Snort mailing list archives

Sample snort.conf not updated?


From: "Stark, Vernon L." <Vernon.Stark () jhuapl edu>
Date: Wed, 23 Oct 2013 12:35:53 -0400

Did the updates to the sample configurations at http://www.snort.org/vrt/snort-conf-configurations/ get overlooked?  I 
don’t see the new ports (1533 and 8082) in the configuration file for 2.9.4.6.

Vern

From: noreply+feedproxy () google com [mailto:noreply+feedproxy () google com] On Behalf Of Snort.org Blog
Sent: Wednesday, October 23, 2013 12:06 PM
To: Stark, Vernon L.
Subject: Snort

Snort<http://blog.snort.org/>

________________________________

Sourcefire VRT Certified Snort Rules Update for 
10/22/2013<http://feedproxy.google.com/~r/Snort/~3/mbQbdu5vO78/sourcefire-vrt-certified-snort-rules_22.html?utm_source=feedburner&utm_medium=email>

Posted: 22 Oct 2013 10:54 AM PDT
Just released:
Sourcefire VRT Certified Snort Rules Update for 10/22/2013

We welcome the introduction of the newest rule release for 
today<http://www.snort.org/vrt/docs/ruleset_changelogs/changes-2013-10-22.html> from the VRT. In this release we 
introduced 45 new rules and made modifications to 66 additional rules.

There were two changes made to the snort.conf in this release:

The following ports were added to HTTP_PORTS, http_inspect ports, and Stream5's tcp (both) sections:
1533
8082

The Snort.confs on the example page have been updated:
http://www.snort.org/vrt/snort-conf-configurations/

The VRT would like to thank the following individuals for their contributions, their rules are included in the 
Community Ruleset<http://www.snort.org/snort-rules#community>:

Avery Tarasov:
28255
28285
28293
28294
28295
28296
28297

In VRT's rule release:
The Sourcefire VRT has added and modified multiple rules in the app-detect, blacklist, browser-ie, browser-other, 
browser-plugins, exploit-kit, file-java, file-multimedia, file-other, file-pdf, indicator-compromise, malware-backdoor, 
malware-cnc, os-windows, protocol-icmp, protocol-tftp, pua-adware and server-webapp rule sets to provide coverage for 
emerging threats from these technologies.


In order to subscribe now<http://www.snort.org/vrt/buy-a-subscription/> to the VRT's newest rule detection 
functionality, you can subscribe for as low as $29 US dollars a year for personal users, be sure and see our business 
pricing as well at http://www.snort.org/store. Make sure and stay up to date to catch the most emerging threats!
[cid:~WRD000.jpg]<http://feeds.feedburner.com/~ff/Snort?a=mbQbdu5vO78:6FxjLAsXYKQ:yIl2AUoC8zA>[cid:~WRD000.jpg]<http://feeds.feedburner.com/~ff/Snort?a=mbQbdu5vO78:6FxjLAsXYKQ:qj6IDK7rITs>[cid:~WRD000.jpg]<http://feeds.feedburner.com/~ff/Snort?a=mbQbdu5vO78:6FxjLAsXYKQ:V_sGLiPBpWU>



You are subscribed to email updates from Snort.org Blog<http://blog.snort.org/>
To stop receiving these emails, you may unsubscribe 
now<http://feedburner.google.com/fb/a/mailunsubscribe?k=QNcctqCGiO9PrC8rVzQFHbI0Phs>.

Email delivery powered by Google

Google Inc., 20 West Kinzie, Chicago IL USA 60610


------------------------------------------------------------------------------
October Webinars: Code for Performance
Free Intel webinars can help you accelerate application performance.
Explore tips for MPI, OpenMP, advanced profiling, and more. Get the most from 
the latest Intel processors and coprocessors. See abstracts and register >
http://pubads.g.doubleclick.net/gampad/clk?id=60135991&iu=/4140/ostg.clktrk
_______________________________________________
Snort-users mailing list
Snort-users () lists sourceforge net
Go to this URL to change user options or unsubscribe:
https://lists.sourceforge.net/lists/listinfo/snort-users
Snort-users list archive:
http://sourceforge.net/mailarchive/forum.php?forum_name=snort-users

Please visit http://blog.snort.org to stay current on all the latest Snort news!

Current thread: