diff options
Diffstat (limited to 'security/pulledpork/files/patch-etc__pulledpork.conf')
-rw-r--r-- | security/pulledpork/files/patch-etc__pulledpork.conf | 57 |
1 files changed, 0 insertions, 57 deletions
diff --git a/security/pulledpork/files/patch-etc__pulledpork.conf b/security/pulledpork/files/patch-etc__pulledpork.conf deleted file mode 100644 index eff5080f6b94..000000000000 --- a/security/pulledpork/files/patch-etc__pulledpork.conf +++ /dev/null @@ -1,57 +0,0 @@ ---- etc/pulledpork.conf.orig 2013-09-11 21:01:05 UTC -+++ etc/pulledpork.conf -@@ -18,13 +18,15 @@ - # i.e. url|tarball|123456789, - rule_url=https://www.snort.org/reg-rules/|snortrules-snapshot.tar.gz|<oinkcode> - # NEW Community ruleset: --rule_url=https://s3.amazonaws.com/snort-org/www/rules/community/|community-rules.tar.gz|Community -+rule_url=https://snort.org/downloads/community/|community-rules.tar.gz|Community - # NEW For IP Blacklisting! Note the format is urltofile|IPBLACKLIST|<oinkcode> - # This format MUST be followed to let pulledpork know that this is a blacklist --rule_url=http://labs.snort.org/feeds/ip-filter.blf|IPBLACKLIST|open -+rule_url=http://talosintel.com/feeds/ip-filter.blf|IPBLACKLIST|open - # URL for rule documentation! (slow to process) - rule_url=https://www.snort.org/reg-rules/|opensource.gz|<oinkcode> --#rule_url=https://rules.emergingthreatspro.com/|emerging.rules.tar.gz|open -+# THE FOLLOWING URL is for emergingthreats downloads, note the tarball name change! -+# and open-nogpl, to avoid conflicts. -+#rule_url=https://rules.emergingthreats.net/|emerging.rules.tar.gz|open-nogpl - # THE FOLLOWING URL is for etpro downloads, note the tarball name change! - # and the et oinkcode requirement! - #rule_url=https://rules.emergingthreatspro.com/|etpro.rules.tar.gz|<et oinkcode> -@@ -121,14 +123,14 @@ config_path=/usr/local/etc/snort/snort.c - - # Define your distro, this is for the precompiled shared object libs! - # Valid Distro Types: --# Debian-5-0, Debian-6-0, --# Ubuntu-8.04, Ubuntu-10-4 --# Centos-4-8, Centos-5-4 -+# Debian-6-0, Ubuntu-10-4 -+# Ubuntu-12-04, Centos-5-4 - # FC-12, FC-14, RHEL-5-5, RHEL-6-0 --# FreeBSD-7-3, FreeBSD-8-1 --# OpenBSD-4-8 -+# FreeBSD-8-1, FreeBSD-9-0, FreeBSD-10-0 -+# OpenBSD-5-2, OpenBSD-5-3 -+# OpenSUSE-11-4, OpenSUSE-12-1 - # Slackware-13-1 --distro=FreeBSD-8.1 -+distro=FreeBSD-10-0 - - ####### This next section is optional, but probably pretty useful to you. - ####### Please read thoroughly! -@@ -187,7 +189,7 @@ snort_control=/usr/local/bin/snort_contr - # This value MUST contain all 4 minor version - # numbers. ET rules are now also dependant on this, verify supported ET versions - # prior to simply throwing rubbish in this variable kthx! --# snort_version=2.9.0.0 -+# snort_version=2.9.7.5 - - # Here you can specify what rule modification files to run automatically. - # simply uncomment and specify the apt path. -@@ -206,4 +208,4 @@ snort_control=/usr/local/bin/snort_contr - ####### need to process so_rules, simply comment out the so_rule section - ####### you can also specify -T at runtime to process only GID 1 rules. - --version=0.7.0 -+version=0.7.2 |