Releases: zeek/zeek
v5.0.0
Breaking Changes
-
Zeek now requires at least CMake version 3.15.0.
-
If Zeek is configured with support for included Spicy (the default) we now
require at least Flex version 2.6 and its development headers, at least Bison
version 3.3, and GCC version 8.3 or Clang version 9.0 or higher. -
The script-land
union
andtimer
types have been removed. They haven't
had any actual semantics backing them for some time and shouldn't have
functioned in any useable way. We opted to skip the deprecation cycle for
these types for that reason. -
Broker now uses a new network backend with a custom network protocol that is
incompatible with the pre-5.0 backend. In practice, this means Zeek 4.x will
not be able to exchange events with Zeek 5.x. Going forward, this new backend
will allow us to keep the Broker protocol more stable and add new capabilities
in a backwards compatible way.
New Functionality
-
The Zeek cluster management framework now supports operational use of
single-instance clusters, meaning setups in which all Zeek cluster nodes
(manager, workers, etc) reside on a single machine. The framework builds upon
Zeek's Supervisor (-j
is a requirement) and includes three components:(1) A cluster controller, loaded via ``policy/frameworks/management/controller`.
The controller is the central management entity for a Zeek cluster. It
interacts with one or more agents to enact instructions delivered by a
management client. The controller is stateful and can persist cluster
state to disk.(2) One or more cluster agents, loaded via ``policy/frameworks/management/agent`.
Each agent assists the controller in managing the local instance (typically
a machine or container) of Zeek cluster nodes. Agents interact with the
local Supervisor to control nodes and peer directly with running Zeek
nodes via Broker to carry out node-local tasks.(3) zeek-client, the cluster management client. A standalone client running
outside of Zeek, it's now installed by default, alongside the other
executables. The client supports uploading cluster configurations to the
controller, deploying them, retrieving them, checking cluster node status,
restarting individual cluster nodes, and retrieving the current value(s)
of global identifiers in one or more Zeek nodes.Controller and agent come pre-configured for single-instance deployments of
Zeek clusters, with automated log rotation and archival via Zeek's
zeek-archiver
tool. For further details on the framework, please refer
to the Zeek documentation.zeekctl remains included and offers more knobs and features than the
management framework. It remains the recommended solution for multi-machine
clusters and those needing rich management capabilities. -
Zeek now automatically warns about unused functions, hooks, and event
handlers. The intent behind these checks is to catch instances where the
script writer has introduced typos in names, or has forgotten to remove
code that's no longer needed.For functions and hooks, "unused" means the function/hook is not exported or
in the global scope (nor deprecated), and no "live" (i.e., not "unused")
function/hook/event handler calls it. For event handlers, "unused" means
that the event engine does not generate the event, nor do any "live"
function/hook/event handler generates (and the event handler is not
deprecated).The warnings can occasionally be or inappropriate or incorrect, such as due
to the use of conditional code (which Zeek does not try to incorporate
into its analysis), or events sent via Broker. You can mark such instances
using the&is_used
attribute to suppress the associated warning.
You can also suppress all such warnings using the--no-unused-warnings
command-line option. -
A new feature,
--profile-scripts[=file]
instructs Zeek to write (upon
termination) a profile of every function body to the given file (default:
stdout), along with some aggregate profiles. A function body is associated
with a function or a BiF (they can only have one), or a hook or event handler
(they can have multiple). The profile is in TSV, quasi-Zeek-log format. It
includes (1) the name of the script body, (2) its location, (3) its type
(e.g., "BiF" or "function"), (4) how many times it was called, (5) the total
CPU time that accumulated during its execution, (6) how much of that time was
due to execution of its "children" (other functions it called), (7) the total
memory allocated during its execution (approximately), and (8) how much of
that memory was due to its children. Note that profiling is expensive and may
not be suitable for execution on live traffic. -
Zeek now includes support for building Spicy and spicy-plugin as part of
Zeek. This feature is enabled by default, and can be turned off by passing the
--disable-spicy
flag to./configure
. -
Zeek now supports generation and replay of event traces via the new
--event-trace
/-E
command-line options. For details, see:
https://docs.zeek.org/en/master/quickstart.html#tracing-events -
Zeek now features limited TLS decryption capabilities. This feature is
experimental and only works for TLS 1.2 connections that use the
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ciphersuite. Furthermore Zeek requires
access to the pre-master secret of each TLS connection. Typically this
functionality will be most useful when analyzing trace-files where the TLS
client recorded the key material. For more details and examples how to use
this functionality, see the TLS Decryption documentation at
https://docs.zeek.org/en/master/frameworks/tls-decryption.html -
Zeek now provides WebSocket support for exchanging events with external
clients. To enable it, callBroker::listen_websocket()
. Zeek will then
start listening on port 9997 for incoming WebSocket connections. Zeek/Broker
communicates via JSON messages. See the Broker documentation for a description
of the message format expected over these WebSocket connections at
https://docs.zeek.org/projects/broker/en/current/web-socket.html. -
Compiling scripts to C++ (via
-O gen-C++
) is now "feature complete", i.e.,
the compiler should be able to process any script - other than those
potentially affected by@if
conditionals - regardless of which Zeek
language constructs it uses. That said, such compilation remains
experimental and only lightly tested. -
ZAM script optimization (
-O ZAM
) now includes some major performance
improvements. -
The new --with-gen-zam configure flag and its corresponding GEN_ZAM_EXE_PATH
cmake variable allow reuse of a previously built Gen-ZAM code generator. This
aids cross-compilation: the Zeek build process normally compiles Gen-ZAM on
the fly, but when cross-compiling will do so for the target platform, breaking
its use on the host platform. Gen-ZAM is similar to binpac and bifcl in this
regard. Like binpac and bifcl, it's now also available as a standalone git
repository and hooked into the Zeek distribution as a submodule. -
Zeek now uses the c-ares (https://c-ares.org) library for performing DNS
requests, replacing an old custom implementation of a DNS resolver. Switching
to this library simplifies the DNS code, adds support for IPv6 lookups, and
adds the ability to support more DNS request types in the future. -
Two new BiFs, val_footprint() and global_container_footprints(), offer
substitutes for the deprecated val_size() and global_sizes() BiFs. A value's
"footprint" is the number of elements it includes either directly or
indirectly. The number is not meant to be precise, but rather comparable:
larger footprint correlates with more memory consumption. -
The Supervisor features two new events,
Supervisor::node_status
and
SupervisorControl::node_status
, to notify recipients of the fact that the
stem process has (re-)started a node. The events indicate the node's name and
its new PID, reflecting the information the stem already shares with the
Supervisor core. -
The new
configure --statedir
option lets you adjust the installation's
persistent state directory. It defaults tovar/lib
under your Zeek
installation's root directory. -
The
base/misc/installation.zeek
script provides your Zeek installation's
key directories.
Changed Functionality
-
The behavior of the
=
,+=
, and-=
operators has been expanded and
unified. It now covers{ ... }
initializer lists, supports cross-product
initialization, enables+=
for table, set, vector and pattern values,
similarly allows-=
for table and set values, and supports listing
multiple sets for+=
initialization. For details, see:
https://docs.zeek.org/en/master/script-reference/operators.html#assignment-operators -
The is_num(), is_alpha(), and is_alnum() BiFs now return F for the empty
string. -
Type mismatch error messages now print the easier to understand type names,
instead of the fully expanded raw type. -
Errors caused by setting a filter at start-up are now more informative about
what actually caused the error, including with the defaultip or no ip
filter. -
Log messages about errors in input files are now more informative about where
errors occured. -
The
--enable-zeek-client
configure flag has been removed and is now the
default. The new--disable-zeek-client
flag allows users to skip
installation of the client.
Deprecated Functionality
- For developers of asynchronous BiFs, or other uses of
when
statement
triggers, the...
v4.0.7
This release fixes the following security issues:
-
Fix potential hang in the DNS analyzer when receiving a specially-crafted
packet. Due to the possibility of this happening with packets received
from the network, this is a potential DoS vulnerability.Thank you to Google's OSS-Fuzz project for reporting this vulernability.
This release fixes the following bugs:
-
Fix issue with broken libpcaps that return repeat packets, most notably
the version provided with Myricom hardware.
v4.2.2
This release fixes the following security issues:
-
Fix potential hang in the DNS analyzer when receiving a specially-crafted
packet. Due to the possibility of this happening with packets received
from the network, this is a potential DoS vulnerability.Thank you to Google's OSS-Fuzz project for reporting this vulernability.
v4.2.1
This release fixes the following security issues:
-
Fix potential unbounded state growth in the FTP analyzer when receiving
a specially-crafted stream of commands. This may lead to a buffer overflow
and cause Zeek to crash. Due to the possibility of this happening with
packets received from the network, this is a potential DoS vulnerabilty.Thank you to Jason Ish at OISF for reporting this vulnerability.
This release fixes the following bugs:
-
Ensure both protocol and analyzer confirmation and violation events can be called.
-
Empty table constructors with &default attributes may cause a crash.
-
Fix a bug in ZAM when a function containing a loop is inlined.
-
Reduce the interpreter frames generated by ZAM when inlining function bodies.
-
Restore providing location information to LoadFile hooks.
-
Allow analyzer violations to explicitly set tag. This makes it consistent with
analyzer confirmations. -
Fix a number of bugs with robust dictionary iteration.
-
Fix compile error on GCC 12/Ubuntu 22.04
-
Fix missing "Reporter" entries when reporting hooks via
zeek -NN
.
v4.0.6
This release fixes the following security issues:
-
Fix potential unbounded state growth in the FTP analyzer when receiving
a specially-crafted stream of commands. This may lead to a buffer overflow
and cause Zeek to crash. Due to the possibility of this happening with
packets received from the network, this is a potential DoS vulnerabilty.Thank you to Jason Ish at OISF for reporting this vulnerability.
This release fixes the following bugs:
v4.0.5
This release fixes the following bugs:
-
The highwayhash module was updated to fix a build failure on FreeBSD.
-
A number of fixes for various problems on the CI infrastructure.
-
Fixed an issue with log rotation on Linux systems using shadow files.
-
Writers were not being cleaned up correctly when recreating log streams
with the same ID as an existing stream. This could lead to a crash. -
IP packets with bad/incorrect IP header lengths were not reporting weirds
as they should be.
v4.2.0
Breaking Changes
- The existing
Tag
types in C++ (zeek::Analyzer::Tag
, etc) have been
merged into a single type calledzeek::Tag
. This is a breaking change, and
may result in plugins failing to build where they were relying on those types
being different for function overloading and such. We attempted to include
deprecated versions of the old types, but were unable to do so because of
changes to return types from a number of methods. With this change, any uses
of thezeek::*::Tag
types will need to be replaced byzeek::Tag
.
New Functionality
-
We now provide minimal official Docker images for the Zeek project via two
repositories on the Docker hub,zeekurity/zeek
andzeekurity/zeek-dev
.
The former receives all Zeek release versions, with tagzeek:latest
being
the most recent. An image corresponding to our latest merge into the master
branch is tagged atzeek-dev:latest
.The images run Debian and provide a full install of the Zeek distribution into
/usr/local/zeek
. They do not set Zeek-specific entrypoints or provide any
particular configuration for operationally running Zeek. To keep the images
lightweight they also do not contain a development toolchain as needed for
example to build a Zeek plugin. You can add any required system packages in a
derived image, or install them directly in the running container. -
Zeek now supports formatting the C++ code using clang-format. Also provided is
a configuration forpre-commit
to run clang-format when add new commits via
git
. More details can be found at https://github.com/zeek/zeek/wiki/Coding-Style-and-Conventions#clang-format. -
Experimental support for speeding up Zeek script execution by compiling
scripts to a low-level form called "ZAM". You activate this feature by
specifying-O ZAM
on the command line. See
src/script_opt/ZAM/README.md
for more information. -
Improvements for compiling scripts to C++ (an experimental optimization
feature introduced in 4.1). The generated C++ now compiles much faster than
previously, though it can still take quite a while when using C++ optimization
on large sets of scripts. You can incrementally compile additional scripts
using-O add-C++
. Seesrc/script_opt/CPP/README.md
for details. -
The new flags --optimize-files=/pat/ and --optimize-funcs=/pat/ apply
to both ZAM and compile-to-C++ script optimization. The first instructs
Zeek to optimize any functions/hooks/event handlers residing in files
matching the given pattern (unanchored). The second does the same but
based on the function name, and with the pattern anchored (so for example
--optimize-funcs=foo will optimize any functions named "foo" but not
those named "foobar", or "MYSCOPE::foo"). The flags can be combined
and can also be used multiple times to specify a set of patterns.
If neither flag is used then optimization is applied to all loaded
scripts; if used, then only to those that match. -
The
-uu
flag for analyzing potentially unused record fields has been
removed because, due to other changes in script optimization, keeping it
would now require about 1,800 lines of code not otherwise needed. -
The DNS analyzer has initial support for the SVCB and HTTPS types. The new
events aredns_SVCB
anddns_HTTPS
. -
The
find_str
andrfind_str
bifs now support case-insensitive searches. -
Added a new plugin hook for capturing packets that made it through analysis
without being processed calledPlugin::HookUnprocessedPacket
. Currently
ARP packets or packets with a valid IP-based transport header are marked as
processed. This also adds an event calledpacket_not_processed
that
reports the same packets. -
A new command-line option
-c
or--capture-unprocessed
will dump any
packets not marked as being processed, similar to the new hook and event
above. -
In Zeek plugins, the new cmake function
zeek_plugin_scripts()
should be
used alongsidezeek_plugin_cc()
and related functions to establish
dependency tracking between Zeek scripts shipped with the plugin and plugin
rebuilds. Previously, updates to included Zeek scripts didn't reliably
trigger a rebuild. -
Added PacketAnalyzer::register_for_port(s) functions to the packet analyzer
framework in script-land. This allows a packet analyzer to register a port
mapping with a parent analyzer just like any other numeric identifier, while
also adding that port to the now-global Analyzer::ports table used by BPF
filtering. -
Added AllAnalyzers::Tag enum type that combines the existing Analyzer::Tag,
PacketAnalyzer::Tag, and Files::Tags into a single enum. The existing types
still exist, but the new type can be used as an argument for
functions/hooks/events that need to handle any of the analyzer types. -
Added protocol detection functionality to the packet analyzer framework.
Packet analyzers can register for protocol detection using the
PacketAnalyzer::register_protocol_detection
script function and implement
thePacketAnalyzer::DetectProtocol
method in C++. This allows packet
analyzer plugins to detect a protocol via byte matching or other heuristics
instead of relying solely on a numeric identifier for forwarding. -
The JSON logger's new LogAscii::json_include_unset_fields flag provides
control over how to handle unset "&optional" fields. By default it continues
to skip such fields entirely. When redef'ing the flag to T it includes such
fields, with a "null" value. This simplifies data import use cases that
require fields to be present at all times, regardless of their value. -
A new external testsuite, https://github.com/zeek/zeek-testing-cluster,
focuses on testing the emerging controller framework. It leverages the new
official Zeek Docker image for building docker-compose test setups, driven via
btest. The Github CI setup now includes a workflow that deploys and runs this
testsuite. -
The GRE analyzer now supports the Aruba WLAN protocol type.
Changed Functionality
-
Zeek now treats non-atomic index types for sets and tables more consistently.
Indexing now generally works with any types Zeek's hashing subsystem knows how
to serialize, meaning that you can now also index with sets, vectors,
patterns, and even tables. -
The traditional TSV Zeek logs are now valid UTF8 by default. It's possible to
revert to the previous behavior by settingLogAscii::enable_utf_8
to
false. -
The
SYN_packet
record now records TCP timestamps (TSval/TSecr) when
available. -
The
init-plugin
script now focuses purely on dynamic Zeek plugins. It no
longer generates Zeek packages. To instantiate new Zeek packages, use the
zkg create
command instead. -
The
ignore_checksums
options and the-C
command-line option now
additionally cause Zeek to accept IPv4 packets that provide a length of zero
in the total-length IPv4 header field. When the length is set to zero, the
capture length of the packet is used instead. This can be used to replay
traces, or analyze traffic when TCP sequence offloading is enabled on the
local NIC - which typically causes the total-length of affected packets to be
set to zero. -
The existing tunnel analyzers for AYIYA, Geneve, GTPv1, Teredo, and VXLAN are
now packet analyzers. -
C++ unit tests are now compiled in by default and can be disabled by
configuring the build with --disable-cpp-tests. We removed the former
--enable-cpp-tests configure flag. Unit tests now also work in (static and
dynamic) Zeek plugins. -
This release expands the emerging cluster controller framework. Most changes
concern internals of the framework. Agent/controller connectivity management
has become more flexible: configuration updates pushed by the client can now
convey the agent topology, removing the need to hardwire/redef settings
in the controller. The new ClusterController::API::notify_agents_ready event
declares the management infrastructure ready for use. zeek-client's CLI has
expanded to support the new functionality.The framework is still experimental and provides only a small subset of
ZeekControl's functionality. ZeekControl remains the recommended tool for
maintaining your cluster. -
Entries in
http.log
now record the originalHOST
headers.
Previously, they would skip any port specification a header might
include.
Deprecated Functionality
-
The
protocol_confirmation
andprotocol_violation
events along with the
correspondingAnalyzer::ProtocolConfirmation
and
Analyzer::ProtocolViolation
C++ methods are marked as deprecated. They are
replaced byanalyzer_confirmation
andanalyzer_violation
which can
also now be implemented in packet analyzers. -
Declaring a local variable in an inner scope and then accessing it in an
outer scope is now deprecated. For example,
if ( foo() )
{
local a = 5;
...
}
print a;
is deprecated. You can address the issue by hoisting the declaration
to the outer scope, such as:
local a: count;
if ( foo() )
{
a = 5;
...
}
print a;
v4.1.1
This release fixes the following security issues:
-
Paths from log stream make it into system() unchecked, potentially leading
to commands being run on the system unintentionally. This requires either
bad scripting or a malicious package to be installed, and is considered
low severity. -
Fix potential unbounded state growth in the PIA analyzer when receiving a
connection with either a large number of zero-length packets, or one which
continues ack-ing unseen segments. It is possible to run Zeek out of memory
in these instances and cause it to crash. Due to the possibility of this
happening with packets received from the network, this is a potential DoS
vulnerability.
This release fixes the following bugs:
-
Looping over vectors with missing elements in script-land could fail to
process all elements. -
The
ignore_checksum_nets
option does not work correctly if configured
to with multiple subnets. -
Packet sources that don't have a selectable file descriptor could
potentially prevent the network time from ever updating, which would have
adverse effects on the primary run loop such as preventing timers from
executing. -
Zeekctl crashes using the
zeekctl status
command if theStatusCmdShowAll
option is set to1
in zeekctl.cfg.
v4.0.4
This release fixes the following security issues:
-
Paths from log stream make it into system() unchecked, potentially leading
to commands being run on the system unintentionally. This requires either
bad scripting or a malicious package to be installed, and is considered
low severity. -
Fix potential unbounded state growth in the PIA analyzer when receiving a
connection with either a large number of zero-length packets, or one which
continues ack-ing unseen segments. It is possible to run Zeek out of memory
in these instances and cause it to crash. Due to the possibility of this
happening with packets received from the network, this is a potential DoS
vulnerability.
This release fixes the following bugs:
-
The highwayhash submodule was updated to fix a build failure on FreeBSD 14.
-
Packet sources that don't have a selectable file descriptor could
potentially prevent the network time from ever updating, which would have
adverse effects on the primary run loop such as preventing timers from
executing. -
Specific conditions in the run loop could lead RotationTimers to get into
an infinite loop. -
Specially crafted HTTP packets could avoid the HTTP analyzer.
-
Zeekctl crashes using the
zeekctl status
command if theStatusCmdShowAll
option is set to1
in zeekctl.cfg. -
The
ignore_checksum_nets
option does not work correctly if configured
with multiple subnets.
v4.1.0
New Functionality
-
Lambda functions can now use capture-list to help specify exactly which local
variables from outer scopes need to made available while evaluating the lambda
and also the method by which they're made available: deep vs. shallow copy.For examples, see: https://docs.zeek.org/en/master/script-reference/types.html#type-function
-
Support for VN-Tag protocol headers: the new VN-Tag packet analyzer simply
skips past the VN-Tag header, allowing for further analysis of subsequent
packet contents. -
Support for decapsulating Geneve packets to process the inner
payload, similar in operation to the existing VXLAN support. -
Support for Zeek script "Reaching Definitions" (RD) analysis: tracking the
extent to which a given variable definition (assignment) can be visible
elsewhere in the Zeek script. The analysis works on local variables in
function/event/hook bodies, but not across them.The code tracks two forms of RDs, "minimal" (what's guaranteed to reach a
given point in a function body) and "maximal" (what possibly could reach).
Upcoming script optimization will use the latter, but the former currently
allows identification of places for which a value is used where it
does not appear that it will necessarily be defined. Specifying the
zeek -u
option will generate warnings for instances where this holds for
local variables. Specifyingzeek -uu
turns on additional (expensive)
analysis to report instances where record fields might be used without
having previously been set.The
zeek -u
option can also identify assigned-to variables that aren't
subsequently used (i.e. "dead code") and issues a warning. A newis_used
attribute can be used situationally to suppress such warnings.The base scripts have some places where the static analysis lacks sufficient
power to tell that values are being used safely (guaranteed to have been
identified). In order to enable users to employzeek -u
on their own
scripts without being distracted by these instances, this change also
includes a new attribute,&is_assigned
, which can be associated with a
variable or a record field to inform Zeek's analysis that the script writer
asserts the value will be set, suppressing the associated warnings. -
A Telemetry API was added to assist in gathering arbitrary runtime
metrics and allows export to Prometheus. This is still
work-in-progress, preliminary documentation for current, low-level
API lives at https://github.com/zeek/zeek/wiki/Telemetry for now. -
Experimental support for translating Zeek scripts to equivalent C++.
The generated C++ can then be compiled directly into thezeek
binary,
replacing use of the interpreter and producing better runtime performance.
Seesrc/script_opt/CPP/README.md
for a guide on how to use this feature. -
Support for more generic session management. The NetSessions class has been
renamed to SessionMgr (with the old name marked deprecated). The new
class allows plugins to take advantage of session management similar to how
Connection objects were handled previously, but without the need to be based
on IP-based protocols. -
The logging framework now provides a global policy hook,
Log::log_stream_policy
.
Like the existing filter-level hooks, handlers for the new hook can provide
additional processing and veto the log write. The new hook runs once per
write, prior to any filter-level policy hooks. Even when it vetoes,
filter-level policy hooks still run, but cannot "un-veto" the write. -
The ASCII writer gained a new option LogAscii::logdir, which can be used to
change the logging output directory. -
Added a
--include-plugins
argument toconfigure
. This argument
takes a semicolon separated list of paths containing plugins that will be
statically built into Zeek. -
Added a
--plugindir
argument toconfigure
to set the
installation path for plugins. -
The X509 analyzer now can check if a specific hostname is valid for a
certificate. Two new BIFs were added for this,x509_check_hostname
and
x509_check_cert_hostname
. A new fieldsni_matches_cert
that tracks
this information was added tossl.log
. -
Added new functions to dynamically enable/disable file analyzers:
global enable_analyzer: function(tag: Files::Tag): bool;
global disable_analyzer: function(tag: Files::Tag): bool;
global analyzer_enabled: function(tag: Files::Tag): bool;
-
Zeek now includes its own BTest tooling in the distribution, enabling other
tests (e.g. in Zeek packages) to use it. The$PREFIX/share/btest folder
,
reported viazeek-config --btest_tools_dir
, includes:scripts/
forbtest-diff
canonifiersdata/
for data files, includingrandom.seed
data/pcaps
for the test pcaps
Configuring with
--disable-btest-pcaps
suppresses installation of the
test pcaps. -
The Supervisor now defaults to starting with a minimal set of Zeek
scripts controlled by a new init file,base/init-supervisor.zeek
.
One may still run it with a larger configuration by loading additional
scripts, includinginit-default.zeek
, as always. (Bare mode continues
to work as usual, reducing the configuration to a minimum.)The
NodeConfig
record has two new members, providing additional
control over launched nodes. Theenv
member allows setting environment
variables in the launched process. Thebare_mode
member, an optional
boolean, provides control over the bare-mode state of the new node.
When not provided, the node inherits the bare-mode status of the
Supervisor, and setting the variable enables/disables bare mode. -
Zeek now includes an incomplete, preliminary version of the future
cluster controller framework. Loadingpolicy/frameworks/cluster/agent
and/orpolicy/frameworks/cluster/agent
in a Zeek running with the
Supervisor will launch the corresponding cluster management node(s).
An experimental management client,zeek-client
, connects to the
controller and lets you issue commands. It requires configuration with
--enable-zeek-client
. This does not yet provide a functional
substitute forzeekctl
, which users should continue to use for now.
Changed Functionality
-
The default IP-based transport protocols (UDP, TCP, and ICMP) have been
moved to the packet analysis framework. This change allows us to move other
analyzers in the future that better align with the packet analysis framework
than they do with session analysis. -
The input framework's handling of unset fields (commonly expressed as "-")
in ingested data is now safer and more consistent. When reading data into
records, Zeek now accepts unset fields in the input data only when the
corresponding record field is&optional
. Unset fields for non-optional
fields cause the input line to be skipped. Reading data into tables with complex
index types (such astable[count, count] of string
) now also skips lines
with unset fields, since such indexes require fields to be present.Note that this may change the behavior of existing scripts if you have unset
fields in your input data. -
The version field in ssh.log is now optional and will not be set if we cannot
determine the version that was negotiated by the client and server. -
Add a new field
email_dest
to NOTICEs, which defines where to
send email to. The email-related NOTICE actions fill this now, and
then emails will be sent to all recorded addresses at the end of
NOTICE processing. This makes email generation more consistent and
extensible. -
Add page and email administrator to mails processed by hostnames extension.
-
SSL and X509 handling was significantly overhauled with the goal to make
the data that is logged by Zeek more helpful and compact.This change means that there are significant changes to the default log files,
as well as changes to functionality:-
x509.log
is now indexed by the sha256 of the certificate, with deduplication
being automatically performed. By default, the same certificate is only logged
once per day.This also means that the file ID is no longer present in X509 log. Similarly,
ssl.log
now contains hashes for X509 certificates.The hash function that is used for indexing the certificates is changeable by
changing theX509::hash_function
option.The time period after which a certificate is logged again can be configured by
changingX509::relog_known_certificates_after
.By default deduplication of certificates is done across the entire cluster using
broker. If this is not desired due to the higher communication overhead, this
behavior can be disabled usingX509::known_log_certs_use_broker
. -
X509 certificates are, by default, no longer logged into files.log. This
behavior is configurable and the previous default can be restored by changing
theX509::log_x509_in_files_log
option. -
x509.log
now tracks if a certificate was encountered as a end-host certificate
or as a client certificate. -
OCSP logging is now enabled by default.
-
ssl.log
now no longer includes information about the certificate issuer and
subject. This information is still available in X509.log. If you need this
information inssl.log
, the old behavior can be restored by changing the
SSL::log_include_server_certificate_subject_issuer
and
SSL::log_include_client_certificate_subject_issuer
configuration options. -
ssl.log
now contains assl_history
field, which tracks which protocol
messages were seen in an SSL/TLS ...
-