aboutsummaryrefslogtreecommitdiffstats
path: root/config/snort/snort_check_for_rule_updates.php
diff options
context:
space:
mode:
authorErmal <eri@pfsense.org>2012-07-11 22:13:23 +0000
committerErmal <eri@pfsense.org>2012-07-11 22:27:00 +0000
commitdc541ec6cf6e12726f3c9a51156670d408275097 (patch)
tree87c5935f8f6351eb5bd1316b2915f2670c3547ad /config/snort/snort_check_for_rule_updates.php
parent77d948e30f205e9ae094e1505067e603cc24ba3e (diff)
downloadpfsense-packages-dc541ec6cf6e12726f3c9a51156670d408275097.tar.gz
pfsense-packages-dc541ec6cf6e12726f3c9a51156670d408275097.tar.bz2
pfsense-packages-dc541ec6cf6e12726f3c9a51156670d408275097.zip
Use sed for normalizing rules. Snort and emerging ones
Diffstat (limited to 'config/snort/snort_check_for_rule_updates.php')
-rw-r--r--config/snort/snort_check_for_rule_updates.php16
1 files changed, 12 insertions, 4 deletions
diff --git a/config/snort/snort_check_for_rule_updates.php b/config/snort/snort_check_for_rule_updates.php
index b8e9a653..153278eb 100644
--- a/config/snort/snort_check_for_rule_updates.php
+++ b/config/snort/snort_check_for_rule_updates.php
@@ -155,6 +155,14 @@ if ($emergingthreats == "on") {
// }
//}
+/* Normalize rulesets */
+$sedcmd = "s/^#alert/# alert/g\n";
+$sedcmd = "s/^##alert/# alert/g\n";
+$sedcmd = "s/^# alert/# alert/g\n";
+$sedcmd = "s/^#\talert/# alert/g\n";
+$sedcmd = "s/^##\talert/# alert/g\n";
+@file_put_contents("{$snortdir}/tmp/sedcmd", $sedcmd);
+
/* Untar snort rules file individually to help people with low system specs */
if ($snortdownload == 'on') {
if (file_exists("{$tmpfname}/{$snort_filename}")) {
@@ -251,11 +259,8 @@ if ($snortdownload == 'on') {
exec("/bin/rm /usr/local/lib/snort/dynamicrules/lib_sfdynamic_example\*");
}
- /* XXX: Convert this to sed? */
/* make shure default rules are in the right format */
- exec("/usr/local/bin/perl -pi -e 's/#alert/# alert/g' {$snortdir}/rules/*.rules");
- exec("/usr/local/bin/perl -pi -e 's/##alert/# alert/g' {$snortdir}/rules/*.rules");
- exec("/usr/local/bin/perl -pi -e 's/## alert/# alert/g' {$snortdir}/rules/*.rules");
+ exec("/usr/bin/sed -I '' -f {$snortdir}/tmp/sedcmd {$snortdir}/rules/*.rules");
/* create a msg-map for snort */
update_status(gettext("Updating Alert Messages..."));
@@ -276,6 +281,9 @@ if ($emergingthreats == 'on') {
exec("/usr/bin/tar xzf {$tmpfname}/{$emergingthreats_filename} -C {$snortdir} rules/");
}
+ /* make shure default rules are in the right format */
+ exec("/usr/bin/sed -I '' -f {$snortdir}/tmp/sedcmd {$snortdir}/rules/*.rules");
+
/* Copy emergingthreats md5 sig to snort dir */
if (file_exists("{$tmpfname}/$emergingthreats_filename_md5")) {
update_status(gettext("Copying md5 sig to snort directory..."));