From: Jason Ish Date: Tue, 28 Nov 2017 18:11:16 +0000 (-0600) Subject: Use a single index file. X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=e75d0b426dd39eec0a17292703fc79ce597c1403;p=thirdparty%2Fsuricata-intel-index.git Use a single index file. --- diff --git a/etopen.yaml b/etopen.yaml deleted file mode 100644 index c51d6ba..0000000 --- a/etopen.yaml +++ /dev/null @@ -1,5 +0,0 @@ -name: etopen -vendor: Proofpoint -license: MIT -description: Emerging Threats Open Ruleset -url: https://rules.emergingthreats.net/open/suricata%(__version__)s/emerging.rules.tar.gz diff --git a/etpro.yaml b/etpro.yaml deleted file mode 100644 index 5589946..0000000 --- a/etpro.yaml +++ /dev/null @@ -1,8 +0,0 @@ -name: etpro -description: Emerging Threats Pro Ruleset -vendor: Proofpoint -license: Commercial -url: https://rules.emergingthreatspro.com/%(code)s/suricata%(__version__)s/etpro.rules.tar.gz -parameters: - code: - prompt: Emerging Threats Pro access code diff --git a/index.yaml b/index.yaml new file mode 100644 index 0000000..ccb035b --- /dev/null +++ b/index.yaml @@ -0,0 +1,38 @@ +# This is a version 1 formatted index. +version: 1 + +sources: + + # The OISF Traffic ID ruleset. + - name: oisf/trafficid + vendor: OISF + description: Suricata Traffic ID ruleset + license: MIT + url: https://raw.githubusercontent.com/jasonish/suricata-trafficid/master/rules/traffic-id.rules + support-url: https://redmine.openinfosecfoundation.org/ + min-version: 4.0.0 + + # Proofpoint/Emerging Threats Open ruleset. + - name: et/open + vendor: Proofpoint + license: MIT + description: Emerging Threats Open Ruleset + url: https://rules.emergingthreats.net/open/suricata%(__version__)s/emerging.rules.tar.gz + + # Proofpoint/Emerging Threats Pro ruleset. + - name: et/pro + description: Emerging Threats Pro Ruleset + vendor: Proofpoint + license: Commercial + url: https://rules.emergingthreatspro.com/%(code)s/suricata%(__version__)s/etpro.rules.tar.gz + parameters: + code: + prompt: Emerging Threats Pro access code + + # SSBL FP blacklist ruleset. + - name: sslbl/ssl-fp-blacklist + description: Abuse.ch SSL Blacklist + vendor: Abuse.ch + license: Non-Commercial + url: https://sslbl.abuse.ch/blacklist/sslblacklist.rules + diff --git a/sslbl-ssl-fp-blacklist.yaml b/sslbl-ssl-fp-blacklist.yaml deleted file mode 100644 index 53a7711..0000000 --- a/sslbl-ssl-fp-blacklist.yaml +++ /dev/null @@ -1,5 +0,0 @@ -name: sslbl-ssl-fp-blacklist -description: Abuse.ch SSL Blacklist -vendor: Abuse.ch -license: Non-Commercial -url: https://sslbl.abuse.ch/blacklist/sslblacklist.rules diff --git a/trafficid.yaml b/trafficid.yaml deleted file mode 100644 index 0b18975..0000000 --- a/trafficid.yaml +++ /dev/null @@ -1,5 +0,0 @@ -name: trafficid -vendor: OISF -description: Suricata Traffic ID ruleset -license: MIT -url: https://raw.githubusercontent.com/jasonish/suricata-trafficid/master/rules/traffic-id.rules