Skip to content
This repository has been archived by the owner on Apr 16, 2021. It is now read-only.

PulledPork should be using https for ET and ETPRO downloads #160

Closed
GoogleCodeExporter opened this issue Mar 24, 2015 · 7 comments
Closed

Comments

@GoogleCodeExporter
Copy link

PulledPork should be using https for ET and ETPRO downloads

Original issue reported on code.google.com by doug.bu...@gmail.com on 1 Dec 2011 at 11:40

@GoogleCodeExporter
Copy link
Author

Victor Julien  -  you might need to use https://rules.emergingthreatspro.com as 
that is what the certs are for iirc
6:53 AM    

Doug Burks  -  My browser confirms that accessing 
https://rules.emergingthreats.net results in a cert error stating that the cert 
is for rules.emergingthreatspro.com.

Interesting that PulledPork 0.5.0 works using 
https://rules.emergingthreats.net. I guess it's ignoring the hostname presented 
in the cert?

So https://rules.emergingthreatspro.com should be used for both ETPRO and ET 
downloads?

Original comment by doug.bu...@gmail.com on 1 Dec 2011 at 12:08

  • Added labels: ****
  • Removed labels: ****

@GoogleCodeExporter
Copy link
Author

sed -i 
's|rule_url=http://rules.emergingthreats.net|rule_url=https://rules.emergingthre
atspro.com|g' /etc/pulledpork/pulledpork.conf.master

Build new PulledPork package (including pulledpork.conf.master modified in 
previous step)

Add this to security-onion-upgrade.sh:
sed -i 
's|rule_url=http://rules.emergingthreats.net|rule_url=https://rules.emergingthre
atspro.com|g' /etc/pulledpork/pulledpork.conf

Original comment by doug.bu...@gmail.com on 1 Dec 2011 at 3:41

  • Added labels: ****
  • Removed labels: ****

@GoogleCodeExporter
Copy link
Author

Also need to update pulledpork.pl and change all emergingthreats.net references 
to emergingthreats.

Original comment by doug.bu...@gmail.com on 20 Jan 2012 at 4:54

  • Added labels: ****
  • Removed labels: ****

@GoogleCodeExporter
Copy link
Author

Packaged:
/usr/local/lib/ruby/gems/1.9.1/gems/fpm-0.3.11/bin/fpm -s dir -t deb -n 
securityonion-pulledpork -v 20120119 /usr/local/bin/pulledpork.pl 
/etc/pulledpork/pulledpork.conf.master /etc/cron.d/pulledpork 
/usr/local/bin/pulledpork_update.sh

Original comment by doug.bu...@gmail.com on 20 Jan 2012 at 6:32

  • Added labels: ****
  • Removed labels: ****

@GoogleCodeExporter
Copy link
Author

Updated /usr/local/bin/setup to use the new URLs and packaged.

Original comment by doug.bu...@gmail.com on 22 Jan 2012 at 4:50

  • Added labels: ****
  • Removed labels: ****

@GoogleCodeExporter
Copy link
Author

Added the following to security-onion-upgrade.sh:


sed -i 's| |=|g' $CONF
source $CONF
if [ "$VERSION" = "20120116" ]; then
        NEW="20120119"
        echo "**********************************************"   | $LOGGER
        echo "* Upgrading from $VERSION to $NEW."               | $LOGGER
        echo "**********************************************"   | $LOGGER
        DIR="/nsm/backup/$NEW"
        mkdir -p $DIR                                           | $LOGGER
        cd $DIR

    echo "* Disabling Snorby DB fix cronjob due to performance issues with large/busy DBs" | $LOG
GER
    FILE=securityonion-snorby-db-fix_"$NEW"_i386.deb
    wget -q http://sourceforge.net/projects/security-onion/files/$NEW/$FILE -O $FILE | $LOGGER
    dpkg -i $FILE                       | $LOGGER

    echo "* Installing new Setup script"            | $LOGGER
    FILE=securityonion-setup_"$NEW"_i386.deb
    wget -q http://sourceforge.net/projects/security-onion/files/$NEW/$FILE -O $FILE | $LOGGER
    dpkg -i $FILE                       | $LOGGER

    echo "* Installing new Suricata"                        | $LOGGER
        FILE=securityonion-suricata_"$NEW"-1_i386.deb
        wget -q http://sourceforge.net/projects/security-onion/files/$NEW/$FILE -O $FILE | $LOGGER
        dpkg -i $FILE                                           | $LOGGER

        echo "* Installing new Suricata config"                 | $LOGGER
        FILE=securityonion-suricata-config_"$NEW"_i386.deb
        wget -q http://sourceforge.net/projects/security-onion/files/$NEW/$FILE -O $FILE | $LOGGER
        dpkg -i $FILE                                           | $LOGGER

        echo "* Installing new Suricata-specific rules"         | $LOGGER
        FILE=securityonion-suricata-rules_"$NEW"_i386.deb
        wget -q http://sourceforge.net/projects/security-onion/files/$NEW/$FILE -O $FILE | $LOGGER
        dpkg -i $FILE                                           | $LOGGER

    apt-get -y remove securityonion-pulledpork-update
        echo "* Installing new PulledPork config"            | $LOGGER
        FILE=securityonion-pulledpork_"$NEW"_i386.deb
        wget -q http://sourceforge.net/projects/security-onion/files/$NEW/$FILE -O $FILE | $LOGGER
        dpkg -i $FILE                                           | $LOGGER

    cp /etc/crontab .
    sed -i '/pulledpork_update.sh/d' /etc/crontab
    service cron restart                    | $LOGGER

        echo "* Copying suricata.yaml to sensor directories"    | $LOGGER
        grep -v "^#" /etc/nsm/sensortab |awk '{print $1}' |while read SENSOR
        do
                mkdir -p $DIR/"$SENSOR"/
                cp /etc/nsm/"$SENSOR"/suricata.yaml $DIR/"$SENSOR"/
                cp /etc/suricata/suricata.yaml /etc/nsm/"$SENSOR"/
        sed -i "s|threshold-file: threshold.conf|threshold-file: /etc/nsm/$SENSOR/threshold.c
onf|g" /etc/nsm/"$SENSOR"/suricata.yaml
        done

    FILE=/etc/pulledpork/pulledpork.conf
    if [ -f $FILE ]
    then
        sed -i 's|local_rules=/etc/nsm/rules/local.rules,/etc/nsm/rules/decoder-events.rules,
/etc/nsm/rules/stream-events.rules|local_rules=/etc/nsm/rules/local.rules,/etc/n
sm/rules/decoder-even
ts.rules,/etc/nsm/rules/stream-events.rules,/etc/nsm/rules/http-events.rules,/et
c/nsm/rules/smtp-even
ts.rules|g' $FILE
        sed -i 's|rule_url=http://rules.emergingthreats.net|rule_url=https://rules.emergingth
reatspro.com|g' $FILE
        sed -i 's|distro=FreeBSD-8.0|distro=Ubuntu-10-4|g' $FILE
        /usr/local/bin/pulledpork_update.sh
    fi

        sed -i "s|VERSION=$VERSION|VERSION=$NEW|g" $CONF        | $LOGGER
        echo "* Upgrade to $NEW complete."                      | $LOGGER
        echo 
fi

Original comment by doug.bu...@gmail.com on 22 Jan 2012 at 5:37

  • Added labels: ****
  • Removed labels: ****

@GoogleCodeExporter
Copy link
Author

Published:
http://securityonion.blogspot.com/2012/01/security-onion-20120119-now-available.
html

Original comment by doug.bu...@gmail.com on 22 Jan 2012 at 5:38

  • Changed state: Verified
  • Added labels: ****
  • Removed labels: ****

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Projects
None yet
Development

No branches or pull requests

1 participant