From patchwork Thu Jun 6 04:56:34 2019 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Stefan Schantl X-Patchwork-Id: 2286 Return-Path: Received: from mail01.ipfire.org (mail01.i.ipfire.org [172.28.1.200]) (using TLSv1.2 with cipher ECDHE-ECDSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "mail01.ipfire.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by web07.i.ipfire.org (Postfix) with ESMTPS id 206FC88895A for ; Wed, 5 Jun 2019 19:56:55 +0100 (BST) Received: from mail01.i.ipfire.org (localhost [IPv6:::1]) by mail01.ipfire.org (Postfix) with ESMTP id 45Jyh64ZjGz5NKbC; Wed, 5 Jun 2019 19:56:54 +0100 (BST) Received: from tuxedo.stevee (212095005248.public.telering.at [212.95.5.248]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mail01.ipfire.org (Postfix) with ESMTPSA id 45Jygv2Rdfz5NKZw; Wed, 5 Jun 2019 19:56:43 +0100 (BST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ipfire.org; s=201904rsa; t=1559761003; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=rj2UJMuJrmunWrIlG4lkXjtB5ktaouOdY2N/YfeNXe0=; b=c7PdoxWyrYVXchTZIoonhjgm3nwOKrupDGF8XSg584fskncRB3Rr7ZESM0cTehgghI32ZB pdGYgeB/qxeUtagZvXsp3jpI1r8dXH7obu8Tvp2N5ymsegWOxIj7SLfWvBaBxt+bDvTyXB 8g9eKZDxaXKsEbupJWogywdyX+Kt+ZlV/siAVNobo1EfqRAuuzGO2688cqFzeDtDeMytnf MKy6wMAaJOlqTRsniTba42/FpXyC/qWjRWpSDHv+DcdqN4hiTDpyPgAJ0kvdTVKeZwqOAJ ZOicztGL26Pzxd0mqzgEXD8TmPf9Nm744WCSyZ8RDhXj44t9EjyRcnSbhpgAig== DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=ipfire.org; s=201904ed25519; t=1559761003; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=rj2UJMuJrmunWrIlG4lkXjtB5ktaouOdY2N/YfeNXe0=; b=o/gHwGWvB4Lk/1BkiKMyG04SHwkyFI0zotnBBZ+9pMPI4JAFziaY8V2aXfBNElCVWC0b42 nVg19Qa1I96Z/4BQ== From: Stefan Schantl To: development@lists.ipfire.org Subject: [PATCH 3/5] convert-snort: Adjust code to use changed modify_sids_file function. Date: Wed, 5 Jun 2019 20:56:34 +0200 Message-Id: <20190605185636.9952-3-stefan.schantl@ipfire.org> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20190605185636.9952-1-stefan.schantl@ipfire.org> References: <20190605185636.9952-1-stefan.schantl@ipfire.org> MIME-Version: 1.0 Authentication-Results: mail01.ipfire.org; auth=pass smtp.auth=stevee smtp.mailfrom=stefan.schantl@ipfire.org X-BeenThere: development@lists.ipfire.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: IPFire development talk List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: development-bounces@lists.ipfire.org Sender: "Development" Signed-off-by: Stefan Schantl --- config/suricata/convert-snort | 12 +----------- 1 file changed, 1 insertion(+), 11 deletions(-) diff --git a/config/suricata/convert-snort b/config/suricata/convert-snort index 83931fa5b..5ed36954f 100644 --- a/config/suricata/convert-snort +++ b/config/suricata/convert-snort @@ -196,18 +196,8 @@ if (-f $guardian_meta) { ## Step 5: Generate and write the file to modify the ruleset. # -# Converters default is to only monitor the traffic, so set the IDS action to -# "alert". -my $IDS_action = "alert"; - -# Check if the traffic only should be monitored. -if ($idssettings{"MONITOR_TRAFFIC_ONLY"} eq "off") { - # Swith IDS action to alert only. - $IDS_action = "drop"; -} - # Call subfunction and pass the desired IDS action. -&IDS::write_modify_sids_file($IDS_action); +&IDS::write_modify_sids_file(); # Set correct ownership. &IDS::set_ownership("$IDS::modify_sids_file");