]> git.ipfire.org Git - thirdparty/suricata-intel-index.git/commitdiff
Use a single index file.
authorJason Ish <ish@unx.ca>
Tue, 28 Nov 2017 18:11:16 +0000 (12:11 -0600)
committerJason Ish <ish@unx.ca>
Tue, 28 Nov 2017 18:11:16 +0000 (12:11 -0600)
etopen.yaml [deleted file]
etpro.yaml [deleted file]
index.yaml [new file with mode: 0644]
sslbl-ssl-fp-blacklist.yaml [deleted file]
trafficid.yaml [deleted file]

diff --git a/etopen.yaml b/etopen.yaml
deleted file mode 100644 (file)
index c51d6ba..0000000
+++ /dev/null
@@ -1,5 +0,0 @@
-name: etopen
-vendor: Proofpoint
-license: MIT
-description: Emerging Threats Open Ruleset
-url: https://rules.emergingthreats.net/open/suricata%(__version__)s/emerging.rules.tar.gz
diff --git a/etpro.yaml b/etpro.yaml
deleted file mode 100644 (file)
index 5589946..0000000
+++ /dev/null
@@ -1,8 +0,0 @@
-name: etpro
-description: Emerging Threats Pro Ruleset
-vendor: Proofpoint
-license: Commercial
-url: https://rules.emergingthreatspro.com/%(code)s/suricata%(__version__)s/etpro.rules.tar.gz
-parameters:
-  code:
-    prompt: Emerging Threats Pro access code
diff --git a/index.yaml b/index.yaml
new file mode 100644 (file)
index 0000000..ccb035b
--- /dev/null
@@ -0,0 +1,38 @@
+# This is a version 1 formatted index.
+version: 1
+
+sources:
+
+  # The OISF Traffic ID ruleset.
+  - name: oisf/trafficid
+    vendor: OISF
+    description: Suricata Traffic ID ruleset
+    license: MIT
+    url: https://raw.githubusercontent.com/jasonish/suricata-trafficid/master/rules/traffic-id.rules
+    support-url: https://redmine.openinfosecfoundation.org/
+    min-version: 4.0.0
+
+  # Proofpoint/Emerging Threats Open ruleset.
+  - name: et/open
+    vendor: Proofpoint
+    license: MIT
+    description: Emerging Threats Open Ruleset
+    url: https://rules.emergingthreats.net/open/suricata%(__version__)s/emerging.rules.tar.gz
+
+  # Proofpoint/Emerging Threats Pro ruleset.
+  - name: et/pro
+    description: Emerging Threats Pro Ruleset
+    vendor: Proofpoint
+    license: Commercial
+    url: https://rules.emergingthreatspro.com/%(code)s/suricata%(__version__)s/etpro.rules.tar.gz
+    parameters:
+      code:
+        prompt: Emerging Threats Pro access code
+
+  # SSBL FP blacklist ruleset.
+  - name: sslbl/ssl-fp-blacklist
+    description: Abuse.ch SSL Blacklist
+    vendor: Abuse.ch
+    license: Non-Commercial
+    url: https://sslbl.abuse.ch/blacklist/sslblacklist.rules
+
diff --git a/sslbl-ssl-fp-blacklist.yaml b/sslbl-ssl-fp-blacklist.yaml
deleted file mode 100644 (file)
index 53a7711..0000000
+++ /dev/null
@@ -1,5 +0,0 @@
-name: sslbl-ssl-fp-blacklist
-description: Abuse.ch SSL Blacklist
-vendor: Abuse.ch
-license: Non-Commercial
-url: https://sslbl.abuse.ch/blacklist/sslblacklist.rules
diff --git a/trafficid.yaml b/trafficid.yaml
deleted file mode 100644 (file)
index 0b18975..0000000
+++ /dev/null
@@ -1,5 +0,0 @@
-name: trafficid
-vendor: OISF
-description: Suricata Traffic ID ruleset
-license: MIT
-url: https://raw.githubusercontent.com/jasonish/suricata-trafficid/master/rules/traffic-id.rules