#alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET CURRENT_EVENTS EXPERIMENTAL Gzipped HTTP POST - Suspicious - Possible Trojan Report"; flow:established,to_server; content:"POST "; depth:5; content:"Content-Encoding\: gzip"; nocase; classtype:policy-violation; reference:url,doc.emergingthreats.net/bin/view/Main/GzipdPOST; sid:2008045; rev:1;)
Added 2008-03-28 13:39:32 UTC
#alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET CURRENT_EVENTS EXPERIMENTAL Gzipped HTTP POST - Suspicious - Possible Trojan Report"; flow:established,to_server; content:"POST "; depth:5; content:"Content-Encoding\: gzip"; nocase; classtype:policy-violation; reference:url,doc.emergingthreats.net/bin/view/Main/GzipdPOST; sid:2008045; rev:1;)
Added 2008-03-28 13:39:32 UTC
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET CURRENT_EVENTS EXPERIMENTAL Gzipped HTTP POST - Suspicious - Possible Trojan Report"; flow:established,to_server; content:"POST "; depth:5; content:"Content-Encoding\: gzip"; nocase; classtype:policy-violation; reference:url,doc.emergingthreats.net/bin/view/Main/GzipdPOST; sid:2008045; rev:1;)
Added 2008-03-22 17:48:04 UTC
This is now disabled by default in the ruleset. Gzip is used in some cases, more than expected. So use this if you have a need, but in general use it's not recommended.
--
MattJonkman - 28 Mar 2008