aboutsummaryrefslogtreecommitdiff
path: root/security/pulledpork/files/patch-etc__pulledpork.conf
diff options
context:
space:
mode:
Diffstat (limited to 'security/pulledpork/files/patch-etc__pulledpork.conf')
-rw-r--r--security/pulledpork/files/patch-etc__pulledpork.conf57
1 files changed, 0 insertions, 57 deletions
diff --git a/security/pulledpork/files/patch-etc__pulledpork.conf b/security/pulledpork/files/patch-etc__pulledpork.conf
deleted file mode 100644
index eff5080f6b94..000000000000
--- a/security/pulledpork/files/patch-etc__pulledpork.conf
+++ /dev/null
@@ -1,57 +0,0 @@
---- etc/pulledpork.conf.orig 2013-09-11 21:01:05 UTC
-+++ etc/pulledpork.conf
-@@ -18,13 +18,15 @@
- # i.e. url|tarball|123456789,
- rule_url=https://www.snort.org/reg-rules/|snortrules-snapshot.tar.gz|<oinkcode>
- # NEW Community ruleset:
--rule_url=https://s3.amazonaws.com/snort-org/www/rules/community/|community-rules.tar.gz|Community
-+rule_url=https://snort.org/downloads/community/|community-rules.tar.gz|Community
- # NEW For IP Blacklisting! Note the format is urltofile|IPBLACKLIST|<oinkcode>
- # This format MUST be followed to let pulledpork know that this is a blacklist
--rule_url=http://labs.snort.org/feeds/ip-filter.blf|IPBLACKLIST|open
-+rule_url=http://talosintel.com/feeds/ip-filter.blf|IPBLACKLIST|open
- # URL for rule documentation! (slow to process)
- rule_url=https://www.snort.org/reg-rules/|opensource.gz|<oinkcode>
--#rule_url=https://rules.emergingthreatspro.com/|emerging.rules.tar.gz|open
-+# THE FOLLOWING URL is for emergingthreats downloads, note the tarball name change!
-+# and open-nogpl, to avoid conflicts.
-+#rule_url=https://rules.emergingthreats.net/|emerging.rules.tar.gz|open-nogpl
- # THE FOLLOWING URL is for etpro downloads, note the tarball name change!
- # and the et oinkcode requirement!
- #rule_url=https://rules.emergingthreatspro.com/|etpro.rules.tar.gz|<et oinkcode>
-@@ -121,14 +123,14 @@ config_path=/usr/local/etc/snort/snort.c
-
- # Define your distro, this is for the precompiled shared object libs!
- # Valid Distro Types:
--# Debian-5-0, Debian-6-0,
--# Ubuntu-8.04, Ubuntu-10-4
--# Centos-4-8, Centos-5-4
-+# Debian-6-0, Ubuntu-10-4
-+# Ubuntu-12-04, Centos-5-4
- # FC-12, FC-14, RHEL-5-5, RHEL-6-0
--# FreeBSD-7-3, FreeBSD-8-1
--# OpenBSD-4-8
-+# FreeBSD-8-1, FreeBSD-9-0, FreeBSD-10-0
-+# OpenBSD-5-2, OpenBSD-5-3
-+# OpenSUSE-11-4, OpenSUSE-12-1
- # Slackware-13-1
--distro=FreeBSD-8.1
-+distro=FreeBSD-10-0
-
- ####### This next section is optional, but probably pretty useful to you.
- ####### Please read thoroughly!
-@@ -187,7 +189,7 @@ snort_control=/usr/local/bin/snort_contr
- # This value MUST contain all 4 minor version
- # numbers. ET rules are now also dependant on this, verify supported ET versions
- # prior to simply throwing rubbish in this variable kthx!
--# snort_version=2.9.0.0
-+# snort_version=2.9.7.5
-
- # Here you can specify what rule modification files to run automatically.
- # simply uncomment and specify the apt path.
-@@ -206,4 +208,4 @@ snort_control=/usr/local/bin/snort_contr
- ####### need to process so_rules, simply comment out the so_rule section
- ####### you can also specify -T at runtime to process only GID 1 rules.
-
--version=0.7.0
-+version=0.7.2