Fix for BIT-1927: notice/extend-email relocation

This is a fairly straightforward change. Previously, users had no
control over whether this script was loaded. By relocating it to
policy, users can now choose whether or not this is necessary
functionality without modifying core Bro scripts.
This commit is contained in:
Stephen Hosom 2018-05-10 09:13:52 -04:00
parent 1f777b57b8
commit 6611d28920
4 changed files with 8 additions and 6 deletions

View file

@ -8,10 +8,6 @@
@load ./actions/page @load ./actions/page
@load ./actions/add-geodata @load ./actions/add-geodata
# There shouldn't be any default overhead from loading these since they
# *should* only do anything when notices have the ACTION_EMAIL action applied.
@load ./extend-email/hostnames
# The cluster framework must be loaded first. # The cluster framework must be loaded first.
@load base/frameworks/cluster @load base/frameworks/cluster

View file

@ -0,0 +1,3 @@
# There shouldn't be any default overhead from loading these since they
# *should* only do anything when notices have the ACTION_EMAIL action applied.
@load ./extend-email/hostnames

View file

@ -3,7 +3,7 @@
##! :bro:type:`Notice::Info`'s *src* and *dst* fields as determined by a ##! :bro:type:`Notice::Info`'s *src* and *dst* fields as determined by a
##! DNS lookup. ##! DNS lookup.
@load ../main @load base/frameworks/notice/main
module Notice; module Notice;

View file

@ -85,6 +85,9 @@
# Detect SHA1 sums in Team Cymru's Malware Hash Registry. # Detect SHA1 sums in Team Cymru's Malware Hash Registry.
@load frameworks/files/detect-MHR @load frameworks/files/detect-MHR
# Extend email alerting to include hostnames
@load policy/frameworks/notice/extend-email/hostnames
# Uncomment the following line to enable detection of the heartbleed attack. Enabling # Uncomment the following line to enable detection of the heartbleed attack. Enabling
# this might impact performance a bit. # this might impact performance a bit.
# @load policy/protocols/ssl/heartbleed # @load policy/protocols/ssl/heartbleed