Is there a problem with using Oinkmaster? The novel concept of users possibly registering and using the rules themselves?
Really, is it all that useful to have an incomplete set of rules? Would you run an anti-virus program that had most of the 3+ year old virus definitions and 5% of the recent popular worms? Of course not, it wouldn't stop anything. What we're looking at for options: - Snort 2.3, GPL rules. Useless, old, not worth having because it won't protect you against the majority of malicious traffic (yes, hackers use new attacks, how novel) - Snort 2.6, no rules. User has to get his own. And what the user's looking at for options on top of it: - Snort 2.3, registered feed. 5 days old, but up to date enough that we have all known exploits up to last week. Old, deprecated scanning engine though. - Snort 2.6, registered feed. 5 days old but it's useful, and it's on a faster, more stable scanning engine that hasn't been discontinued. - Either of the above with subscription, pay to get the rules 5 days earlier. For mission-critical networks, this is the best solution. I don't find a SIGNATURE BASED REACTIVE SECURITY DEVICE to be useful without up to date signatures. Snort is an anti-virus program that's not hunting viruses, it still works under the same rules. -- version of snort in universe is dead https://launchpad.net/bugs/56533 -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs