Hi all, [...] >>> As a suitable alternative location, one might think of something along >>> the lines of /var/lib/suricata/rules -- FHS states that the contents of >>> /var/lib should reflect a program’s variable internal state while >>> running [2], and the rules may be a special case here (as they change >>> the internal state of Suricata only when loaded or reloaded). It is also >>> stated that the user should never need to modify these files, but I am >>> not sure whether this also includes using a specific automation tool >>> such as oinkmaster or pulledpork for that purpose. >>> Still, this sounds like the best option. Any comments? [...] >> >> thinking again about this, I believe you are right. >> >> However, this movement is something I would like to coordinate with >> upstream (CC'ing Victor), >> since it doesn't make sense to me to point in Debian to one location >> while Suricata upstream points to another (in docs, recommendations, >> defaults, etc.) >> >> @Victor, any comment? [...] > > We're discussing this internally currently, but we tend to agree. > However we want to have a good look at what it would mean for users.
Absolutely.
> Ideally we'd update Suricata to support multiple rule locations cleanly.
That would be great! I would love to be able to do something in
suricata.yaml like:
rules:
- rule-path: /var/lib/suricata/rules
rule-files:
- etpro-trojan.rules
- etpro-malware.rules
- etpro-mobile_malware.rules
- etpro-worm.rules
...
- rule-path: /etc/suricata/rules
rule-files:
- decoder-events.rules
- stream-events.rules
- dns-events.rules
- app-layer-events.rules
- modbus-events.rules
- tls-events.rules
...
to, for instance, separate Suricata-specific rules (that might be
bundled with a Suricata release and hence I would consider OK in /etc)
from externally updated rules (such as ETPRO etc.)
Any opinions?
Cheers
Sascha
signature.asc
Description: OpenPGP digital signature

