<div dir="ltr">For clarification, see:<div><br></div><div><a href="https://twitter.com/Regiteric/status/843556651718397952">https://twitter.com/Regiteric/status/843556651718397952</a></div><div><br></div><div>Apparently this will be called http_body_printable? Our analysts are keen on getting this. Thanks again!</div><div><br><div class="gmail_extra"><br><div class="gmail_quote">On Thu, Jun 8, 2017 at 1:51 PM, erik clark <span dir="ltr"><<a href="mailto:philosnef@gmail.com" target="_blank">philosnef@gmail.com</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex"><div dir="ltr">Victor, do we have a rough estimate on when gzip decoded content will be printed out in payload_printable, instead of the raw content? I believe there is a feature request for that (or bug request?) somewhere, but I can't find it and just want to follow up on that request. Thanks!<span class="gmail-HOEnZb"><font color="#888888"><div><br></div><div>Erik</div></font></span></div><div class="gmail-HOEnZb"><div class="gmail-h5"><div class="gmail_extra"><br><div class="gmail_quote">On Wed, Jun 7, 2017 at 12:00 PM,  <span dir="ltr"><<a href="mailto:oisf-users-request@lists.openinfosecfoundation.org" target="_blank">oisf-users-request@lists.<wbr>openinfosecfoundation.org</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">Send Oisf-users mailing list submissions to<br>
        <a href="mailto:oisf-users@lists.openinfosecfoundation.org" target="_blank">oisf-users@lists.openinfosecfo<wbr>undation.org</a><br>
<br>
To subscribe or unsubscribe via the World Wide Web, visit<br>
        <a href="https://lists.openinfosecfoundation.org/mailman/listinfo/oisf-users" rel="noreferrer" target="_blank">https://lists.openinfosecfound<wbr>ation.org/mailman/listinfo/<wbr>oisf-users</a><br>
or, via email, send a message with subject or body 'help' to<br>
        <a href="mailto:oisf-users-request@lists.openinfosecfoundation.org" target="_blank">oisf-users-request@lists.openi<wbr>nfosecfoundation.org</a><br>
<br>
You can reach the person managing the list at<br>
        <a href="mailto:oisf-users-owner@lists.openinfosecfoundation.org" target="_blank">oisf-users-owner@lists.openinf<wbr>osecfoundation.org</a><br>
<br>
When replying, please edit your Subject line so it is more specific<br>
than "Re: Contents of Oisf-users digest..."<br>
<br>
<br>
Today's Topics:<br>
<br>
   1. Suricata 3.2.2 released (Victor Julien)<br>
<br>
<br>
------------------------------<wbr>------------------------------<wbr>----------<br>
<br>
Message: 1<br>
Date: Wed, 7 Jun 2017 15:44:00 +0200<br>
From: Victor Julien <<a href="mailto:victor@inliniac.net" target="_blank">victor@inliniac.net</a>><br>
To: "<a href="mailto:oisf-users@openinfosecfoundation.org" target="_blank">oisf-users@openinfosecfoundat<wbr>ion.org</a>"<br>
        <<a href="mailto:oisf-users@openinfosecfoundation.org" target="_blank">oisf-users@openinfosecfoundat<wbr>ion.org</a>><br>
Subject: [Oisf-users] Suricata 3.2.2 released<br>
Message-ID: <<a href="mailto:669f448e-7937-8363-2b27-b326f25290ff@inliniac.net" target="_blank">669f448e-7937-8363-2b27-b326f<wbr>25290ff@inliniac.net</a>><br>
Content-Type: text/plain; charset=utf-8<br>
<br>
We're pleased to announce *Suricata 3.2.2*. This release fixes a fairly<br>
small number of issues. It also improves the unix-socket runmode by<br>
allowing both 'single' and 'autofp' runmodes to be specified.<br>
<br>
Get the release here:<br>
<a href="https://www.openinfosecfoundation.org/download/suricata-3.2.2.tar.gz" rel="noreferrer" target="_blank">https://www.openinfosecfoundat<wbr>ion.org/download/suricata-3.2.<wbr>2.tar.gz</a><br>
<br>
<br>
*Changes*<br>
<br>
Feature #1675: Support additional runmodes for unix-socket<br>
Bug #2043: 3.2.x backport: make install-full can have race conditions on<br>
OSX.<br>
Bug #2047: af-packet: faulty VLAN handling in tpacket-v3 mode (3.2.x)<br>
Bug #2048: bad checksum 0xffff (3.2.x)<br>
Bug #2052: ippair: xbit unset memory leak (3.2.x)<br>
Bug #2071: file store: file log / file store mismatch with multiple<br>
files (3.2.x)<br>
Bug #2073: app-layer: fix memleak on bad traffic (3.2.x)<br>
Bug #2079: http body handling: failed assertion (3.2.x)<br>
Bug #2085: ippair: pair is direction sensitive (3.2.x)<br>
Bug #2119: 3.2.x - defrag - overlap issue in linux policy<br>
Bug #2122: unix socket: race condition on start up (3.2.x)<br>
<br>
<br>
*Special thanks*<br>
<br>
Jérémy Beaume<br>
Alexander Gozman<br>
Zoltan Herczeg<br>
Jon Zeolla<br>
<br>
<br>
*Trainings*<br>
<br>
User Training in Denver, Colorado. June 20 and 21:<br>
<a href="https://www.eventbrite.com/e/2-day-suricata-training-in-denver-co-tickets-34071732469" rel="noreferrer" target="_blank">https://www.eventbrite.com/e/2<wbr>-day-suricata-training-in-denv<wbr>er-co-tickets-34071732469</a><br>
Hosted by ProtectWise.<br>
<br>
Developer Training in Cork, Ireland. September 11 to 15:<br>
<a href="https://www.eventbrite.com/e/5-day-suricata-developer-training-ireland-tickets-33676049972" rel="noreferrer" target="_blank">https://www.eventbrite.com/e/5<wbr>-day-suricata-developer-traini<wbr>ng-ireland-tickets-33676049972</a><br>
Hosted by FireEye.<br>
<br>
User Training at SuriCon 2017, in Prague:<br>
<a href="https://www.eventbrite.com/e/2-day-suricata-training-suricon-2017-tickets-32303327121" rel="noreferrer" target="_blank">https://www.eventbrite.com/e/2<wbr>-day-suricata-training-suricon<wbr>-2017-tickets-32303327121</a><br>
<br>
<br>
*SuriCon 2017*<br>
<br>
Come meet the Suricata community and development team to discuss all<br>
things Suricata at the third edition of the annual Suricata Conference.<br>
SuriCon 2017 will be in November in Prague: <a href="https://suricon.net" rel="noreferrer" target="_blank">https://suricon.net</a><br>
<br>
<br>
*About Suricata*<br>
<br>
Suricata is a high performance Network Threat Detection, IDS, IPS and<br>
Network Security Monitoring engine. Open Source and owned by a community<br>
run non-profit foundation, the Open Information Security Foundation<br>
(OISF). Suricata is developed by the OISF, its supporting vendors and<br>
the community.<br>
<br>
--<br>
------------------------------<wbr>---------------<br>
Victor Julien<br>
<a href="http://www.inliniac.net/" rel="noreferrer" target="_blank">http://www.inliniac.net/</a><br>
PGP: <a href="http://www.inliniac.net/victorjulien.asc" rel="noreferrer" target="_blank">http://www.inliniac.net/victor<wbr>julien.asc</a><br>
------------------------------<wbr>---------------<br>
<br>
<br>
<br>
------------------------------<br>
<br>
Subject: Digest Footer<br>
<br>
______________________________<wbr>_________________<br>
Oisf-users mailing list<br>
<a href="mailto:Oisf-users@lists.openinfosecfoundation.org" target="_blank">Oisf-users@lists.openinfosecfo<wbr>undation.org</a><br>
<a href="https://lists.openinfosecfoundation.org/mailman/listinfo/oisf-users" rel="noreferrer" target="_blank">https://lists.openinfosecfound<wbr>ation.org/mailman/listinfo/<wbr>oisf-users</a><br>
<br>
<br>
------------------------------<br>
<br>
End of Oisf-users Digest, Vol 91, Issue 6<br>
******************************<wbr>***********<br>
</blockquote></div><br></div>
</div></div></blockquote></div><br></div></div></div>