From: Stefan Schantl <stefan.schantl@ipfire.org>
To: development@lists.ipfire.org
Subject: [PATCH 4/5] convert-ids-modifysids-file: Adjust code to use changed write_modify_sids_file function
Date: Wed, 05 Jun 2019 20:56:35 +0200 [thread overview]
Message-ID: <20190605185636.9952-4-stefan.schantl@ipfire.org> (raw)
In-Reply-To: <20190605185636.9952-1-stefan.schantl@ipfire.org>
[-- Attachment #1: Type: text/plain, Size: 2014 bytes --]
Signed-off-by: Stefan Schantl <stefan.schantl(a)ipfire.org>
---
config/suricata/convert-ids-modifysids-file | 32 +++------------------
1 file changed, 4 insertions(+), 28 deletions(-)
diff --git a/config/suricata/convert-ids-modifysids-file b/config/suricata/convert-ids-modifysids-file
index 8b70aa0fc..adcc10577 100644
--- a/config/suricata/convert-ids-modifysids-file
+++ b/config/suricata/convert-ids-modifysids-file
@@ -24,44 +24,20 @@ use strict;
require '/var/ipfire/general-functions.pl';
require "${General::swroot}/ids-functions.pl";
-# Hash which contains the IDS (suricata) settings.
-my %idssettings;
-
-# Hash which contains the RULES settings.
-my %rulessettings;
-
-#
-## Step 1: Read IDS and rules settings.
-#
-
exit unless(-f $IDS::ids_settings_file and -f $IDS::rules_settings_file);
-# Read IDS settings.
-&General::readhash("$IDS::ids_settings_file", \%idssettings);
-
-# Read rules settings.
-&General::readhash("$IDS::rules_settings_file", \%rulessettings);
-
#
-## Step 2: Generate and write the file to modify the ruleset.
+## Step 1: Re-generate and write the file to modify the ruleset.
#
-my $IDS_action = "drop";
-
-# Check if the traffic only should be monitored.
-if ($idssettings{"MONITOR_TRAFFIC_ONLY"} eq "on") {
- # Switch IDS action to alert only.
- $IDS_action = "alert";
-}
-
# Call subfunction and pass the desired IDS action.
-&IDS::write_modify_sids_file($IDS_action, $rulessettings{RULES});
+&IDS::write_modify_sids_file();
# Set correct ownership.
&IDS::set_ownership("$IDS::modify_sids_file");
#
-## Step 3: Call oinkmaster to extract and setup the rules structures.
+## Step 2: Call oinkmaster to extract and setup the rules structures.
#
# Check if a rulestarball is present.
@@ -74,7 +50,7 @@ if (-f $IDS::rulestarball) {
}
#
-## Step 4: Start the IDS if enabled.
+## Step 3: Reload the IDS ruleset if running.
#
# Check if the IDS should be started.
--
2.20.1
next prev parent reply other threads:[~2019-06-05 18:56 UTC|newest]
Thread overview: 7+ messages / expand[flat|nested] mbox.gz Atom feed top
2019-06-05 18:56 [PATCH 1/5] suricata: correct rule actions in IPS mode Stefan Schantl
2019-06-05 18:56 ` [PATCH 2/5] ids-functions.pl: Rework function write_modify_sids_file() Stefan Schantl
2019-06-05 18:56 ` [PATCH 3/5] convert-snort: Adjust code to use changed modify_sids_file function Stefan Schantl
2019-06-05 18:56 ` Stefan Schantl [this message]
2019-06-05 18:56 ` [PATCH 5/5] Core 133: Add suricata related converters to the update Stefan Schantl
2019-06-05 20:34 ` [PATCH 1/5] suricata: correct rule actions in IPS mode Tim FitzGeorge
2019-06-06 7:53 ` Michael Tremer
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20190605185636.9952-4-stefan.schantl@ipfire.org \
--to=stefan.schantl@ipfire.org \
--cc=development@lists.ipfire.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox