]> git.ipfire.org Git - people/mfischer/ipfire-2.x.git/blobdiff - config/suricata/ruleset-sources
ids: Fixed typo in ruleset-sources
[people/mfischer/ipfire-2.x.git] / config / suricata / ruleset-sources
index 84c474ef78b12b9bdcf96fb894285edc2243def3..1d2c6e98b2b37d9c9a4b4497782da6b59fc7f886 100644 (file)
@@ -23,7 +23,7 @@ our %Providers = (
                website => "https://www.snort.org",
                tr_string => "registered user rules",
                requires_subscription => "True",
-               dl_url => "https://www.snort.org/rules/snortrules-snapshot-29161.tar.gz?oinkcode=<subscription_code>",
+               dl_url => "https://www.snort.org/rules/snortrules-snapshot-29190.tar.gz?oinkcode=<subscription_code>",
                dl_type => "archive",
        },
 
@@ -33,7 +33,7 @@ our %Providers = (
                website => "https://www.snort.org",
                tr_string => "subscripted user rules",
                requires_subscription => "True",
-               dl_url => "https://www.snort.org/rules/snortrules-snapshot-29161.tar.gz?oinkcode=<subscription_code>",
+               dl_url => "https://www.snort.org/rules/snortrules-snapshot-29190.tar.gz?oinkcode=<subscription_code>",
                dl_type => "archive",
        },
 
@@ -67,16 +67,6 @@ our %Providers = (
                dl_type => "archive",
        },
 
-       # Abuse.ch SSLBL JA3 fingerprint rules.
-       sslbl_ja3 => {
-               summary => "Abuse.ch SSLBL JA3 Rules",
-               website => "https://sslbl.abuse.ch/",
-               tr_string => "sslbl ja3 fingerprint rules",
-               requires_subscription => "False",
-               dl_url => "https://sslbl.abuse.ch/blacklist/ja3_fingerprints.rules",
-               dl_type => "plain",
-       },
-
        # Abuse.ch SSLBL Blacklist rules.
        sslbl_blacklist => {
                summary => "Abuse.ch SSLBL Blacklist Rules",
@@ -87,18 +77,8 @@ our %Providers = (
                dl_type => "plain",
        },
 
-       # Abuse.ch URLhaus Blacklist rules.
-       urlhaus => {
-               summary => "Abuse.ch URLhaus Blacklist Rules",
-               website => "https://urlhaus.abuse.ch/",
-               tr_string => "urlhaus blacklist rules",
-               requires_subscription => "False",
-               dl_url => "https://urlhaus.abuse.ch/downloads/urlhaus_suricata.tar.gz",
-               dl_type => "archive",
-       },
-
        # Etnetera Aggressive Blacklist.
-       etnetera_aggresive => {
+       etnetera_aggressive => {
                summary => "Etnetera Aggressive Blacklist Rules",
                website => "https://security.etnetera.cz/",
                tr_string => "etnetera aggressive blacklist rules",