docs: replace redmine links and enforce https on oisf urls

pull/3246/head
Andreas Herz 8 years ago committed by Victor Julien
parent c411519605
commit 2e8678a5ff

@ -55,5 +55,5 @@ endif
@echo "'LD_LIBRARY_PATH="$(DESTDIR)$(prefix)/lib" "$(DESTDIR)$(bindir)/suricata" -c "$(DESTDIR)$(e_sysconfdir)/suricata.yaml" -i eth0'." @echo "'LD_LIBRARY_PATH="$(DESTDIR)$(prefix)/lib" "$(DESTDIR)$(bindir)/suricata" -c "$(DESTDIR)$(e_sysconfdir)/suricata.yaml" -i eth0'."
@echo "" @echo ""
@echo "While rules are installed now, it's highly recommended to use a rule manager for maintaining rules." @echo "While rules are installed now, it's highly recommended to use a rule manager for maintaining rules."
@echo "The two most common are Oinkmaster and Pulledpork. For a guide see:" @echo "The three most common are Suricata-Update, Oinkmaster and Pulledpork. For a guide see:"
@echo "https://redmine.openinfosecfoundation.org/projects/suricata/wiki/Rule_Management_with_Oinkmaster" @echo "https://suricata.readthedocs.io/en/latest/rule-management/index.html"

@ -15,7 +15,7 @@ https://redmine.openinfosecfoundation.org/projects/suricata/wiki/Suricata_Instal
User Guide User Guide
---------- ----------
You can follow the [Suricata user guide](http://suricata.readthedocs.io/en/latest/) to get started. You can follow the [Suricata user guide](https://suricata.readthedocs.io/en/latest/) to get started.
Our deprecated (but still useful) user guide is also [available](https://redmine.openinfosecfoundation.org/projects/suricata/wiki/Suricata_User_Guide). Our deprecated (but still useful) user guide is also [available](https://redmine.openinfosecfoundation.org/projects/suricata/wiki/Suricata_User_Guide).

@ -1132,7 +1132,7 @@
fi fi
# see if we have the patched libnet 1.1 # see if we have the patched libnet 1.1
# http://www.inliniac.net/blog/2007/10/16/libnet-11-ipv6-fixes-and-additions.html # https://www.inliniac.net/blog/2007/10/16/libnet-11-ipv6-fixes-and-additions.html
# #
# To prevent duping the lib link we reset LIBS after this check. Setting action-if-found to NULL doesn't seem to work # To prevent duping the lib link we reset LIBS after this check. Setting action-if-found to NULL doesn't seem to work
# see: http://blog.flameeyes.eu/2008/04/29/i-consider-ac_check_lib-harmful # see: http://blog.flameeyes.eu/2008/04/29/i-consider-ac_check_lib-harmful

@ -1,5 +1,5 @@
Team: Team:
http://suricata-ids.org/about/team/ https://suricata-ids.org/about/team/
All contributors: All contributors:
https://www.ohloh.net/p/suricata-engine/contributors/summary https://www.ohloh.net/p/suricata-engine/contributors/summary

@ -2,7 +2,7 @@ About
===== =====
Suricata is a multi-threaded intrusion detection/prevention engine. Suricata is a multi-threaded intrusion detection/prevention engine.
engine available from the Open Information Security Foundation engine available from the Open Information Security Foundation
(http://www.openinfosecfoundation.org). (https://www.openinfosecfoundation.org).
Suricata and the HTP library are licensed under the GPLv2. A copy of this Suricata and the HTP library are licensed under the GPLv2. A copy of this
license is available in this tarball, or at: license is available in this tarball, or at:

@ -124,7 +124,7 @@ cd oisfnew
./configure --enable-pfring --with-libpfring-libraries=/opt/PF_RING/lib --with-libpfring-includes=/opt/PF_RING/include --with-libpcap-libraries=/opt/PF_RING/lib --with-libpcap-includes=/opt/PF_RING/include LD_RUN_PATH="/opt/PF_RING/lib:/usr/lib:/usr/local/lib" --prefix=/opt/PF_RING/ ./configure --enable-pfring --with-libpfring-libraries=/opt/PF_RING/lib --with-libpfring-includes=/opt/PF_RING/include --with-libpcap-libraries=/opt/PF_RING/lib --with-libpcap-includes=/opt/PF_RING/include LD_RUN_PATH="/opt/PF_RING/lib:/usr/lib:/usr/local/lib" --prefix=/opt/PF_RING/
make && make install make && make install
#Make config and log directories for a more complete getting started see http://www.inliniac.net/blog/2010/05/10/setting-up-suricata-0-9-0-for-initial-use-on-ubuntu-lucid-10-04.html #Make config and log directories for a more complete getting started see https://www.inliniac.net/blog/2010/05/10/setting-up-suricata-0-9-0-for-initial-use-on-ubuntu-lucid-10-04.html
mkdir /etc/suricata mkdir /etc/suricata
cp suricata.yaml /etc/suricata/ cp suricata.yaml /etc/suricata/
cp classification.config /etc/suricata/ cp classification.config /etc/suricata/

@ -1,2 +1 @@
http://suricata-ids.org/news/ https://suricata-ids.org/news/

@ -1,5 +1,5 @@
Autogenerated on 2012-11-29 Autogenerated on 2012-11-29
from - https://redmine.openinfosecfoundation.org/projects/suricata/wiki/Setting_up_IPSinline_for_Linux from - https://suricata.readthedocs.io/en/latest/setting-up-ipsinline-for-linux.html
Setting up IPS/inline for Linux Setting up IPS/inline for Linux

@ -1,4 +1,3 @@
Plenty, and you're welcome to help! Plenty, and you're welcome to help!
http://suricata-ids.org/participate/ https://suricata-ids.org/participate/

@ -1,7 +1,7 @@
Myricom Myricom
======= =======
From: http://blog.inliniac.net/2012/07/10/suricata-on-myricom-capture-cards/ From: https://blog.inliniac.net/2012/07/10/suricata-on-myricom-capture-cards/
In this guide Ill describe using the Myricom libpcap support. Im going to assume you installed the card properly, installed the Sniffer driver and made sure that all works. Make sure that in your dmesg you see that the card is in sniffer mode: In this guide Ill describe using the Myricom libpcap support. Im going to assume you installed the card properly, installed the Sniffer driver and made sure that all works. Make sure that in your dmesg you see that the card is in sniffer mode:

@ -114,4 +114,4 @@ Finally restart Suricata.
Further reading Further reading
~~~~~~~~~~~~~~~ ~~~~~~~~~~~~~~~
See http://suricata-update.readthedocs.io/en/latest/ See https://suricata-update.readthedocs.io/en/latest/

@ -387,7 +387,7 @@ IP Reputation and ``iprep`` Keyword
- :doc:`../reputation/ipreputation/ip-reputation-config` - :doc:`../reputation/ipreputation/ip-reputation-config`
- :doc:`ip-reputation-rules` - :doc:`ip-reputation-rules`
- :doc:`../reputation/ipreputation/ip-reputation-format` - :doc:`../reputation/ipreputation/ip-reputation-format`
- `http://blog.inliniac.net/2012/11/21/ip-reputation-in-suricata/ <http://blog.inliniac.net/2012/11/21/ip-reputation-in-suricata/>`_ - `https://blog.inliniac.net/2012/11/21/ip-reputation-in-suricata/ <https://blog.inliniac.net/2012/11/21/ip-reputation-in-suricata/>`_
Flowbits Flowbits
-------- --------
@ -482,8 +482,8 @@ File Extraction
- :doc:`file-keywords` - :doc:`file-keywords`
- :doc:`../file-extraction/file-extraction` - :doc:`../file-extraction/file-extraction`
- `http://blog.inliniac.net/2011/11/29/file-extraction-in-suricata/ <http://blog.inliniac.net/2011/11/29/file-extraction-in-suricata/>`_ - `https://blog.inliniac.net/2011/11/29/file-extraction-in-suricata/ <https://blog.inliniac.net/2011/11/29/file-extraction-in-suricata/>`_
- `http://blog.inliniac.net/2014/11/11/smtp-file-extraction-in-suricata/ <http://blog.inliniac.net/2014/11/11/smtp-file-extraction-in-suricata/>`_ - `https://blog.inliniac.net/2014/11/11/smtp-file-extraction-in-suricata/ <https://blog.inliniac.net/2014/11/11/smtp-file-extraction-in-suricata/>`_
Lua Scripting Lua Scripting
------------- -------------

@ -113,7 +113,7 @@ Just MD5's are good as well::
Each MD5 uses 16 bytes of memory. 20 Million MD5's use about 310 MiB of memory. Each MD5 uses 16 bytes of memory. 20 Million MD5's use about 310 MiB of memory.
See also: http://blog.inliniac.net/2012/06/09/suricata-md5-blacklisting/ See also: https://blog.inliniac.net/2012/06/09/suricata-md5-blacklisting/
filesha1 filesha1
-------- --------

@ -265,7 +265,7 @@ modifiers, like ``depth``, ``distance``, ``offset``, ``nocase`` and
**Note**: the header buffer is *normalized*. Any trailing **Note**: the header buffer is *normalized*. Any trailing
whitespace and tab characters are removed. See: whitespace and tab characters are removed. See:
http://lists.openinfosecfoundation.org/pipermail/oisf-users/2011-October/000935.html. https://lists.openinfosecfoundation.org/pipermail/oisf-users/2011-October/000935.html.
To avoid that, use the ``http_raw_header`` keyword. To avoid that, use the ``http_raw_header`` keyword.
Example of a header in a HTTP request: Example of a header in a HTTP request:
@ -353,7 +353,7 @@ Notes
comes to performance than using the ``http_header`` buffer (~10% comes to performance than using the ``http_header`` buffer (~10%
better). better).
- `http://blog.inliniac.net/2012/07/09/suricata-http\_user\_agent-vs-http\_header/ <http://blog.inliniac.net/2012/07/09/suricata-http_user_agent-vs-http_header/>`_ - `https://blog.inliniac.net/2012/07/09/suricata-http\_user\_agent-vs-http\_header/ <https://blog.inliniac.net/2012/07/09/suricata-http_user_agent-vs-http_header/>`_
http_accept http_accept
----------- -----------

@ -69,7 +69,7 @@ void DetectFilemagicRegister(void)
{ {
sigmatch_table[DETECT_FILEMAGIC].name = "filemagic"; sigmatch_table[DETECT_FILEMAGIC].name = "filemagic";
sigmatch_table[DETECT_FILEMAGIC].desc = "match on the information libmagic returns about a file"; sigmatch_table[DETECT_FILEMAGIC].desc = "match on the information libmagic returns about a file";
sigmatch_table[DETECT_FILEMAGIC].url = "https://redmine.openinfosecfoundation.org/projects/suricata/wiki/File-keywords#filemagic"; sigmatch_table[DETECT_FILEMAGIC].url = "https://suricata.readthedocs.io/en/latest/rules/file-keywords.html#filemagic";
sigmatch_table[DETECT_FILEMAGIC].Setup = DetectFilemagicSetupNoSupport; sigmatch_table[DETECT_FILEMAGIC].Setup = DetectFilemagicSetupNoSupport;
sigmatch_table[DETECT_FILEMAGIC].flags = SIGMATCH_QUOTES_MANDATORY|SIGMATCH_HANDLE_NEGATION; sigmatch_table[DETECT_FILEMAGIC].flags = SIGMATCH_QUOTES_MANDATORY|SIGMATCH_HANDLE_NEGATION;
} }

@ -112,7 +112,7 @@ void DetectLuaRegister(void)
sigmatch_table[DETECT_LUA].name = "lua"; sigmatch_table[DETECT_LUA].name = "lua";
sigmatch_table[DETECT_LUA].alias = "luajit"; sigmatch_table[DETECT_LUA].alias = "luajit";
sigmatch_table[DETECT_LUA].desc = "match via a lua script"; sigmatch_table[DETECT_LUA].desc = "match via a lua script";
sigmatch_table[DETECT_LUA].url = "https://redmine.openinfosecfoundation.org/projects/suricata/wiki/Lua_scripting"; sigmatch_table[DETECT_LUA].url = "https://suricata.readthedocs.io/en/latest/rules/rule-lua-scripting.html";
sigmatch_table[DETECT_LUA].Match = DetectLuaMatch; sigmatch_table[DETECT_LUA].Match = DetectLuaMatch;
sigmatch_table[DETECT_LUA].AppLayerTxMatch = DetectLuaAppTxMatch; sigmatch_table[DETECT_LUA].AppLayerTxMatch = DetectLuaAppTxMatch;
sigmatch_table[DETECT_LUA].Setup = DetectLuaSetup; sigmatch_table[DETECT_LUA].Setup = DetectLuaSetup;

@ -83,7 +83,7 @@
#define DEFAULT_PID_BASENAME "suricata.pid" #define DEFAULT_PID_BASENAME "suricata.pid"
#define DEFAULT_PID_FILENAME DEFAULT_PID_DIR DEFAULT_PID_BASENAME #define DEFAULT_PID_FILENAME DEFAULT_PID_DIR DEFAULT_PID_BASENAME
#define DOC_URL "http://suricata.readthedocs.io/en/" #define DOC_URL "https://suricata.readthedocs.io/en/"
#if defined RELEASE #if defined RELEASE
#define DOC_VERSION PROG_VER #define DOC_VERSION PROG_VER

@ -3,7 +3,7 @@
# Suricata configuration file. In addition to the comments describing all # Suricata configuration file. In addition to the comments describing all
# options in this file, full documentation can be found at: # options in this file, full documentation can be found at:
# https://redmine.openinfosecfoundation.org/projects/suricata/wiki/Suricatayaml # https://suricata.readthedocs.io/en/latest/configuration/suricata-yaml.html
## ##
## Step 1: inform Suricata about your network ## Step 1: inform Suricata about your network
@ -546,7 +546,7 @@ outputs:
# Lua Output Support - execute lua script to generate alert and event # Lua Output Support - execute lua script to generate alert and event
# output. # output.
# Documented at: # Documented at:
# https://redmine.openinfosecfoundation.org/projects/suricata/wiki/Lua_Output # https://suricata.readthedocs.io/en/latest/output/lua-output.html
- lua: - lua:
enabled: no enabled: no
#scripts-dir: /etc/suricata/lua-output/ #scripts-dir: /etc/suricata/lua-output/

@ -26,7 +26,7 @@
#threshold gen_id 1, sig_id 2404000, type threshold, track by_dst, count 1, seconds 10 #threshold gen_id 1, sig_id 2404000, type threshold, track by_dst, count 1, seconds 10
# Avoid to alert on f-secure update # Avoid to alert on f-secure update
# Example taken from http://blog.inliniac.net/2012/03/07/f-secure-av-updates-and-suricata-ips/ # Example taken from https://blog.inliniac.net/2012/03/07/f-secure-av-updates-and-suricata-ips/
#suppress gen_id 1, sig_id 2009557, track by_src, ip 217.110.97.128/25 #suppress gen_id 1, sig_id 2009557, track by_src, ip 217.110.97.128/25
#suppress gen_id 1, sig_id 2012086, track by_src, ip 217.110.97.128/25 #suppress gen_id 1, sig_id 2012086, track by_src, ip 217.110.97.128/25
#suppress gen_id 1, sig_id 2003614, track by_src, ip 217.110.97.128/25 #suppress gen_id 1, sig_id 2003614, track by_src, ip 217.110.97.128/25

Loading…
Cancel
Save