# 5.0beta1
04/30/2019
* Feature #884: add man pages
* Feature #984: libhtp HTP_AUTH_UNRECOGNIZED
* Bug #1013: command line parsing
* Feature #1099: keyword: file_name keyword
* Bug #1324: vlan tag in eve.json
* Bug #1427: configure with libnss and libnspr
* Bug #1694: unix-socket reading 0 size pcap
* Bug #1860: 2220005: SURICATA SMTP bdat chunk len exceeded when using SMTP connection caching
* Feature #1970: json: make libjansson mandatory
* Bug #2057: eve.json flow logs do not contain in_iface
* Feature #2081: document byte_test
* Feature #2082: document byte_jump
* Feature #2083: document byte_extract
* Feature #2282: event log aka weird.log
* Task #2297: deprecate: dns.log
* Feature #2332: Support for common http response headers - Location and Server
* Task #2376: deprecate: files-json.log
* Task #2379: deprecate: Tilera / Tile support
* Feature #2421: add system mode and user mode
* Bug #2428: suricata.log file permission error message when using suricata -l
-r x.pcap as unprivilegded user
* Bug #2432: engine-analysis does not print out the tls buffers
* Feature #2459: Support of FTP active mode
* Feature #2484: no stream events after known pkt loss in flow
* Feature #2485: http: log byte range with file extraction
* Bug #2503: rust: nom 4.2 released
* Feature #2507: Make Rust mandatory
* Bug #2527: FTP file extraction only working in passive mode
* Optimization #2530: Print matching rule SID in filestore meta file
* Feature #2561: Add possibility for smtp raw extraction
* Feature #2563: Add dump of all headers in http eve-log
* Feature #2572: extend protocol detection to specify flow direction
* Bug #2605: engine-analysis warning on PCRE
* Optimization #2632: remove C implementations where we have Rust as well
* Bug #2733: rust/mingw: libc::IPPROTO_* not defined
* Feature #2741: netmap: add support for lb and vale switches
* Bug #2751: Engine unable to disable detect thread, Killing engine. (in libpcap mode)
* Feature #2766: Simplified Napatech Configuration
* Bug #2775: dns v1/2 with rust results in less app layer data available in the alert record (for dns related alerts/rules)
* Optimization #2793: Python 3 support for python tools
* Bug #2797: configure.ac: broken --{enable,disable}-xxx options
* Bug #2798: --engine-analysis is unaware of http_host buffer
* Bug #2800: Undocumented commands for suricatasc
* Optimization #2808: Prefer Python 3 in ./configure
* Bug #2812: suricatasc multiple python issues
* Bug #2813: suricatasc: failure with extra commands
* Bug #2817: Syricata.yaml encrypt-handling instead encryption-handling
* Feature #2820: pcap multi dev support for Windows (5.0.x)
* Bug #2821: netmap/afpacket IPS: stream.inline: auto broken (5.0.x)
* Bug #2822: SSLv3 - AddressSanitizer heap-buffer-overflow (5.0.x)
* Bug #2833: mem leak - rules loading hunt rules
* Feature #2837: Add more custom HTTP Header values for HTTP JSON Logging
* Bug #2838: 4.1.x gcc 9 compilation warnings
* Bug #2844: alignment issues in dnp3
* Bug #2846: IPS mode crash under load (5.0.x)
* Task #2849: Remove C SMB parser.
* Task #2850: Remove C DNS parsers.
* Bug #2857: nfq asan heap-use-after-free error
* Bug #2877: rust: windows build fails in gen-c-headers.py
* Bug #2889: configure doesn't display additional information for missing requirements
* Feature #2895: OpenBSD pledge support
* Security #2896: smb 1 create andx request does not parse the filename correctly (master)
* Feature #2897: update http_content_type and others to new style sticky buffers
* Bug #2899: Suricata 4.1.2 and up to 5.x Dev branch - Make compile issue when using PF_ring library on Redhat only
* Bug #2901: pcap logging with lz4 coverity warning (master)
* Bug #2909: segfault on logrotation when the files cannot be opened
* Bug #2912: memleaks in nflog
* Feature #2914: modernize tls sticky buffers
* Bug #2915: modernize ssh sticky buffers
* Bug #2921: chmod file mode warning expressed in incorrect base
* Bug #2929: error messages regarding byte jump and byte extract
* Feature #2930: http_protocol: use mpm and content inspect v2 apis
* Feature #2937: sticky buffer access from lua script
* Security #2944: ssh: heap buffer overflow (master)
* Security #2945: mpls: heapbuffer overflow in file decode-mpls.c (master)
* Security #2946: decode-ethernet: heapbuffer overflow in file decode-ethernet.c (master)
* Security #2947: rust/dhcp: panic in dhcp parser (master)
* Bug #2948: mpls: cast of misaligned data leads to undefined behvaviour (master)
* Security #2949: rust/ftp: panic in ftp parser (master)
* Security #2950: rust/nfs: integer underflow (master)