-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 The Emerging Threats ruleset server supports HTTPS. It should be used for downloading the ruleset in IPFire, too. This also needs to be applied on the upcoming ids.cgi file for Suricata which I will do in a second patch. The second version of this patch supersedes the first one, which contained crappy line wraps due to a bug in PGP/MIME implementation in MUA. Signed-off-by: Peter Müller - --- html/cgi-bin/ids.cgi | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/html/cgi-bin/ids.cgi b/html/cgi-bin/ids.cgi index 9863251e2..d9d697deb 100644 - --- a/html/cgi-bin/ids.cgi +++ b/html/cgi-bin/ids.cgi @@ -265,7 +265,7 @@ if (!$errormessage) { } elsif ($snortsettings{'RULES'} eq 'community') { $url=" https://www.snort.org/rules/community"; } else { - - $url="http://rules.emergingthreats.net/open/snort-2.9.0/emerging.rules.tar.gz"; + $url="https://rules.emergingthreats.net/open/snort-2.9.0/emerging.rules.tar.gz"; } if ($snortsettings{'ACTION'} eq $Lang::tr{'save'} && $snortsettings{'ACTION2'} eq "snort" ) { - -- 2.16.4 -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEvP4SiGhEYDJyrRLk2UjyD317n2gFAlt0Pr0ACgkQ2UjyD317 n2jqvA//e2RR4h363IYzcdKfsUqEkr6DN4AJu3m5d43G00u0/d/OsN5Ai+yjsEJ/ h+uzdk9mSt6ztBg/UziG4EpAH/qX6vDwY37J+rRtvqAO7X0S3lx4/g7AeZtxgpur LqvUOle3+IPiqCBfKJtzmOPpSMLitD+5yYLfLstjEZSTFelRYoE7uty6pQMvJKqv t+hDPA17MfSj+NSxzcewWsUqpXvgG+p/JNsN6/7b4vCKVeooqO9llw5Q6y2ICoJS B65yjr1JZmM6/zB55PXH0VXFzJBOMkVLq3ghQweCtCPj0q7lqLziZOy2ChEWXH0E ERucnSW/+rDSUrBQ4xtLcYx7HhtHWKXsdQC1MeVMGCzu6sc9RQG7cuqhmew0kRGE C5JtMnMSXIVsGkNT7GTHQheK83bB/jkp13N/FZm7UAPVirPfozkAjinXnP9NpZyw vARDXc1t2cPzz/igozopOcRShfYClFNQb7wf/9s9VSedyRrIwbcG+qEkoghBBox8 tKNE3iUFfNVIiOcmjlapfvSSf9kh3FwGsTDoj6AP9wrGUkR4YfZ/7kPTSxxYhjK7 4c9ptKBzTXeGw2zaTOoN6N8aGPCtPCPxQgkR1XlIrb79ljHGRcWnTuIvlMnUc+1W 2eg/G1NAgjlWvBnlN0/ZwcVxJHdZycKb0OakAqtFUxf56FwRkwI= =KaVn -----END PGP SIGNATURE-----