"Fossies" - the Fresh Open Source Software Archive  

Source code changes of the file "etc/gen-msg.map" between
snort-2.9.16.1.tar.gz and snort-2.9.17.tar.gz

About: Snort is a network intrusion prevention and detection system (IDS/IPS) combining the benefits of signature, protocol and anomaly-based inspection.

gen-msg.map  (snort-2.9.16.1):gen-msg.map  (snort-2.9.17)
skipping to change at line 170 skipping to change at line 170
116 || 289 || snort_decoder: WARNING: ICMPv6 router solicitation packet with the reserved field not equal to 0 116 || 289 || snort_decoder: WARNING: ICMPv6 router solicitation packet with the reserved field not equal to 0
116 || 290 || snort_decoder: WARNING: ICMPv6 router advertisement packet with th e reachable time field set > 1 hour 116 || 290 || snort_decoder: WARNING: ICMPv6 router advertisement packet with th e reachable time field set > 1 hour
116 || 291 || snort_decoder: WARNING: IPV6 tunneled over IPv4, IPv6 header trunc ated, possible Linux Kernel attack 116 || 291 || snort_decoder: WARNING: IPV6 tunneled over IPv4, IPv6 header trunc ated, possible Linux Kernel attack
116 || 292 || snort_decoder: WARNING: IPv6 header has destination options follow ed by a routing header 116 || 292 || snort_decoder: WARNING: IPv6 header has destination options follow ed by a routing header
116 || 293 || snort_decoder: WARNING: Two or more IP (v4 and/or v6) encapsulatio n layers present 116 || 293 || snort_decoder: WARNING: Two or more IP (v4 and/or v6) encapsulatio n layers present
116 || 294 || snort_decoder: WARNING: truncated Encapsulated Security Payload (E SP) header 116 || 294 || snort_decoder: WARNING: truncated Encapsulated Security Payload (E SP) header
116 || 295 || snort_decoder: WARNING: IPv6 header includes an option which is to o big for the containing header. 116 || 295 || snort_decoder: WARNING: IPv6 header includes an option which is to o big for the containing header.
116 || 296 || snort_decoder: WARNING: IPv6 packet includes out-of-order extensio n headers 116 || 296 || snort_decoder: WARNING: IPv6 packet includes out-of-order extensio n headers
116 || 297 || snort_decoder: WARNING: Two or more GTP encapsulation layers are p resent 116 || 297 || snort_decoder: WARNING: Two or more GTP encapsulation layers are p resent
116 || 298 || snort_decoder: WARNING: GTP header length is invalid 116 || 298 || snort_decoder: WARNING: GTP header length is invalid
116 || 300 || snort_decoder: WARNING: Too many levels for decoding
116 || 400 || snort_decoder: WARNING: XMAS Attack Detected 116 || 400 || snort_decoder: WARNING: XMAS Attack Detected
116 || 401 || snort_decoder: WARNING: Nmap XMAS Attack Detected 116 || 401 || snort_decoder: WARNING: Nmap XMAS Attack Detected
116 || 402 || snort_decoder: WARNING: DOS NAPTHA Vulnerability Detected 116 || 402 || snort_decoder: WARNING: DOS NAPTHA Vulnerability Detected
116 || 403 || snort_decoder: WARNING: Bad Traffic SYN to multicast address 116 || 403 || snort_decoder: WARNING: Bad Traffic SYN to multicast address
116 || 404 || snort_decoder: WARNING: IPV4 packet with zero TTL 116 || 404 || snort_decoder: WARNING: IPV4 packet with zero TTL
116 || 405 || snort_decoder: WARNING: IPV4 packet with bad frag bits (Both MF an d DF set) 116 || 405 || snort_decoder: WARNING: IPV4 packet with bad frag bits (Both MF an d DF set)
116 || 406 || snort_decoder: WARNING: Invalid IPv6 UDP packet, checksum zero 116 || 406 || snort_decoder: WARNING: Invalid IPv6 UDP packet, checksum zero
116 || 407 || snort_decoder: WARNING: IPV4 packet frag offset + length exceed ma ximum 116 || 407 || snort_decoder: WARNING: IPV4 packet frag offset + length exceed ma ximum
116 || 408 || snort_decoder: WARNING: IPV4 packet from 'current net' source addr ess 116 || 408 || snort_decoder: WARNING: IPV4 packet from 'current net' source addr ess
116 || 409 || snort_decoder: WARNING: IPV4 packet to 'current net' dest address 116 || 409 || snort_decoder: WARNING: IPV4 packet to 'current net' dest address
skipping to change at line 272 skipping to change at line 273
119 || 25 || http_inspect: HOSTNAME EXCEEDS 255 CHARACTERS 119 || 25 || http_inspect: HOSTNAME EXCEEDS 255 CHARACTERS
119 || 26 || http_inspect: HEADER PARSING SPACE SATURATION 119 || 26 || http_inspect: HEADER PARSING SPACE SATURATION
119 || 27 || http_inspect: CHUNKED ENCODING - EXCESSIVE CONSECUTIVE SMALL CHUNKS 119 || 27 || http_inspect: CHUNKED ENCODING - EXCESSIVE CONSECUTIVE SMALL CHUNKS
119 || 28 || http_inspect: POST W/O CONTENT-LENGTH OR CHUNKS 119 || 28 || http_inspect: POST W/O CONTENT-LENGTH OR CHUNKS
119 || 29 || http_inspect: MULTIPLE TRUE IPS IN A SESSION 119 || 29 || http_inspect: MULTIPLE TRUE IPS IN A SESSION
119 || 30 || http_inspect: BOTH TRUE_CLIENT_IP AND XFF HDRS PRESENT 119 || 30 || http_inspect: BOTH TRUE_CLIENT_IP AND XFF HDRS PRESENT
119 || 31 || http_inspect: UNKNOWN METHOD 119 || 31 || http_inspect: UNKNOWN METHOD
119 || 32 || http_inspect: SIMPLE REQUEST 119 || 32 || http_inspect: SIMPLE REQUEST
119 || 33 || http_inspect: UNESCAPED SPACE IN HTTP URI 119 || 33 || http_inspect: UNESCAPED SPACE IN HTTP URI
119 || 34 || http_inspect: TOO MANY PIPELINED REQUESTS 119 || 34 || http_inspect: TOO MANY PIPELINED REQUESTS
119 || 36 || http_inspect: INVALID RANGE UNIT FORMAT
119 || 37 || http_inspect: RANGE FIELD PRESENT IN NON GET METHOD
119 || 38 || http_inspect: ERROR IN RANGE FIELD OF REQUEST HEADER
120 || 1 || http_inspect: ANOMALOUS HTTP SERVER ON UNDEFINED HTTP PORT 120 || 1 || http_inspect: ANOMALOUS HTTP SERVER ON UNDEFINED HTTP PORT
120 || 2 || http_inspect: INVALID STATUS CODE IN HTTP RESPONSE 120 || 2 || http_inspect: INVALID STATUS CODE IN HTTP RESPONSE
120 || 3 || http_inspect: NO CONTENT-LENGTH OR TRANSFER-ENCODING IN HTTP RESPONS E 120 || 3 || http_inspect: NO CONTENT-LENGTH OR TRANSFER-ENCODING IN HTTP RESPONS E
120 || 4 || http_inspect: HTTP RESPONSE HAS UTF CHARSET WHICH FAILED TO NORMALIZ E 120 || 4 || http_inspect: HTTP RESPONSE HAS UTF CHARSET WHICH FAILED TO NORMALIZ E
120 || 5 || http_inspect: HTTP RESPONSE HAS UTF-7 CHARSET 120 || 5 || http_inspect: HTTP RESPONSE HAS UTF-7 CHARSET
120 || 6 || http_inspect: HTTP RESPONSE GZIP DECOMPRESSION FAILED 120 || 6 || http_inspect: HTTP RESPONSE GZIP DECOMPRESSION FAILED
120 || 7 || http_inspect: CHUNKED ENCODING - EXCESSIVE CONSECUTIVE SMALL CHUNKS 120 || 7 || http_inspect: CHUNKED ENCODING - EXCESSIVE CONSECUTIVE SMALL CHUNKS
120 || 8 || http_inspect: MESSAGE WITH INVALID CONTENT-LENGTH OR CHUNK SIZE 120 || 8 || http_inspect: MESSAGE WITH INVALID CONTENT-LENGTH OR CHUNK SIZE
120 || 9 || http_inspect: JAVASCRIPT OBFUSCATION LEVELS EXCEEDS 1 120 || 9 || http_inspect: JAVASCRIPT OBFUSCATION LEVELS EXCEEDS 1
120 || 10 || http_inspect: JAVASCRIPT WHITESPACES EXCEEDS MAX ALLOWED 120 || 10 || http_inspect: JAVASCRIPT WHITESPACES EXCEEDS MAX ALLOWED
skipping to change at line 301 skipping to change at line 305
120 || 20 || http_inspect: MULTIPLE CONTENT ENCODING IN HTTP RESPONSE 120 || 20 || http_inspect: MULTIPLE CONTENT ENCODING IN HTTP RESPONSE
120 || 21 || http_inspect: MULTIPLE COLON BETWEEN KEY AND VALUE IN HTTP RESPONSE HEADER 120 || 21 || http_inspect: MULTIPLE COLON BETWEEN KEY AND VALUE IN HTTP RESPONSE HEADER
120 || 22 || http_inspect: INVALID CHARACTER BETWEEN KEY AND VALUE IN HTTP RESPO NSE HEADER 120 || 22 || http_inspect: INVALID CHARACTER BETWEEN KEY AND VALUE IN HTTP RESPO NSE HEADER
120 || 23 || http_inspect: TRANSFER ENCODING:CHUNKED IN HTTP 1.0 REQUEST/RESPONS E HEADER 120 || 23 || http_inspect: TRANSFER ENCODING:CHUNKED IN HTTP 1.0 REQUEST/RESPONS E HEADER
120 || 24 || http_inspect: PARTIAL DECOMPRESSION FAILURE IN HTTP RESPONSE BODY 120 || 24 || http_inspect: PARTIAL DECOMPRESSION FAILURE IN HTTP RESPONSE BODY
120 || 25 || http_inspect: INVALID HEADER FOLDING 120 || 25 || http_inspect: INVALID HEADER FOLDING
120 || 26 || http_inspect: JUNK LINE BEFORE HTTP RESPONSE HEADER 120 || 26 || http_inspect: JUNK LINE BEFORE HTTP RESPONSE HEADER
120 || 27 || http_inspect: NO END OF HEADER IN HTTP RESPONSE 120 || 27 || http_inspect: NO END OF HEADER IN HTTP RESPONSE
120 || 28 || http_inspect: INVALID CHUNK SIZE OR CHUNK SIZE FOLLOWED BY JUNK CHA RACTERS 120 || 28 || http_inspect: INVALID CHUNK SIZE OR CHUNK SIZE FOLLOWED BY JUNK CHA RACTERS
120 || 29 || http_inspect: INVALID VERSION IN HTTP RESPONSE HEADER 120 || 29 || http_inspect: INVALID VERSION IN HTTP RESPONSE HEADER
120 || 30 || http_inspect: INVALID CONTENT RANGE UNIT FORMAT
120 || 31 || http_inspect: ERROR IN RANGE FIELD OF RESPONSE HEADER
121 || 1 || flow-portscan: Fixed Scale Scanner Limit Exceeded 121 || 1 || flow-portscan: Fixed Scale Scanner Limit Exceeded
121 || 2 || flow-portscan: Sliding Scale Scanner Limit Exceeded 121 || 2 || flow-portscan: Sliding Scale Scanner Limit Exceeded
121 || 3 || flow-portscan: Fixed Scale Talker Limit Exceeded 121 || 3 || flow-portscan: Fixed Scale Talker Limit Exceeded
121 || 4 || flow-portscan: Sliding Scale Talker Limit Exceeded 121 || 4 || flow-portscan: Sliding Scale Talker Limit Exceeded
122 || 1 || portscan: TCP Portscan 122 || 1 || portscan: TCP Portscan
122 || 2 || portscan: TCP Decoy Portscan 122 || 2 || portscan: TCP Decoy Portscan
122 || 3 || portscan: TCP Portsweep 122 || 3 || portscan: TCP Portsweep
122 || 4 || portscan: TCP Distributed Portscan 122 || 4 || portscan: TCP Distributed Portscan
122 || 5 || portscan: TCP Filtered Portscan 122 || 5 || portscan: TCP Filtered Portscan
122 || 6 || portscan: TCP Filtered Decoy Portscan 122 || 6 || portscan: TCP Filtered Decoy Portscan
 End of changes. 3 change blocks. 
0 lines changed or deleted 6 lines changed or added

Home  |  About  |  Features  |  All  |  Newest  |  Dox  |  Diffs  |  RSS Feeds  |  Screenshots  |  Comments  |  Imprint  |  Privacy  |  HTTP(S)