aboutsummaryrefslogtreecommitdiff
path: root/src/include
Commit message (Collapse)AuthorAge
* Added notes whenever a new flow risk is addedLuca Deri2020-06-26
|
* Added malformed packet risk supportLuca Deri2020-06-26
|
* Values stored in patricia tree are now 32 bit (they used to be 16 bit) longLuca Deri2020-06-26
|
* Added ndpi_bin_XXX APILuca Deri2020-06-22
| | | | Added packet lenght distribution bins
* Fixed API documentation: packet tiestamp is expressed in millisecondsLuca Deri2020-06-18
|
* Merge pull request #919 from lnslbrty/new/protocol/anydeskLuca Deri2020-06-17
|\ | | | | Implemented proprietary AnyDesk protocol
| * Implemented proprietary AnyDesk protocolToni Uhlig2020-06-17
| | | | | | | | Signed-off-by: Toni Uhlig <matzeton@googlemail.com>
* | Add API ndpi_serializer_get_formatAlfredo Cardigliano2020-06-16
|/
* Added DGA risk for names that look like a DGALuca Deri2020-06-11
|
* Added HyperLogLog cardinality estimator API callsLuca Deri2020-06-10
| | | | | | | | | | | | | /* Memory lifecycle */ int ndpi_hll_init(struct ndpi_hll *hll, u_int8_t bits); void ndpi_hll_destroy(struct ndpi_hll *hll); /* Add values */ void ndpi_hll_add(struct ndpi_hll *hll, const char *data, size_t data_len); void ndpi_hll_add_number(struct ndpi_hll *hll, u_int32_t value) ; /* Get cardinality estimation */ double ndpi_hll_count(struct ndpi_hll *hll);
* Updated (C)Luca Deri2020-06-08
|
* Win fixesLuca Deri2020-06-08
|
* Added check in TLS 1.2+ for reporting a risk when TLS is not used to carry HTTPSLuca Deri2020-06-08
|
* Removed some obsolete protocols (battlefield, oscar, pcanywhere, tvants)Luca Deri2020-06-06
|
* Add ndpi_serializer_get_header API (CSV only)Alfredo Cardigliano2020-06-05
|
* Added ndpi_dpi2json() API callLuca Deri2020-06-05
|
* Reworked ndpi_strncasestrLuca Deri2020-05-31
|
* Added support for Encrypted TLS SNI dissectionLuca Deri2020-05-28
| | | | https://datatracker.ietf.org/doc/draft-ietf-tls-sni-encryption/
* Added ndpi_serialize_risk() API functionLuca Deri2020-05-27
|
* Add ndpi_serialize_start_of_list/ndpi_serialize_end_of_list to serialize ↵Alfredo Cardigliano2020-05-25
| | | | simple lists in JSON
* Added stub for checking HTTP headerLuca Deri2020-05-21
| | | | Updated Teams result
* MS Teams uses as underlying protocol for voice/video. This commit adds the ↵Luca Deri2020-05-21
| | | | | | ability to mark as MS Teams all Skype traffic made by a host with active MS Teams flows
* Fixed docstring typos for ndpi_finalize_initalizationToni Uhlig2020-05-17
| | | | Signed-off-by: Toni Uhlig <matzeton@googlemail.com>
* Added check for invalid HTTP URLsLuca Deri2020-05-16
|
* Added check for binary scriptsLuca Deri2020-05-15
| | | | | Added NDPI_HTTP_NUMERIC_IP_HOST risk ndpi_risk moved to 32 bit
* Added NDPI_HTTP_SUSPICIOUS_USER_AGENT ndpi_riskLuca Deri2020-05-15
|
* Added NDPI_TLS_CERTIFICATE_EXPIRED, NDPI_TLS_CERTIFICATE_MISMATCH, to ndpi_riskLuca Deri2020-05-15
|
* Extend packet struct with Content-Disposition HTTP header fieldloures2020-05-14
| | | | and improve HTTP binary transfer mime type check
* Added NDPI_XXX_BIT_16Luca Deri2020-05-11
|
* Added TLS weak cipher and obsolete protocol version detectionLuca Deri2020-05-10
|
* Added detection of self-signed TLS certificatesLuca Deri2020-05-10
|
* Added the ability to detect when a known protocol is using a non-standard portLuca Deri2020-05-10
| | | | Added check to spot executables exchanged via HTTP
* Cleaned hyperscan leftoverLuca Deri2020-05-08
| | | | Added further hyperscan hooks
* Added TLS issuerDN and subjectDNLuca Deri2020-05-07
|
* Fixed category matchingLuca Deri2020-05-06
|
* API cleanup for indetifying explicitly in automa's what we're searching ↵Luca Deri2020-05-06
| | | | | | (protocol or category) Removed hyperscan support that is apperently unused
* Updated automa API to use 32 bit values splits from protocol/categpryLuca Deri2020-05-06
|
* Introduced custom protocols with IP and (optional) port supportLuca Deri2020-05-06
| | | | | | | | | | | | | | | | Example - Single IP address ip:213.75.170.11@CustomProtocol - IP address with CIDR ip:213.75.170.11/32@CustomProtocol - IP address with CIDR and port ip:213.75.170.11/32:443@CustomProtocol Please note that there are some restrictions on the port usage. They have been listed in example/protos.txt
* Updated APILuca Deri2020-05-06
|
* Reworked protocol handling chnging it is u_int16_tLuca Deri2020-05-06
|
* Removed now obsolete MSN protocolLuca Deri2020-05-03
| | | | Added nats.io protocol dissector
* :bulb: implement websocket protocol dissectorLeonn Paiva2020-04-26
|
* Fix some compilation warningsNardi Ivan2020-04-20
|
* Office365 renamed to Microsoft365 (by Microsoft)Luca Deri2020-04-20
|
* Added detection of Microsoft TeamsLuca Deri2020-04-16
|
* Use ndpi_handle_ipv6_extension_headers in reader_utilPhilippe Antoine2020-04-15
|
* Added ndpi_serialize_raw_record() API callLuca Deri2020-04-10
|
* Fix for string serialization with initial empty stringLuca Deri2020-04-03
|
* Compilation fixLuca Deri2020-03-27
|
* Merge pull request #861 from havup/devLuca Deri2020-03-27
|\ | | | | pull request with s7comm