From 5ed6cdd9200ef1f4e59ed14ee5d0a9845473a8a1 Mon Sep 17 00:00:00 2001 From: =?utf8?q?Peter=20M=C3=BCller?= Date: Thu, 16 Aug 2018 17:09:41 +0200 Subject: [PATCH] download ET IDS rules via HTTPS MIME-Version: 1.0 Content-Type: text/plain; charset=utf8 Content-Transfer-Encoding: 8bit The Emerging Threats ruleset server supports HTTPS. It should be used for downloading the ruleset in IPFire, too. This also needs to be applied on the upcoming ids.cgi file for Suricata which I will do in a second patch. The third version of this patch superseds the first and second one which were broken due to bugs in the MUAs GPG implementation. Signed-off-by: Peter Müller Signed-off-by: Michael Tremer --- html/cgi-bin/ids.cgi | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/html/cgi-bin/ids.cgi b/html/cgi-bin/ids.cgi index 9863251e2d..d9d697debb 100644 --- a/html/cgi-bin/ids.cgi +++ b/html/cgi-bin/ids.cgi @@ -265,7 +265,7 @@ if (!$errormessage) { } elsif ($snortsettings{'RULES'} eq 'community') { $url=" https://www.snort.org/rules/community"; } else { - $url="http://rules.emergingthreats.net/open/snort-2.9.0/emerging.rules.tar.gz"; + $url="https://rules.emergingthreats.net/open/snort-2.9.0/emerging.rules.tar.gz"; } if ($snortsettings{'ACTION'} eq $Lang::tr{'save'} && $snortsettings{'ACTION2'} eq "snort" ) { -- 2.39.5