Hi all,

[...]
>>> As a suitable alternative location, one might think of something along
>>> the lines of /var/lib/suricata/rules -- FHS states that the contents of
>>> /var/lib should reflect a program’s variable internal state while
>>> running [2], and the rules may be a special case here (as they change
>>> the internal state of Suricata only when loaded or reloaded). It is also
>>> stated that the user should never need to modify these files, but I am
>>> not sure whether this also includes using a specific automation tool
>>> such as oinkmaster or pulledpork for that purpose.
>>> Still, this sounds like the best option. Any comments?
[...]
>>
>> thinking again about this, I believe you are right.
>>
>> However, this movement is something I would like to coordinate with
>> upstream (CC'ing Victor),
>> since it doesn't make sense to me to point in Debian to one location
>> while Suricata upstream points to another (in docs, recommendations,
>> defaults, etc.)
>>
>> @Victor, any comment?
[...]
> 
> We're discussing this internally currently, but we tend to agree.
> However we want to have a good look at what it would mean for users.

Absolutely.

> Ideally we'd update Suricata to support multiple rule locations cleanly.

That would be great! I would love to be able to do something in
suricata.yaml like:

rules:
  - rule-path: /var/lib/suricata/rules
    rule-files:
      - etpro-trojan.rules
      - etpro-malware.rules
      - etpro-mobile_malware.rules
      - etpro-worm.rules
      ...

  - rule-path: /etc/suricata/rules
    rule-files:
      - decoder-events.rules
      - stream-events.rules
      - dns-events.rules
      - app-layer-events.rules
      - modbus-events.rules
      - tls-events.rules
      ...

to, for instance, separate Suricata-specific rules (that might be
bundled with a Suricata release and hence I would consider OK in /etc)
from externally updated rules (such as ETPRO etc.)
Any opinions?

Cheers
Sascha

Attachment: signature.asc
Description: OpenPGP digital signature

Reply via email to