From mboxrd@z Thu Jan 1 00:00:00 1970 From: Peter =?utf-8?q?M=C3=BCller?= To: development@lists.ipfire.org Subject: [PATCH v3] download ET IDS rules via HTTPS Date: Thu, 16 Aug 2018 17:09:41 +0200 Message-ID: <1708b1ac-091c-392f-b944-918ab7efbba2@link38.eu> MIME-Version: 1.0 Content-Type: multipart/mixed; boundary="===============0835583491878076569==" List-Id: --===============0835583491878076569== Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable The Emerging Threats ruleset server supports HTTPS. It should be used for downloading the ruleset in IPFire, too. This also needs to be applied on the upcoming ids.cgi file for Suricata which I will do in a second patch. The third version of this patch superseds the first and second one which were broken due to bugs in the MUAs GPG implementation. Signed-off-by: Peter M=C3=BCller --- html/cgi-bin/ids.cgi | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/html/cgi-bin/ids.cgi b/html/cgi-bin/ids.cgi index 9863251e2..d9d697deb 100644 --- a/html/cgi-bin/ids.cgi +++ b/html/cgi-bin/ids.cgi @@ -265,7 +265,7 @@ if (!$errormessage) { } elsif ($snortsettings{'RULES'} eq 'community') { $url=3D" https://www.snort.org/rules/community"; } else { - $url=3D"http://rules.emergingthreats.net/open/snort-2.9.0/emerging.rules.t= ar.gz"; + $url=3D"https://rules.emergingthreats.net/open/snort-2.9.0/emerging.rules.= tar.gz"; } =20 if ($snortsettings{'ACTION'} eq $Lang::tr{'save'} && $snortsettings{'ACTION= 2'} eq "snort" ) { --=20 2.16.4 --===============0835583491878076569==--