aboutsummaryrefslogtreecommitdiff
path: root/src/lib/protocols
Commit message (Collapse)AuthorAge
...
* | added ssh_analyse_signature_version and ssh_has_old_signature for check old ↵MrRadix2020-07-21
|/ | | | signature version of ssh
* Added skeleton for checking SSH signatureLuca Deri2020-07-20
|
* Fix for invalid boundary checkLuca Deri2020-07-17
|
* Check for avoiding buffer overflow in netbios dissectorLuca Deri2020-07-14
|
* Fixed race condition in ndpi_ssl_version2str() caused by static qualifier in ↵Toni Uhlig2020-07-11
| | | | | | | | | the version string buffer. * added also GREASE supported tls versions as specified in https://tools.ietf.org/html/draft-davidben-tls-grease-01#page-4 Signed-off-by: Toni Uhlig <matzeton@googlemail.com>
* Fixed thunder protocol detection heap overflow caused by missing lengthcheck.Toni Uhlig2020-07-08
| | | | | | * triggered by fuzz traces from wireshark Signed-off-by: Toni Uhlig <matzeton@googlemail.com>
* Merge pull request #932 from IvanNardi/logLuca Deri2020-07-07
|\ | | | | Log
| * Incorporated some feedbackNardi Ivan2020-07-01
| |
| * mqtt: add boundary check in log messageNardi Ivan2020-06-26
| |
| * Fix compilation with --enable-debug-messages flagNardi Ivan2020-06-26
| | | | | | | | | | | | | | | | | | | | | | | | NDPI_LOG* macros dereference ndpi_detection_module_struct object which is private to ndpi library (via NDPI_LIB_COMPILATION define). So we can't use them outside the library itself, i.e. in ndpiReader code Therefore, in files in example/, convert all (rare) uses of NDPI_LOG* macros to a new very simple macro, private to ndpiReader program. If necessary, such macro may be improved. According to a comment in ndpi_define.h, each dissector must define its own NDPI_CURRENT_PROTO macro before including ndpi_api.h file
* | Improved HTTP line parsing if request splitted into multiple packets.Toni Uhlig2020-07-05
| | | | | | | | Signed-off-by: Toni Uhlig <matzeton@googlemail.com>
* | Fixed heap overflow in tls esni extraction triggered by manipulated packets.Toni Uhlig2020-06-29
| | | | | | | | Signed-off-by: Toni Uhlig <matzeton@googlemail.com>
* | TLS: extract JA3 signatures in some corner casesNardi Ivan2020-06-28
| | | | | | | | | | In some (rare) cases, Client Hello message contains lots of cipher suits.
* | Fixed off-by-one error in h323.Toni Uhlig2020-06-27
| | | | | | | | Signed-off-by: Toni Uhlig <matzeton@googlemail.com>
* | Added malformed packet risk supportLuca Deri2020-06-26
|/
* CentOS6 fix (santize won't work as too old system)lucaderi2020-06-25
| | | | Fixes warning
* Fixed missing length check in fbzero.Toni Uhlig2020-06-23
| | | | Signed-off-by: Toni Uhlig <matzeton@googlemail.com>
* Fixes #906Luca Deri2020-06-22
| | | | Packet bins are not printed wehn empty
* Merge pull request #920 from lnslbrty/fix/tls-rdn-crashLuca Deri2020-06-19
|\ | | | | Fixed stack overflow caused by missing length check
| * Fixed stack overflow caused by missing length checkToni Uhlig2020-06-18
| | | | | | | | Signed-off-by: Toni Uhlig <matzeton@googlemail.com>
* | Fixed API documentation: packet tiestamp is expressed in millisecondsLuca Deri2020-06-18
| |
* | Added checks for DGA detectionLuca Deri2020-06-17
|/
* Added DGA risk for names that look like a DGALuca Deri2020-06-11
|
* Win fixesLuca Deri2020-06-08
|
* Added check in TLS 1.2+ for reporting a risk when TLS is not used to carry HTTPSLuca Deri2020-06-08
|
* Added TLS bounadry checkLuca Deri2020-06-07
|
* Removed some obsolete protocols (battlefield, oscar, pcanywhere, tvants)Luca Deri2020-06-06
|
* removed obsolete yahoo pluginLuca Deri2020-06-06
|
* Merge pull request #913 from yskcg/fix_segment_fault_devLuca Deri2020-06-05
|\ | | | | Fix segment fault dev
| * Merge branch 'dev' of github.com:yskcg/nDPI into devysk2020-06-03
| |\
| | * nDpi#remove build warningsysk2020-05-21
| | |
| * | Merge branch 'dev' of github.com:yskcg/nDPI into devysk2020-05-20
| |\ \ | | |/ | |/|
| * | someip#fix when run across architectures such ARM ,may be occour sigbus ↵ysk2020-05-20
| | | | | | | | | | | | error(),Unhandled fault: alignment fault (0x92000021) at 0x00000000f67004aa
* | | Added boundary check in kerberos protocolLuca Deri2020-06-01
| | |
* | | Added check for spotify payload lenghtLuca Deri2020-06-01
| | |
* | | Check to avoid allocating twice the esni memoryLuca Deri2020-06-01
| | |
* | | Reworked HTTP header processing workflowLuca Deri2020-06-01
| | |
* | | HTTP comparison optimizationLuca Deri2020-05-31
| | |
* | | Minor changesLuca Deri2020-05-31
| | |
* | | Added offset check in kerberos dissectorLuca Deri2020-05-31
| | |
* | | Added extra TLS memory boundary checksLuca Deri2020-05-31
| | |
* | | HTTP dissector improvementsLuca Deri2020-05-30
| | |
* | | Minor cleanupLuca Deri2020-05-29
| | |
* | | Fixes for https://github.com/ntop/nDPI/pull/911Luca Deri2020-05-29
| | | | | | | | | | | | Added code for dumping invalid HTTP header
* | | Added references to ESNILuca Deri2020-05-29
| | |
* | | Added check for suspicious HTTP headersTommaso Macchioni2020-05-29
| | |
* | | Added support for Encrypted TLS SNI dissectionLuca Deri2020-05-28
| | | | | | | | | | | | https://datatracker.ietf.org/doc/draft-ietf-tls-sni-encryption/
* | | Added stub for checking HTTP headerLuca Deri2020-05-21
| | | | | | | | | | | | Updated Teams result
* | | Fixed valse positive whatsapp detectionLuca Deri2020-05-20
| | | | | | | | | | | | Cleaned Microsoft IP addresses list
* | | Removed bittorrent false positive detectionLuca Deri2020-05-20
| |/ |/|