diff --git a/configure.ac b/configure.ac index ec4e6a12d0..c43769075a 100644 --- a/configure.ac +++ b/configure.ac @@ -1423,15 +1423,17 @@ have_suricata_update="no" ruledirprefix="$sysconfdir" suricata_update_rule_files="suricata-update-rule-files" - classic_rule_files="rule-files" AC_CHECK_FILE([$srcdir/suricata-update/setup.py], [ SURICATA_UPDATE_DIR="suricata-update" AC_SUBST(SURICATA_UPDATE_DIR) AC_OUTPUT(suricata-update/Makefile) have_suricata_update="yes" ruledirprefix="$localstatedir/lib" - suricata_update_rule_files="rule-files" - classic_rule_files="classic-rule-files" + no_suricata_update_comment="" + has_suricata_update_comment="#" + ], [ + no_suricata_update_comment="#" + has_suricata_update_comment="" ]) AM_CONDITIONAL([HAVE_SURICATA_UPDATE], [test "x$have_suricata_update" != "xno"]) @@ -2329,8 +2331,8 @@ AC_SUBST(e_magic_file_comment) AC_SUBST(e_enable_evelog) AC_SUBST(e_datarulesdir) AC_SUBST(e_defaultruledir) -AC_SUBST(suricata_update_rule_files) -AC_SUBST(classic_rule_files) +AC_SUBST(has_suricata_update_comment) +AC_SUBST(no_suricata_update_comment) EXPAND_VARIABLE(prefix, CONFIGURE_PREFIX) EXPAND_VARIABLE(sysconfdir, CONFIGURE_SYSCONDIR) diff --git a/suricata.yaml.in b/suricata.yaml.in index 47db38b967..6a8b6ca250 100644 --- a/suricata.yaml.in +++ b/suricata.yaml.in @@ -44,81 +44,8 @@ vars: FILE_DATA_PORTS: "[$HTTP_PORTS,110,143]" FTP_PORTS: 21 - ## -## Step 2: select the rules to enable or disable -## - -#default-rule-path: @e_sysconfdir@rules -default-rule-path: @e_defaultruledir@ -@suricata_update_rule_files@: - - suricata.rules -@classic_rule_files@: - - botcc.rules - # - botcc.portgrouped.rules - - ciarmy.rules - - compromised.rules - - drop.rules - - dshield.rules -# - emerging-activex.rules - - emerging-attack_response.rules - - emerging-chat.rules - - emerging-current_events.rules - - emerging-dns.rules - - emerging-dos.rules - - emerging-exploit.rules - - emerging-ftp.rules -# - emerging-games.rules -# - emerging-icmp_info.rules -# - emerging-icmp.rules - - emerging-imap.rules -# - emerging-inappropriate.rules -# - emerging-info.rules - - emerging-malware.rules - - emerging-misc.rules - - emerging-mobile_malware.rules - - emerging-netbios.rules - - emerging-p2p.rules - - emerging-policy.rules - - emerging-pop3.rules - - emerging-rpc.rules -# - emerging-scada.rules -# - emerging-scada_special.rules - - emerging-scan.rules -# - emerging-shellcode.rules - - emerging-smtp.rules - - emerging-snmp.rules - - emerging-sql.rules - - emerging-telnet.rules - - emerging-tftp.rules - - emerging-trojan.rules - - emerging-user_agents.rules - - emerging-voip.rules - - emerging-web_client.rules - - emerging-web_server.rules -# - emerging-web_specific_apps.rules - - emerging-worm.rules - - tor.rules -# - decoder-events.rules # available in suricata sources under rules dir -# - stream-events.rules # available in suricata sources under rules dir - - http-events.rules # available in suricata sources under rules dir - - smtp-events.rules # available in suricata sources under rules dir - - dns-events.rules # available in suricata sources under rules dir - - tls-events.rules # available in suricata sources under rules dir -# - modbus-events.rules # available in suricata sources under rules dir -# - app-layer-events.rules # available in suricata sources under rules dir -# - dnp3-events.rules # available in suricata sources under rules dir -# - ntp-events.rules # available in suricata sources under rules dir -# - ipsec-events.rules # available in suricata sources under rules dir -# - kerberos-events.rules # available in suricata sources under rules dir - -classification-file: @e_sysconfdir@classification.config -reference-config-file: @e_sysconfdir@reference.config -# threshold-file: @e_sysconfdir@threshold.config - - -## -## Step 3: select outputs to enable +## Step 2: select outputs to enable ## # The default logging directory. Any log or output file will be @@ -1886,6 +1813,93 @@ mpipe: size10386: 0 size16384: 0 +## +## Configure Suricata to load Suricata-Update managed rules. +## +## If this section is completely commented out move down to the "Advanced rule +## file configuration". +## + +@no_suricata_update_comment@default-rule-path: @e_defaultruledir@ +@no_suricata_update_comment@rule-files: +@no_suricata_update_comment@ - suricata.rules + +## +## Advanced rule file configuration. +## +## If this section is completely commented out then your configuration +## is setup for suricata-update as it was most likely bundled and +## installed with Suricata. +## + +@has_suricata_update_comment@default-rule-path: @e_defaultruledir@ + +@has_suricata_update_comment@rule-files: +@has_suricata_update_comment@ - botcc.rules +@has_suricata_update_comment@ # - botcc.portgrouped.rules +@has_suricata_update_comment@ - ciarmy.rules +@has_suricata_update_comment@ - compromised.rules +@has_suricata_update_comment@ - drop.rules +@has_suricata_update_comment@ - dshield.rules +@has_suricata_update_comment@# - emerging-activex.rules +@has_suricata_update_comment@ - emerging-attack_response.rules +@has_suricata_update_comment@ - emerging-chat.rules +@has_suricata_update_comment@ - emerging-current_events.rules +@has_suricata_update_comment@ - emerging-dns.rules +@has_suricata_update_comment@ - emerging-dos.rules +@has_suricata_update_comment@ - emerging-exploit.rules +@has_suricata_update_comment@ - emerging-ftp.rules +@has_suricata_update_comment@# - emerging-games.rules +@has_suricata_update_comment@# - emerging-icmp_info.rules +@has_suricata_update_comment@# - emerging-icmp.rules +@has_suricata_update_comment@ - emerging-imap.rules +@has_suricata_update_comment@# - emerging-inappropriate.rules +@has_suricata_update_comment@# - emerging-info.rules +@has_suricata_update_comment@ - emerging-malware.rules +@has_suricata_update_comment@ - emerging-misc.rules +@has_suricata_update_comment@ - emerging-mobile_malware.rules +@has_suricata_update_comment@ - emerging-netbios.rules +@has_suricata_update_comment@ - emerging-p2p.rules +@has_suricata_update_comment@ - emerging-policy.rules +@has_suricata_update_comment@ - emerging-pop3.rules +@has_suricata_update_comment@ - emerging-rpc.rules +@has_suricata_update_comment@# - emerging-scada.rules +@has_suricata_update_comment@# - emerging-scada_special.rules +@has_suricata_update_comment@ - emerging-scan.rules +@has_suricata_update_comment@# - emerging-shellcode.rules +@has_suricata_update_comment@ - emerging-smtp.rules +@has_suricata_update_comment@ - emerging-snmp.rules +@has_suricata_update_comment@ - emerging-sql.rules +@has_suricata_update_comment@ - emerging-telnet.rules +@has_suricata_update_comment@ - emerging-tftp.rules +@has_suricata_update_comment@ - emerging-trojan.rules +@has_suricata_update_comment@ - emerging-user_agents.rules +@has_suricata_update_comment@ - emerging-voip.rules +@has_suricata_update_comment@ - emerging-web_client.rules +@has_suricata_update_comment@ - emerging-web_server.rules +@has_suricata_update_comment@# - emerging-web_specific_apps.rules +@has_suricata_update_comment@ - emerging-worm.rules +@has_suricata_update_comment@ - tor.rules +@has_suricata_update_comment@# - decoder-events.rules # available in suricata sources under rules dir +@has_suricata_update_comment@# - stream-events.rules # available in suricata sources under rules dir +@has_suricata_update_comment@ - http-events.rules # available in suricata sources under rules dir +@has_suricata_update_comment@ - smtp-events.rules # available in suricata sources under rules dir +@has_suricata_update_comment@ - dns-events.rules # available in suricata sources under rules dir +@has_suricata_update_comment@ - tls-events.rules # available in suricata sources under rules dir +@has_suricata_update_comment@# - modbus-events.rules # available in suricata sources under rules dir +@has_suricata_update_comment@# - app-layer-events.rules # available in suricata sources under rules dir +@has_suricata_update_comment@# - dnp3-events.rules # available in suricata sources under rules dir +@has_suricata_update_comment@# - ntp-events.rules # available in suricata sources under rules dir +@has_suricata_update_comment@# - ipsec-events.rules # available in suricata sources under rules dir +@has_suricata_update_comment@# - kerberos-events.rules # available in suricata sources under rules dir + +## +## Auxiliary configuration files. +## + +classification-file: @e_sysconfdir@classification.config +reference-config-file: @e_sysconfdir@reference.config +# threshold-file: @e_sysconfdir@threshold.config ## ## Include other configs