mirror of
https://github.com/zeek/zeek.git
synced 2025-10-06 08:38:20 +00:00
No description
![]() The default of "skip_processing_after_detection" is confusing and causes conn.log to not be written as one would assume, plus the counters are not incremented and thus some kinds of potential detections are short-changed. I propose adding "disable_analyzer_after_detection" which would react, on the surface, the same way by disabling the SSH analyzer, but allowing conn.log to be written appropriately. |
||
---|---|---|
aux | ||
cmake@392e6be9b7 | ||
doc | ||
man | ||
pkg | ||
scripts | ||
src | ||
testing | ||
.gitignore | ||
.gitmodules | ||
bro-config.h.in | ||
bro-path-dev.in | ||
CHANGES | ||
CMakeLists.txt | ||
configure | ||
COPYING | ||
INSTALL | ||
Makefile | ||
NEWS | ||
README | ||
README.rst | ||
VERSION |
============================ Bro Network Security Monitor ============================ Bro is a powerful framework for network analysis and security monitoring. Please see the INSTALL file for installation instructions and pointers for getting started. NEWS contains release notes for the current version, and CHANGES has the complete history of changes. Please see COPYING for licensing information. You can download source and binary releases on: http://www.bro.org/download To get the current development version, clone our master git repository: git clone --recursive git://git.bro.org/bro For more documentation, research publications, and community contact information, please see Bro's home page: http://www.bro.org On behalf of the Bro Development Team, Vern Paxson & Robin Sommer, International Computer Science Institute & Lawrence Berkeley National Laboratory vern@icir.org / robin@icir.org