aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorErmal <eri@pfsense.org>2012-07-18 08:40:22 +0000
committerErmal <eri@pfsense.org>2012-07-18 08:40:22 +0000
commitd515b896f8ebed1234daa4e5ad6a9c4d7cf77f6c (patch)
treec2d92e13dd4f420b9e1903397f610dc8f2db18a3
parentfe7adba408e06860129fb6970428cc2a8fae8ab9 (diff)
downloadpfsense-packages-d515b896f8ebed1234daa4e5ad6a9c4d7cf77f6c.tar.gz
pfsense-packages-d515b896f8ebed1234daa4e5ad6a9c4d7cf77f6c.tar.bz2
pfsense-packages-d515b896f8ebed1234daa4e5ad6a9c4d7cf77f6c.zip
Correct issues with sensitive data rules
-rw-r--r--config/snort/snort.inc46
1 files changed, 19 insertions, 27 deletions
diff --git a/config/snort/snort.inc b/config/snort/snort.inc
index 316bb2dc..d09b622e 100644
--- a/config/snort/snort.inc
+++ b/config/snort/snort.inc
@@ -685,9 +685,6 @@ function sync_snort_package_config() {
/* create snort configuration file */
snort_generate_conf($value);
- /* populate rules */
- snort_create_rules_iface($value, $if_real);
-
/* create barnyard2 configuration file */
if ($value['barnyard_enable'] == 'on')
snort_create_barnyard2_conf($value, $if_real);
@@ -840,24 +837,6 @@ EOD;
@chmod("/usr/local/etc/rc.d/snort.sh", 0755);
}
-/* if rules exist copy to new interfaces */
-function snort_create_rules_iface($snortcfg, $if_real) {
- global $config, $g;
-
- $snortdir = SNORTDIR;
- $snort_uuid = $snortcfg['uuid'];
-
- if (empty($snortcfg['rulesets']))
- return;
-
- $rule_dir = "{$snortdir}/snort_{$snort_uuid}_{$if_real}";
- $files = explode("||", $snortcfg['rulesets']);
- foreach ($files as $file) {
- if (!file_exists("{$rule_dir}}/rules/{$file}") && file_exists("{$snortdir}}/rules/{$file}"))
- @copy("{$snortdir}/rules/{$file}", "{$rule_dir}/rules/{$file}");
- }
-}
-
/* open barnyard2.conf for writing */
function snort_create_barnyard2_conf($snortcfg, $if_real) {
global $config, $g;
@@ -1022,6 +1001,7 @@ function snort_generate_conf($snortcfg) {
$snort_dirs = array( $snortdir, $snortcfgdir, "{$snortcfgdir}/rules",
"{$snortlogdir}/snort_{$if_real}{$snort_uuid}",
"{$snortlogdir}/snort_{$if_real}{$snort_uuid}/barnyard2",
+ "{$snortcfgdir}/preproc_rules",
"dynamicrules" => "/usr/local/lib/snort/dynamicrules",
"dynamicengine" => "/usr/local/lib/snort/dynamicengine",
"dynamicpreprocessor" => "/usr/local/lib/snort/dynamicpreprocessor"
@@ -1032,7 +1012,8 @@ function snort_generate_conf($snortcfg) {
}
$snort_files = array("gen-msg.map", "classification.config", "reference.config",
- "sid-msg.map", "unicode.map", "threshold.conf"
+ "sid-msg.map", "unicode.map", "threshold.conf", "preproc_rules/preprocessor.rules",
+ "preproc_rules/decoder.rules", "preproc_rules/sensitive-data.rules"
);
foreach ($snort_files as $file) {
if (file_exists("{$snortdir}/{$file}"))
@@ -1314,12 +1295,21 @@ EOD;
$snort_misc_include_rules .= "include {$snortcfgdir}/reference.config\n";
if (file_exists("{$snortcfgdir}/classification.config"))
$snort_misc_include_rules .= "include {$snortcfgdir}/classification.config\n";
- if (is_dir("{$snortdir}/preproc_rules")) {
- if ($snortcfg['sensitive_data'] == 'on' && file_exists("{$snortdir}/preproc_rules/sensitive-data.rules"))
- $snort_misc_include_rules .= "include \$PREPROC_RULE_PATH/sensitive-data.rules\n";
-
+ if (is_dir("{$snortcfgdir}/preproc_rules")) {
+ if ($snortcfg['sensitive_data'] == 'on') {
+ $sedcmd = "s/^# alert\(.*\)classtype:sdf;\(.*\)/alert\1classtype:sdf\2/g";
+ if (file_exists("{$snortcfgdir}/preproc_rules/sensitive-data.rules"))
+ $snort_misc_include_rules .= "include \$PREPROC_RULE_PATH/sensitive-data.rules\n";
+ } else
+ $sedcmd = "s/^alert\(.*\)classtype:sdf;\(.*\)/# alert\1classtype:sdf\2/g";
if (file_exists("{$snortdir}/preproc_rules/decoder.rules") &&
file_exists("{$snortdir}/preproc_rules/preprocessor.rules")) {
+ @file_put_contents("{$snortcfgdir}/tmp/sedcmd", $sedcmd);
+ if (file_exists("{$snortcfgdir}/preproc_rules/preprocessor.rules"))
+ mwexec("/usr/bin/sed -Ie -f '{$sedcmd}' {$snortcfgdir}/preproc_rules/preprocessor.rules");
+ if (file_exists("{$snortcfgdir}/preproc_rules/decoder.rules"))
+ mwexec("/usr/bin/sed -Ie -f '{$sedcmd}' {$snortcfgdir}/preproc_rules/decoder.rules");
+
$snort_misc_include_rules .= "include \$PREPROC_RULE_PATH/decoder.rules\n";
$snort_misc_include_rules .= "include \$PREPROC_RULE_PATH/preprocessor.rules\n";
} else {
@@ -1337,6 +1327,8 @@ EOD;
if (!empty($snortcfg['rulesets'])) {
$enabled_rulesets_array = explode("||", $snortcfg['rulesets']);
foreach($enabled_rulesets_array as $enabled_item) {
+ if (file_exists("{$snortdir}}/rules/{$enabled_item}") && !file_exists("{$snortcfgdir}}/rules/{$enabled_item}"))
+ @copy("{$snortdir}/rules/{$file}", "{$rule_dir}/rules/{$file}");
if (substr($enabled_item, 0, 5) == "snort" && substr($enabled_item, -9) == ".so.rules") {
$slib = substr($enabled_item, 6, -6);
if (file_exists("{$snort_dirs['dynamicrules']}/{$slib}") &&
@@ -1369,7 +1361,7 @@ var EXTERNAL_NET [{$external_net}]
# Define Rule Paths #
var RULE_PATH {$snortcfgdir}/rules
-var PREPROC_RULE_PATH {$snortdir}/preproc_rules
+var PREPROC_RULE_PATH {$snortcfgdir}/preproc_rules
# Define Servers #
{$vardef}