-
Notifications
You must be signed in to change notification settings - Fork 5
Description
Hi everyone,
Recently, I have developed a tool that can check Suricata rules for common issues.
Amongst the issues it can detect also are issues surrounding the SID allocation of rules, such as a mismatch between the organization and the sid range.
This however, relies on the ability to derive the organization from the prefix provided in the rule message. (i.e., all Emerging Threats rule messages start with ET, ET OPEN, or ETPRO)
I would like to extend my checker with additional SID allocations, but cannot do so without knowledge of these prefixes.
Perhaps it is possible to extend this repository with these prefixes.
Alternatively, I would appreciate it if anyone can share known prefixes or links to publicly available rulesets via the issue I created for this matter such that I can derive such prefixes.