 6.0.0 beta 1. This is a test version for a new major feature release of Suricata.

Originally planned to be released as a release candidate we wanted to get a few more interesting things in that are still a bit rough around the edges. So the plan is now to release 6.0RC1 early September and then the final late September.

We are hoping for some of you to take this beta and test it in your environment and report any issues to us.

Get the release here:
https://www.openinfosecfoundation.org/downloads/suricata-6.0.0-beta1.tar.gz

Major changes

– initial HTTP/2 support
– DCERPC logging
– much improved EVE logging performance
– RFB and MQTT protocol support, including detection and logging
– HASSH support
– conditional logging

Power of the community

Several features and improvements have been made by community members:

– MQTT (Sascha Steinbiss)
– RFB (Frank Honza)
– HASSH (Vadym Malakhatko)
– ASN.1 Rust (Pierre Chifflier and Emmanuel Thompson)
– cbindgen (Danny Browning)
– nom 5 conversion (Pierre Chifflier)
– Napatech bypass support (Phil Young)
– MAC address logging in EVE (Sascha Steinbiss)

List of git committers:

Pierre Chifflier, Sascha Steinbiss, Emmanuel Thompson, Todd Mortimer,
Phil Young, Vadym Malakhatko, Jason Taylor, James Dutrisac, Zach Kelly,
Joshua Lumb, Angelo Mirabella, Antti Tönkyrä, Danny Browning,
Frank Honza, Giuseppe Longo, Roland Fischer, Stephen Donnelly,
Timo Sigurdsson, Tristan Fletcher, William Stearns, Xiaofan Wang,
Zackeus Bengtsson

Notable Optimizations

– faster EVE log generation using our own Rust language JSON string builder
– much better EVE log scaling by allowing a log file per thread
– flow engine improvments – esp when under resource constraints

Removals

– unified2 has been removed
– filestore v1 has support has been removed
– drop log

Securing Suricata

– ASN1 handling is now entirely done in Rust code
– DCERPC, SSH have been reimplemented in Rust
– new protocols have been implemented in Rust

Rule language

– from_end support for byte_jump keyword
– bitmask support for byte_test keyword
– byte_math support
– flowbit OR support
– pcrexform keyword: use pcre with substring capture as a transform
– urldecode transform was added

For developers

– Use cbindgen to create Rust-C bindings (Danny Browning)
– initial plugin support
– libfuzzer (oss-fuzz) support

Forums

Join our new Forum at https://forum.suricata.io/

About Suricata

Suricata is a high performance Network Threat Detection, IDS, IPS and Network Security Monitoring engine. Open source and owned by a community run non-profit foundation, the Open Information Security Foundation (OISF). Suricata is developed by OISF, its supporting vendors and the community.

Suricata 5.0.3 released

We are pleased to announce the release of Suricata 5.0.3. This is a larger than usual point release, with a number of important fixes.

This is the first release after Suricata joined the Oss-Fuzz program, leading to discovery of a number of (potential) security issues. We expect that in the coming months we’ll fix more such issues, as the fuzzers increase their coverage and we continue to improve the seed corpus.

Get the release here: https://www.openinfosecfoundation.org/download/suricata-5.0.3.tar.gz

Changes

  • Feature #3481: GRE ERSPAN Type 1 Support
  • Feature #3613: Teredo port configuration
  • Feature #3673: datasets: add ‘dataset-remove’ unix command
  • Bug #3240: Dataset hash-size or prealloc invalid value logging
  • Bug #3241: Dataset reputation invalid value logging
  • Bug #3342: Suricata 5.0 crashes while parsing SMB data
  • Bug #3450: signature with sticky buffer with subsequent pcre check in a different buffer loads but will never match
  • Bug #3491: Backport 5 BUG_ON(strcasecmp(str, “any”) in DetectAddressParseString
  • Bug #3507: rule parsing: memory leaks
  • Bug #3526: 5.0.x Kerberos vulnerable to TCP splitting evasion
  • Bug #3534: Skip over ERF_TYPE_META records
  • Bug #3552: file logging: complete files sometimes marked ‘TRUNCATED’
  • Bug #3571: rust: smb compile warnings
  • Bug #3573: TCP Fast Open – Bypass of stateless alerts
  • Bug #3574: Behavior for tcp fastopen
  • Bug #3576: Segfault when facing malformed SNMP rules
  • Bug #3577: SIP: Input not parsed when header values contain trailing spaces
  • Bug #3580: Faulty signature with two threshold keywords does not generate an error and never match
  • Bug #3582: random failures on sip and http-evader suricata-verify tests
  • Bug #3585: htp: asan issue
  • Bug #3592: Segfault on SMTP TLS
  • Bug #3598: rules: memory leaks in pktvar keyword
  • Bug #3600: rules: bad address block leads to stack exhaustion
  • Bug #3602: rules: crash on ‘internal’-only keywords
  • Bug #3604: rules: missing ‘consumption’ of transforms before pkt_data would lead to crash
  • Bug #3606: rules: minor memory leak involving pcre_get_substring
  • Bug #3609: ssl/tls: ASAN issue in SSLv3ParseHandshakeType
  • Bug #3610: defrag: asan issue
  • Bug #3612: rules/bsize: memory issue during parsing
  • Bug #3614: build-info and configure wrongly display libnss status
  • Bug #3644: Invalid memory read on malformed rule with Lua script
  • Bug #3646: rules: memory leaks on failed rules
  • Bug #3649: CIDR Parsing Issue
  • Bug #3651: FTP response buffering against TCP stream
  • Bug #3653: Recursion stack-overflow in parsing YAML configuration
  • Bug #3660: Multiple DetectEngineReload and bad insertion into linked list lead to buffer overflow
  • Bug #3665: FTP: Incorrect ftp_memuse calculation.
  • Bug #3667: Signature with an IP range creates one IPOnlyCIDRItem by signe IP address
  • Bug #3669: Rules reload with Napatech can hang Suricata UNIX manager process
  • Bug #3672: coverity: data directory handling issues
  • Bug #3674: Protocol detection evasion by packet splitting
  • Optimization #3406: filestore rules are loaded without warning when filestore is not enabled
  • Task #3478: libhtp 0.5.33
  • Task #3514: SMTP should place restraints on variable length items (e.g., filenames)
  • Documentation #3543: doc: add ipv4.hdr and ipv6.hdr
  • Bundled libhtp 0.5.33
  • Bundled Suricata-Update 1.1.2

Special thanks

Oss-Fuzz, Coverity Scan, Sascha Steinbiss, Stephen Donnelly, Jason Taylor

Free Webinar

Join our Free webinar on Hunting Threats in Encrypted traffic: https://suricata-ids.org/2020/04/14/webinar-hunting-threats-that-use-encrypted-network-traffic-with-suricata/

Forums

Join our new Forum at https://forum.suricata.io/

About Suricata

Suricata is a high performance Network Threat Detection, IDS, IPS and Network Security Monitoring engine. Open source and owned by a community run non-profit foundation, the Open Information Security Foundation (OISF). Suricata is developed by OISF, its supporting vendors and the community.

Suricata 4.1.8 released

We’re pleased to announce the release of Suricata 4.1.8. This is a larger than usual point release, with a number of important fixes.

This is the first release after Suricata joined the Oss-Fuzz program, leading to discovery of a number of (potential) security issues. We expect that in the coming months we’ll fix more such issues, as the fuzzers increase their coverage and we continue to improve the seed corpus.

Get the release here: https://www.openinfosecfoundation.org/download/suricata-4.1.8.tar.gz

As announced last month, we’re keeping the 4.1 branch supported longer than originally planned. See: https://suricata-ids.org/2020/03/25/suricata-4-1-eol-update-support-extended/

Changes

  • Bug #3492: Backport 4 BUG_ON(strcasecmp(str, “any”) in DetectAddressParseString
  • Bug #3508: rule parsing: memory leaks
  • Bug #3527: 4.1.x Kerberos vulnerable to TCP splitting evasion
  • Bug #3533: Skip over ERF_TYPE_META records
  • Bug #3551: file logging: complete files sometimes marked ‘TRUNCATED’
  • Bug #3572: rust: smb compile warnings
  • Bug #3579: Faulty signature with two threshold keywords does not generate an error and never match
  • Bug #3581: random failures on sip and http-evader suricata-verify tests
  • Bug #3596: ftp: asan detects leaks of expectations
  • Bug #3599: rules: memory leaks in pktvar keyword
  • Bug #3601: rules: bad address block leads to stack exhaustion
  • Bug #3603: rules: crash on ‘internal’-only keywords
  • Bug #3605: rules: missing ‘consumption’ of transforms before pkt_data would lead to crash
  • Bug #3607: rules: minor memory leak involving pcre_get_substring
  • Bug #3608: ssl/tls: ASAN issue in SSLv3ParseHandshakeType
  • Bug #3611: defrag: asan issue
  • Bug #3633: file-store.stream-depth not working as expected when configured to a specfic value (4.1.x)
  • Bug #3645: Invalid memory read on malformed rule with Lua script
  • Bug #3647: rules: memory leaks on failed rules
  • Bug #3648: CIDR Parsing Issue
  • Bug #3650: FTP response buffering against TCP stream
  • Bug #3652: Recursion stack-overflow in parsing YAML configuration
  • Bug #3659: Multiple DetectEngineReload and bad insertion into linked list lead to buffer overflow
  • Bug #3666: FTP: Incorrect ftp_memuse calculation.
  • Bug #3668: Signature with an IP range creates one IPOnlyCIDRItem by signe IP address
  • Bug #3671: Protocol detection evasion by packet splitting
  • Bug #3676: Segfault on SMTP TLS
  • Feature #3482: GRE ERSPAN Type 1 Support
  • Task #3479: libhtp 0.5.33 (4.1.x)
  • Task #3513: SMTP should place restraints on variable length items (e.g., filenames)
  • Bundled libhtp 0.5.33
  • Bundled Suricata-Update 1.0.7

Special thanks

Oss-Fuzz, Coverity Scan, Giuseppe Longo, Stephen Donnelly

Free Webinar

Join our Free webinar on Hunting Threats in Encrypted traffic: https://suricata-ids.org/2020/04/14/webinar-hunting-threats-that-use-encrypted-network-traffic-with-suricata/

Forums

Join our new Forum at https://forum.suricata.io/

About Suricata

Suricata is a high performance Network Threat Detection, IDS, IPS and Network Security Monitoring engine. Open source and owned by a community run non-profit foundation, the Open Information Security Foundation (OISF). Suricata is developed by OISF, its supporting vendors and the community.

Suricata 4.1 EOL update: support extended

Just a quick note that we’re planning to keep the 4.1 branch supported until at least the end of the year. We understand that lots of organizations are going through various levels of disruption currently.

Normally we’d announce the EOL date for 4.1 right about now, but we understand that upgrades like this may not be a priority in your organization, or that the risk of causing service disruptions is considered too high in the current situation.

As the end of 2020 nears we’ll provide another update on our 4.1 plans.

5.0, our current stable branch, will naturally be supported as well.

Work on the upcoming 6.0 is progressing nicely. The Suricata Dev team is already a virtual team with most of us routinely working from home, so disruption for us has so far been minimal.

Stay healthy!

Announcing forum.suricata.io

We’re happy to announce that for Suricata we’re going to trial a Discourse setup. Discourse is a “place for civilized discussion”. It is used by others in the open source community, such as Mozilla and the Rust Language project.

Join at https://forum.suricata.io/

Reasons for choosing Discourse

Easy to get started for users: the default forum style interface makes it easy to start interacting with the community. It also directly gives access to (participating in) discussions that predate the registration, something that is much harder in the current mailing lists. By enabling a number of ‘social logins’, signing up is also easy.

Trial goals

Goals of the trial are finding out how the community would use this platform, how we can manage it against various forms of unwanted activity and if we can see an uptick of users. Next to this we want to use the trial period to adjust settings, experiment with plugins and themes.

Trial steps

During the trial we will use the hosted version of Discourse, which is hosted by the developers of the platform. During the trial or at the end of the trial we’ll evaluate how well this worked for us. Discourse can also be self-hosted.

The trial will run until June 1st. Assuming the trial is successful, we will then start a transition phase where we will discourage the use of the old mailinglists. End of summer / early fall we’ll then disable them completely. We will keep the archives online of course.

Mailinglist

For people who dislike forums or in general dislike web based interfaces, Discourse offers a special ‘mailing list mode’. In this mode you can receive posts as emails, reply to them and start new topics as well. The mailinglist mode can be activated in the ‘preferences’ page of your account.

See https://forum.suricata.io/t/mailinglist-mode

Feedback

In the ‘Site Feedback’ category you can give feedback on the setup, predefined categories, moderation, etc. Please use this if you feel there are things that can be done to improve the usefulness of the platform.

See: https://forum.suricata.io/c/site-feedback/

Hope to see you at https://forum.suricata.io/

Suricata 5.0.2 released

We’re pleased to announce Suricata 5.0.2. This release fixes a number of issues found in the 5.0 branch.

Get the release here: https://www.openinfosecfoundation.org/download/suricata-5.0.2.tar.gz

Changes

  • Bug #2993: Suricata 5.0.0beta1 memory allocation of 4294966034 bytes failed
  • Bug #3380: Segfault when using multi-detect
  • Bug #3400: smb: post-GAP file tx handling
  • Bug #3424: nfs: post-GAP some transactions never close
  • Bug #3425: nfs: post-GAP file tx handling
  • Bug #3433: coverity: CID 1456679: Memory – corruptions (NEGATIVE_RETURNS)
  • Bug #3434: coverity: CID 1456680: Incorrect expression (IDENTICAL_BRANCHES)
  • Bug #3469: gcc10: compilation failure unless -fcommon is supplied (5.0.x)
  • Bug #3473: Dropping privileges does not work with NFLOG (5.0.x)
  • Documentation #3423: readthedocs shows title of documentation as “Suricata unknown documentation”

Special thanks

Jason Taylor, Timo Sigurdsson, vanlink

About Suricata

Suricata is a high performance Network Threat Detection, IDS, IPS and Network Security Monitoring engine. Open source and owned by a community run non-profit foundation, the Open Information Security Foundation (OISF). Suricata is developed by OISF, its supporting vendors and the community.

Suricata 4.1.7 released

We’re pleased to announce Suricata 4.1.7. This release fixes a number of issues found in the 4.1 branch.

Get the release here: https://www.openinfosecfoundation.org/download/suricata-4.1.7.tar.gz

Changes

  • Bug #3417: –disable-geoip does not work (4.1.x)
  • Bug #3448: Suricata 4.1 Seg Fault: Socket Control pcap-file and corrupt pcap
  • Bug #3452: smb: post-GAP file tx handling (4.1.x)
  • Bug #3453: coverity: CID 1456680: Incorrect expression (IDENTICAL_BRANCHES) (4.1.x)
  • Bug #3470: gcc10: compilation failure unless -fcommon is supplied (4.1.x)
  • Bug #3471: nfs: post-GAP some transactions never close (4.1.x)
  • Bug #3472: nfs: post-GAP file tx handling (4.1.x)
  • Bug #3474: Dropping privileges does not work with NFLOG (4.1.x)

Special thanks

Danny Browning, Fabrice Fontaine, Timo Sigurdsson, vanlink

About Suricata

Suricata is a high performance Network Threat Detection, IDS, IPS and Network Security Monitoring engine. Open source and owned by a community run non-profit foundation, the Open Information Security Foundation (OISF). Suricata is developed by OISF, its supporting vendors and the community.

Suricata 5.0.1 released

We’re pleased to announce Suricata 5.0.1. This release fixes a number of issues found in the 5.0 branch. There are still a number of open issues that we are working on. See our 5.0.2 target here: https://redmine.openinfosecfoundation.org/versions/142

This release fixes a number of IPv4 and TCP evasion issues reported by Nicolas Adba.

Get the release here: https://www.openinfosecfoundation.org/download/suricata-5.0.1.tar.gz

Changes

  • Bug #1871: intermittent abort()s at shutdown and in unix-socket
  • Bug #2810: enabling add request/response http headers in master
  • Bug #3047: byte_extract does not work in some situations
  • Bug #3073: AC_CHECK_FILE on cross compile
  • Bug #3103: –engine-analysis warning for flow on an icmp request rule
  • Bug #3120: nfq_handle_packet error -1 Resource temporarily unavailable warnings
  • Bug #3237: http_accept not treated as sticky buffer by –engine-analysis
  • Bug #3254: tcp: empty SACK option leads to decoder event
  • Bug #3263: nfq: invalid number of bytes reported
  • Bug #3264: EVE DNS Warning about defaulting to v2 as version is not set.
  • Bug #3266: fast-log: icmp type prints wrong value
  • Bug #3267: Support for tcp.hdr Behavior
  • Bug #3275: address parsing: memory leak in error path
  • Bug #3277: segfault when test a nfs pcap file
  • Bug #3281: Impossible to cross-compile due to AC_CHECK_FILE
  • Bug #3284: hash function for string in dataset is not correct
  • Bug #3286: TCP evasion technique by faking a closed TCP session
  • Bug #3324: TCP evasion technique by overlapping a TCP segment with a fake packet
  • Bug #3328: bad ip option evasion
  • Bug #3340: DNS: DNS over TCP transactions logged with wrong direction.
  • Bug #3341: tcp.hdr content matches don’t work as expected
  • Bug #3345: App-Layer: Not all parsers register TX detect flags that should
  • Bug #3346: BPF filter on command line not honored for pcap file
  • Bug #3362: cross compiling not affecting rust component of surrcata
  • Bug #3376: http: pipelining tx id handling broken
  • Bug #3386: Suricata is unable to get MTU from NIC after 4.1.0
  • Bug #3389: EXTERNAL_NET no longer working in 5.0 as expected
  • Bug #3390: Eve log does not generate pcap_filename when Interacting via unix socket in pcap processing mode
  • Bug #3397: smtp: file tracking issues when more than one attachment in a tx
  • Bug #3398: smtp: ‘raw-message’ option file tracking issues with multi-tx
  • Bug #3399: smb: post-GAP some transactions never close
  • Bug #3401: smb1: ‘event only’ transactions for bad requests never close
  • Bug #3411: detect/asn1: crashes on packets smaller than offset setting
  • Task #3364: configure: Rust 1.37+ has cargo-vendor support bundled into cargo.
  • Documentation #2885: update documentation to indicate -i can be used multiple times
  • Bundle Suricata-Update 1.1.1
  • Bundle Libhtp 0.5.32

Special thanks

Nicolas Adba, Alexander Gozman, Ciprian, Daisu, EmilienCourt, Fabrice Fontaine, Pascal Delalande, Steven Hostetler, Wesley van der Ree, Jason Taylor

Trainings

See https://suricata_events.eventbrite.com/ for the current list of planned training sessions.

About Suricata

Suricata is a high performance Network Threat Detection, IDS, IPS and Network Security Monitoring engine. Open source and owned by a community run non-profit foundation, the Open Information Security Foundation (OISF). Suricata is developed by OISF, its supporting vendors and the community.

Suricata 4.1.6 released

We’re pleased to announce Suricata 4.1.6. This release fixes a number of issues found in the 4.1 branch.

This release fixes a number of IPv4 and TCP evasion issues reported by Nicolas Adba.

Get the release here: https://www.openinfosecfoundation.org/download/suricata-4.1.6.tar.gz

Changes

  • Bug #3276: address parsing: memory leak in error path (4.1.x)
  • Bug #3278: segfault when test a nfs pcap file (4.1.x)
  • Bug #3279: ikev2 enabled in config even if Rust is disabled
  • Bug #3325: lua issues on arm (fedora:29) (4.1.x)
  • Bug #3326: Static build with pcap fails (4.1.x)
  • Bug #3327: tcp: empty SACK option leads to decoder event (4.1.x)
  • Bug #3347: BPF filter on command line not honored for pcap file (4.1.x)
  • Bug #3355: DNS: DNS over TCP transactions logged with wrong direction. (4.1.x)
  • Bug #3356: DHCP: Slow down over time due to lack of detect flags (4.1.x)
  • Bug #3369: byte_extract does not work in some situations (4.1.x)
  • Bug #3385: fast-log: icmp type prints wrong value (4.1.x)
  • Bug #3387: suricata is logging tls log repeatedly if custom mode is enabled (4.1.x)
  • Bug #3388: TLS Lua output does not work without TLS log (4.1.x)
  • Bug #3391: Suricata is unable to get MTU from NIC after 4.1.0 (4.1.x)
  • Bug #3393: http: pipelining tx id handling broken (4.1.x)
  • Bug #3394: TCP evasion technique by overlapping a TCP segment with a fake packet (4.1.x)
  • Bug #3395: TCP evasion technique by faking a closed TCP session (4.1.x)
  • Bug #3402: smb: post-GAP some transactions never close (4.1.x)
  • Bug #3403: smb1: ‘event only’ transactions for bad requests never close (4.1.x)
  • Bug #3404: smtp: file tracking issues when more than one attachment in a tx (4.1.x)
  • Bug #3405: Filehash rule does not fire without filestore keyword
  • Bug #3410: intermittent abort()s at shutdown and in unix-socket (4.1.x)
  • Bug #3412: detect/asn1: crashes on packets smaller than offset setting (4.1.x)
  • Task #3367: configure: Rust 1.37+ has cargo-vendor support bundled into cargo (4.1.x)
  • Bundle Suricata-Update 1.0.6
  • Bundle Libhtp 0.5.32

Special thanks

Nicolas Adba, Mats Klepsland, Fabrice Fontaine

Trainings

See https://suricata_events.eventbrite.com/ for the current list of planned training sessions.

About Suricata

Suricata is a high performance Network Threat Detection, IDS, IPS and Network Security Monitoring engine. Open source and owned by a community run non-profit foundation, the Open Information Security Foundation (OISF). Suricata is developed by OISF, its supporting vendors and the community.

Announcing Suricata 5.0.0

The OISF’s Suricata development team is proud to announce Suricata 5.0.0. This release brings many new features and improvements.

RDP, SNMP, FTP and SIP

Three new protocol parsers and loggers, all community contributions. Zach Kelly created a Rust RDP parser, while Giuseppe Longo created SIP support. Rust master Pierre Chifflier contributed SNMP support. Since RDP and SIP were merged late in our development cycle they are disabled by default in the configuration. For FTP we have added an EVE logging facility.

JA3S

After contributing JA3 support in Suricata 4.1, Mats Klepsland has been working on JA3S support. JA3S is now available to the rule language and in the TLS logging output.

Datasets

Still experimental at this time, the initial work to support datasets is part of this release. It allows matching on large amounts of data. It is controlled from the rule language and will work with any ‘sticky buffer’.

See documentation at https://suricata.readthedocs.io/en/suricata-5.0.0/rules/datasets.html

We’ve already heard of people using this with millions of IOCs.

Documentation

With the help of many community members we’ve been improving the user documentation. Please see: https://suricata.readthedocs.io/en/suricata-5.0.0/

HTTP evader

We’ve been working hard to cover the final set of HTTP evader cases. This work has mostly gone into the bundled libhtp 0.5.31.

Rust

The most visible is that our Rust support is no longer optional. We’re convinced that Rust is a perfect match for Suricata, and we plan to increase its footprint in our code base steadily. By making it mandatory we’re able to remove parallel implementations and focus fully on making the Rust code better.

Protocol Detection

The protocol detection engine has been extended to provide better accuracy as well as support for dealing with asynchronous flows. These async flows are sometimes picked up in the wrong direction and the protocol detection engine can now reverse them.

Decoder Anomaly records in EVE

A new log record type has been added: ‘anomaly’. This logs the stream and decoder events that are set by the packet decoders. This is inspired by Zeeks (Bro) ‘weird’ log.

EVE improvements

VLAN and capture interface is now part of many more EVE records, even if they are flow records or records based on flow time out.

An option to log all HTTP headers to the EVE http records has been added.

Packet Capture

Eric Leblond has been working hard to getting hardware offload support working for eBPF. On Netronome cards the eBPF based flow bypass can now be offloaded to the NIC. As eBPF is becoming a standard in the Linux space, we are hoping to see other hardware offload soon as well.

Netmap support has been rewritten so the more advanced features of netmap, such as vale switches, can be used now.

Napatech usability has been improved.

Rule language: Sticky Buffers

As discussed at the Suricon 2018 brainstorm session, a new rule keyword scheme is being introduced. It takes the existing ‘sticky buffer’ approach with new keyword names to avoid confusion. The new scheme is <proto>.<buffer>, so for example ‘http.uri’ for the URI inspection.

A number of HTTP keywords have been added.

Unified Lua inspection mixed with the sticky buffers has also been implemented.

Python 3

With Python 2’s EOL approaching, we’ve made sure that all Suricata’s python code is Python 3 compliant.

Removals

Following our deprecation policy, we have removed the following parts: the plain text dns.log, the old files-json.log and support for the Tilera architecture.

https://suricata-ids.org/about/deprecation-policy/

All tickets

Beta 1 tickets: https://redmine.openinfosecfoundation.org/versions/115

RC 1 tickets: https://redmine.openinfosecfoundation.org/versions/128

Final tickets: https://redmine.openinfosecfoundation.org/versions/129

Download

https://suricata-ids.org/download/