Commit message (Collapse) | Author | Age | ||
---|---|---|---|---|
... | ||||
* | Skept GREASE in SSL JA3 fingerprint | Luca Deri | 2019-05-13 | |
| | ||||
* | JA3 fixes | Luca Deri | 2019-05-12 | |
| | ||||
* | Disabled debug traces | Luca Deri | 2019-05-11 | |
| | ||||
* | Initial JA3 support (https://github.com/salesforce/ja3) for SSL | Luca Deri | 2019-05-11 | |
| | ||||
* | Hardening fixes for packer parsing | Luca Deri | 2019-05-03 | |
| | ||||
* | Fix DNS rsp_addr missing in some tiny responses | emanuele-f | 2019-04-15 | |
| | ||||
* | Merge pull request #682 from chiehmin/dev | Luca Deri | 2019-04-12 | |
|\ | | | | | Parse HTTP PATCH method | |||
| * | Parse HTTP PATCH method | chiehminw | 2019-03-26 | |
| | | | | | | | | | | | | HTTP PATCH is introduced in RFC 5789 (https://tools.ietf.org/html/rfc5789) Signed-off-by: chiehminw <chiehminw@synology.com> | |||
* | | Merge pull request #694 from pallas/avoid-csgo-short-read | Luca Deri | 2019-04-12 | |
|\ \ | | | | | | | csgo: fix invalid read on short packet | |||
| * | | csgo: fix invalid read on short packet | Derrick Lyndon Pallas | 2019-04-06 | |
| | | | ||||
* | | | Merge pull request #695 from pallas/avoid-memcached-short-read | Luca Deri | 2019-04-12 | |
|\ \ \ | | | | | | | | | memcached: fix invalid read on short packet | |||
| * | | | memcached: fix invalid read on short packet | Derrick Lyndon Pallas | 2019-04-06 | |
| |/ / | ||||
* | | | Tests result fix | Luca | 2019-04-05 | |
|\| | | | | | | | | | | | Merge branch 'dev' of https://github.com/ntop/nDPI into dev | |||
| * | | Implemented ndpi_process_partial_detection() API call to handle partial ↵ | Luca Deri | 2019-04-01 | |
| | | | | | | | | | | | | matches due to the nDPI specified configuration | |||
| * | | Add DNS response address | emanuele-f | 2019-03-29 | |
| |/ | ||||
| * | SSL cleanup | Luca Deri | 2019-03-25 | |
| | | ||||
| * | Merge pull request #681 from chiehmin/certificate-parsing | Luca Deri | 2019-03-23 | |
| |\ | | | | | | | Parse server certificate organization | |||
| | * | we only need one dot to confirm it is a valid domain name | chiehminw | 2019-03-20 | |
| | | | | | | | | | | | | | | | | | | | | | github.com is valid but can not be retreive by server certificate parsing Signed-off-by: chiehminw <chiehminw@synology.com> | |||
| | * | retreive ssl certificate origanization | chiehminw | 2019-03-20 | |
| | | | | | | | | | | | | Signed-off-by: chiehminw <chiehminw@synology.com> | |||
| * | | Merge pull request #678 from madpilot78/FreeBSD_endian.h | Luca Deri | 2019-03-23 | |
| |\ \ | | | | | | | | | The le32toh() function used in some places on BSD OSes requires sys/en… | |||
| | * | | The le32toh() function used in some places on BSD OSes require sys/endian.h ↵ | Guido Falsi | 2019-03-12 | |
| | | | | | | | | | | | | | | | | to be included. | |||
| * | | | Merge pull request #677 from chiehmin/add-http-method-prefix | Luca Deri | 2019-03-23 | |
| |\ \ \ | | | | | | | | | | | Add NDPI prefix for HTTP_METHOD enum to avoid name collisions | |||
| | * | | | Add NDPI prefix for HTTP_METHOD enum to avoid name collisions | chiehminw | 2019-03-12 | |
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | ref: https://stackoverflow.com/questions/35380279/avoid-name-collisions-with-enum-in-c-c99 Signed-off-by: chiehminw <chiehminw@synology.com> | |||
| * | | | | Merge pull request #673 from vel21ripn/dns_fix_name | Luca Deri | 2019-03-23 | |
| |\ \ \ \ | | | | | | | | | | | | | More accurate hostname verification in a DNS query. | |||
| | * | | | | More accurate hostname verification in a DNS query. | Vitaly Lavrov | 2019-02-27 | |
| | | | | | | ||||
| * | | | | | Merge pull request #665 from vel21ripn/whatsapp | Luca Deri | 2019-03-23 | |
| |\ \ \ \ \ | | |_|_|_|/ | |/| | | | | Fix whatsapp signature detecting. | |||
| | * | | | | Fix whatsapp signature detecting. | Vitaly Lavrov | 2019-01-31 | |
| | | | | | | ||||
* | | | | | | Fixed false positive with FTP_DATA protocol | Luca | 2019-04-05 | |
|/ / / / / | | | | | | | | | | | | | | | | | | | | | Added coherency in application protol guess by exploiting the host server name Various protocol optimizations | |||
* | | | | | Improved FTP dissection | Luca Deri | 2019-03-14 | |
| | | | | | ||||
* | | | | | Added fix to avoid FTP false positives | Luca Deri | 2019-03-14 | |
| |_|_|/ |/| | | | ||||
* | | | | Removed categories based on file content | Luca Deri | 2019-03-10 | |
| | | | | ||||
* | | | | Proto cleanup | Luca | 2019-03-08 | |
| |_|/ |/| | | ||||
* | | | Fixes possibly broken dissection of invalid DNS responses | Simone Mainardi | 2019-03-04 | |
| | | | ||||
* | | | Fixed false positive mining detection | Luca | 2019-03-01 | |
| |/ |/| | ||||
* | | Improved MDNS dissection | Luca Deri | 2019-02-24 | |
| | | ||||
* | | Fix invalid TCP DNS dissection | emanuele-f | 2019-02-19 | |
| | | ||||
* | | Aligned DNS to HTTP dissection | Luca Deri | 2019-02-07 | |
|/ | ||||
* | Improved HTTP response code handling | Luca Deri | 2019-01-23 | |
| | ||||
* | Merge pull request #659 from cavedon/direction-endianness | Luca Deri | 2019-01-20 | |
|\ | | | | | Compute packet_direction consistently independently from endianness | |||
| * | QUIC: convert little endian offsets to host endianness | Ludovico Cavedon | 2019-01-15 | |
| | | | | | | | | | | | | | | Offset in the QUIC protocol are little endian. Reading them as uint32_t works on little endian architectures, but breaks on big endian ones. This change applies the proper conversion and fixes running the http_ipv6 and quic tests on big endian architectures. | |||
* | | Removed debug code | Luca Deri | 2019-01-17 | |
| | | ||||
* | | Merge branch 'dev' of https://github.com/ntop/nDPI into dev | Luca Deri | 2019-01-17 | |
|\ \ | ||||
| * | | Warnign fixes | Luca Deri | 2019-01-17 | |
| | | | | | | | | | | | | Updated test results | |||
* | | | Removed this party LRU and replaced with home grown | Luca Deri | 2019-01-17 | |
|/ / | ||||
* / | Disabled ookla statistics: needs to be improved | Luca Deri | 2019-01-16 | |
|/ | ||||
* | Fixes ookla lru cache use with IPv6 | Simone Mainardi | 2019-01-15 | |
| | ||||
* | Fix for IPv6 HTTP traffic | Luca Deri | 2019-01-14 | |
| | ||||
* | Merge pull request #654 from u-devel/patch-1 | Luca Deri | 2019-01-13 | |
|\ | | | | | Update radius.c to RFC2865 | |||
| * | Update radius.c to RFC2865 | u-devel | 2019-01-12 | |
| | | | | | | According to RFC2865 code can have value up to 13, also payload length ranges should be applied. | |||
* | | FIX H.323 broken detection | u-devel | 2019-01-13 | |
|/ | | | | | | TPKT header length field can have value more then 255, and in fact in all of the cases I've met it is more then 255. Thus checking real H.323 packet like this: (packet->payload[2] == 0x00) stop detecting H.323 conversation at all. |