]> git.ipfire.org Git - people/ms/ipfire-2.x.git/commitdiff
download ET IDS rules via HTTPS
authorPeter Müller <peter.mueller@link38.eu>
Thu, 16 Aug 2018 15:09:41 +0000 (17:09 +0200)
committerMichael Tremer <michael.tremer@ipfire.org>
Thu, 16 Aug 2018 17:54:06 +0000 (18:54 +0100)
The Emerging Threats ruleset server supports HTTPS. It should
be used for downloading the ruleset in IPFire, too.

This also needs to be applied on the upcoming ids.cgi file for Suricata
which I will do in a second patch.

The third version of this patch superseds the first and
second one which were broken due to bugs in the MUAs GPG
implementation.

Signed-off-by: Peter Müller <peter.mueller@link38.eu>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
html/cgi-bin/ids.cgi

index 9863251e2d8817f74211383b844f170a200af636..d9d697debb7e830dfd40e16f1bc6dfddc1b9d8af 100644 (file)
@@ -265,7 +265,7 @@ if (!$errormessage) {
        } elsif ($snortsettings{'RULES'} eq 'community') {
                $url=" https://www.snort.org/rules/community";
        } else {
-               $url="http://rules.emergingthreats.net/open/snort-2.9.0/emerging.rules.tar.gz";
+               $url="https://rules.emergingthreats.net/open/snort-2.9.0/emerging.rules.tar.gz";
        }
 
        if ($snortsettings{'ACTION'} eq $Lang::tr{'save'} && $snortsettings{'ACTION2'} eq "snort" ) {