openbsd-ports/net/oinkmaster/patches/patch-oinkmaster_conf
lteo a7574859bb Update oinkmaster.conf to use HTTPS for the sample snort.org URLs to
protect the oinkcode from being exposed.  Also update the Snort version
in the URLs to 2.9.4.0 to match the current version of our Snort port.

Tweak the regexp that oinkmaster uses to validate HTTPS URLs so that it
won't treat a bad URL that starts with httpsssss:// as valid (this
regexp tweak was jointly worked on by me and maintainer).

regexp feedback zhuk@
OK Markus Lude (maintainer), earlier version OK sthen@
2013-03-04 04:30:35 +00:00

58 lines
2.9 KiB
Plaintext

$OpenBSD: patch-oinkmaster_conf,v 1.8 2013/03/04 04:30:35 lteo Exp $
--- oinkmaster.conf.orig Sat Feb 18 13:35:21 2006
+++ oinkmaster.conf Thu Feb 7 22:15:47 2013
@@ -27,7 +27,7 @@
#
# The location of the official Snort rules you should use depends
# on which Snort version you run. Basically, you should go to
-# http://www.snort.org/rules/ and follow the instructions
+# http://www.snort.org/snort-rules/ and follow the instructions
# there to pick the right URL for your version of Snort
# (and remember to update the URL when upgrading Snort in the
# future). You can of course also specify locations to third party
@@ -36,29 +36,29 @@
# As of March 2005, you must register on the Snort site to get access
# to the official Snort rules. This will get you an "oinkcode".
# You then specify the URL as
-# http://www.snort.org/pub-bin/oinkmaster.cgi/<oinkcode>/<filename>
-# For example, if your code is 5a081649c06a277e1022e1284b and
-# you use Snort 2.4, the url to use would be (without the wrap):
-# http://www.snort.org/pub-bin/oinkmaster.cgi/
-# 5a081649c06a277e1022e1284bdc8fabda70e2a4/snortrules-snapshot-2.4.tar.gz
-# See the Oinkmaster FAQ Q1 and http://www.snort.org/rules/ for
-# more information.
+# https://www.snort.org/reg-rules/<filename>/<oinkcode>
+# For example, if your code is 5a081649c06a277e1022e1284bdc8fabda70e2a4
+# and you use Snort 2.9.4.0, the url to use would be (without the wrap):
+# https://www.snort.org/reg-rules/snortrules-snapshot-2940.tar.gz/
+# 5a081649c06a277e1022e1284bdc8fabda70e2a4
+# See http://www.snort.org/snort-rules/cli for more information.
# URL examples follows. Replace <oinkcode> with the code you get on the
# Snort site in your registered user profile.
-# Example for Snort 2.4
-# url = http://www.snort.org/pub-bin/oinkmaster.cgi/<oinkcode>/snortrules-snapshot-2.4.tar.gz
+# Example for Snort 2.9.4.0 registered user release
+# url = https://www.snort.org/reg-rules/snortrules-snapshot-2940.tar.gz/<oinkcode>
-# Example for Snort-current ("current" means cvs snapshots).
-# url = http://www.snort.org/pub-bin/oinkmaster.cgi/<oinkcode>/snortrules-snapshot-CURRENT.tar.gz
+# Example for Snort 2.9.4.0 subscriber release
+# url = https://www.snort.org/sub-rules/snortrules-snapshot-2940.tar.gz/<oinkcode>
-# Example for Community rules
-# url = http://www.snort.org/pub-bin/downloads.cgi/Download/comm_rules/Community-Rules.tar.gz
+# Example for Snort edge rulepack (latest versioned rulepack)
+# See http://www.snort.org/snort-rules/cli for details
+# url = https://www.snort.org/reg-rules/snortrules-snapshot-edge.tar.gz/<oinkcode>
-# Example for rules from the Bleeding Snort project
-# url = http://www.bleedingsnort.com/bleeding.rules.tar.gz
+# Example for rules from the Emerging Threats project
+# url = http://rules.emergingthreats.net/open/snort-2.9.0/emerging.rules.tar.gz
# If you prefer to download the rules archive from outside Oinkmaster,
# you can then point to the file on your local filesystem by using