dmca/2018/11/2018-11-15-Proofpoint.md

121 строка
11 KiB
Markdown
Исходник Ответственный История

Этот файл содержит неоднозначные символы Юникода!

Этот файл содержит неоднозначные символы Юникода, которые могут быть перепутаны с другими в текущей локали. Если это намеренно, можете спокойно проигнорировать это предупреждение. Используйте кнопку Экранировать, чтобы подсветить эти символы.

**Are you the copyright owner or authorized to act on the copyright owners behalf?**
Yes, I work for Proofpoint which owns Emerging Threats ETPro
**Please provide a detailed description of the original copyrighted work that has allegedly been infringed. If possible, include a URL to where it is posted online.**
The infringement is our IDS Signature Ruleset. This is behind an authenticated system. ETPro is GPLv2 licensed, and customers cannot share the ruleset per our EULA. We have a separate ruleset called ETOpen which is permissible to share, but all instances of the violation are for our commercial ETPro ruleset.
**What files should be taken down? Please provide URLs for each file, or if the entire repository, the repositorys URL:**
Here is a list of each of the offenders:
Owner: https://github.com/thrawn117/zaxrepo
Offending Link: https://github.com/thrawn117/zaxrepo/blob/9b4e748d22e522e02b0fa95441da2926bea10e62/ZAXmastertestbed/trunk/attacks/WeiAttacks/modbusrepo/serial2snort/quickdraw/vulnerability_1_3.rules
Owner: https://github.com/ccgcyber/AlienVault
Offending Links:
https://github.com/ccgcyber/AlienVault/blob/f58a9f54478bb865c68634148fb898fab4f4693d/emerging_pro-scada.rules
https://github.com/ccgcyber/AlienVault/blob/f58a9f54478bb865c68634148fb898fab4f4693d/emerging_pro-scada_special.rules
https://github.com/ccgcyber/AlienVault/blob/f58a9f54478bb865c68634148fb898fab4f4693d/emerging_pro-user_agents.rules
https://github.com/ccgcyber/AlienVault/blob/f58a9f54478bb865c68634148fb898fab4f4693d/emerging_pro-smtp.rules
https://github.com/ccgcyber/AlienVault/blob/f58a9f54478bb865c68634148fb898fab4f4693d/emerging_pro-dos.rules
https://github.com/ccgcyber/AlienVault/blob/f58a9f54478bb865c68634148fb898fab4f4693d/emerging_pro-worm.rules
https://github.com/ccgcyber/AlienVault/blob/f58a9f54478bb865c68634148fb898fab4f4693d/emerging_pro-info.rules
https://github.com/ccgcyber/AlienVault/blob/f58a9f54478bb865c68634148fb898fab4f4693d/emerging_pro-activex.rules
https://github.com/ccgcyber/AlienVault/blob/f58a9f54478bb865c68634148fb898fab4f4693d/emerging_pro-chat.rules
https://github.com/ccgcyber/AlienVault/blob/f58a9f54478bb865c68634148fb898fab4f4693d/emerging_pro-pop3.rules
https://github.com/ccgcyber/AlienVault/blob/f58a9f54478bb865c68634148fb898fab4f4693d/emerging_pro-imap.rules
https://github.com/ccgcyber/AlienVault/blob/f58a9f54478bb865c68634148fb898fab4f4693d/emerging_pro-tftp.rules
https://github.com/ccgcyber/AlienVault/blob/f58a9f54478bb865c68634148fb898fab4f4693d/emerging_pro-web_server.rules
https://github.com/ccgcyber/AlienVault/blob/f58a9f54478bb865c68634148fb898fab4f4693d/emerging_pro-dns.rules
https://github.com/ccgcyber/AlienVault/blob/f58a9f54478bb865c68634148fb898fab4f4693d/emerging_pro-telnet.rules
https://github.com/ccgcyber/AlienVault/blob/f58a9f54478bb865c68634148fb898fab4f4693d/emerging_pro-attack_response.rules
https://github.com/ccgcyber/AlienVault/blob/f58a9f54478bb865c68634148fb898fab4f4693d/emerging_pro-voip.rules
https://github.com/ccgcyber/AlienVault/blob/f58a9f54478bb865c68634148fb898fab4f4693d/emerging_pro-snmp.rules
https://github.com/ccgcyber/AlienVault/blob/f58a9f54478bb865c68634148fb898fab4f4693d/emerging_pro-current_ebents.rules
https://github.com/ccgcyber/AlienVault/blob/f58a9f54478bb865c68634148fb898fab4f4693d/emerging_pro-games.rules
https://github.com/ccgcyber/AlienVault/blob/f58a9f54478bb865c68634148fb898fab4f4693d/emerging_pro-rpc.rules
https://github.com/ccgcyber/AlienVault/blob/f58a9f54478bb865c68634148fb898fab4f4693d/emerging_pro-ftp.rules
https://github.com/ccgcyber/AlienVault/blob/f58a9f54478bb865c68634148fb898fab4f4693d/emerging_pro-sql.rules
https://github.com/ccgcyber/AlienVault/blob/f58a9f54478bb865c68634148fb898fab4f4693d/emerging_pro-p2p.rules
https://github.com/ccgcyber/AlienVault/blob/f58a9f54478bb865c68634148fb898fab4f4693d/emerging_pro-scan.rules
https://github.com/ccgcyber/AlienVault/blob/f58a9f54478bb865c68634148fb898fab4f4693d/emerging_pro-misc.rules
Owner: https://github.com/cybersecurityni/AlienVault
Offending Links: https://github.com/cybersecurityni/AlienVault/blob/74dc94d07e7418fc74a03409db74f78c56a33ff8/Suricata/emerging_pro-scada.rules
https://github.com/cybersecurityni/AlienVault/blob/74dc94d07e7418fc74a03409db74f78c56a33ff8/Suricata/emerging_pro-scada_special.rules
https://github.com/cybersecurityni/AlienVault/blob/74dc94d07e7418fc74a03409db74f78c56a33ff8/Suricata/emerging_pro-dos.rules
https://github.com/cybersecurityni/AlienVault/blob/74dc94d07e7418fc74a03409db74f78c56a33ff8/Suricata/emerging_pro-smtp.rules
https://github.com/cybersecurityni/AlienVault/blob/74dc94d07e7418fc74a03409db74f78c56a33ff8/Suricata/emerging_pro-worm.rules
https://github.com/cybersecurityni/AlienVault/blob/74dc94d07e7418fc74a03409db74f78c56a33ff8/Suricata/emerging_pro-user_agents.rules
https://github.com/cybersecurityni/AlienVault/blob/74dc94d07e7418fc74a03409db74f78c56a33ff8/Suricata/emerging_pro-pop3.rules
https://github.com/cybersecurityni/AlienVault/blob/74dc94d07e7418fc74a03409db74f78c56a33ff8/Suricata/emerging_pro-info.rules
https://github.com/cybersecurityni/AlienVault/blob/74dc94d07e7418fc74a03409db74f78c56a33ff8/Suricata/emerging_pro-chat.rules
https://github.com/cybersecurityni/AlienVault/blob/74dc94d07e7418fc74a03409db74f78c56a33ff8/Suricata/emerging_pro-tftp.rules
https://github.com/cybersecurityni/AlienVault/blob/74dc94d07e7418fc74a03409db74f78c56a33ff8/Suricata/emerging_pro-imap.rules
https://github.com/cybersecurityni/AlienVault/blob/74dc94d07e7418fc74a03409db74f78c56a33ff8/Suricata/emerging_pro-web_server.rules
https://github.com/cybersecurityni/AlienVault/blob/74dc94d07e7418fc74a03409db74f78c56a33ff8/Suricata/emerging_pro-dns.rules
https://github.com/cybersecurityni/AlienVault/blob/74dc94d07e7418fc74a03409db74f78c56a33ff8/Suricata/emerging_pro-telnet.rules
https://github.com/cybersecurityni/AlienVault/blob/74dc94d07e7418fc74a03409db74f78c56a33ff8/Suricata/emerging_pro-voip.rules
https://github.com/cybersecurityni/AlienVault/blob/74dc94d07e7418fc74a03409db74f78c56a33ff8/Suricata/emerging_pro-current_ebents.rules
https://github.com/cybersecurityni/AlienVault/blob/74dc94d07e7418fc74a03409db74f78c56a33ff8/Suricata/emerging_pro-attack_response.rules
https://github.com/cybersecurityni/AlienVault/blob/74dc94d07e7418fc74a03409db74f78c56a33ff8/Suricata/emerging_pro-snmp.rules
https://github.com/cybersecurityni/AlienVault/blob/74dc94d07e7418fc74a03409db74f78c56a33ff8/Suricata/emerging_pro-rpc.rules
https://github.com/cybersecurityni/AlienVault/blob/74dc94d07e7418fc74a03409db74f78c56a33ff8/Suricata/emerging_pro-games.rules
https://github.com/cybersecurityni/AlienVault/blob/74dc94d07e7418fc74a03409db74f78c56a33ff8/Suricata/emerging_pro-ftp.rules
https://github.com/cybersecurityni/AlienVault/blob/74dc94d07e7418fc74a03409db74f78c56a33ff8/Suricata/emerging_pro-sql.rules
https://github.com/cybersecurityni/AlienVault/blob/74dc94d07e7418fc74a03409db74f78c56a33ff8/Suricata/emerging_pro-p2p.rules
https://github.com/cybersecurityni/AlienVault/blob/74dc94d07e7418fc74a03409db74f78c56a33ff8/Suricata/emerging_pro-scan.rules
https://github.com/cybersecurityni/AlienVault/blob/74dc94d07e7418fc74a03409db74f78c56a33ff8/Suricata/emerging_pro-misc.rules
https://github.com/cybersecurityni/AlienVault/blob/74dc94d07e7418fc74a03409db74f78c56a33ff8/Suricata/alienvault.rules
Owner: https://github.com/tanjiti/icstools
Offending Links:
https://github.com/tanjiti/icstools/blob/9a13a32cec352ad880a21e9bdb6740f7c36134b7/snortrules/quickdraw_4_3_1/vulnerability_1_5.rules
https://github.com/tanjiti/icstools/blob/9a13a32cec352ad880a21e9bdb6740f7c36134b7/snortrules/scada_all.rules
Owner: https://github.com/Z-0ne/SCADA-Rules
Offending Link: https://github.com/Z-0ne/SCADA-Rules/blob/81a3755bdb48f0aa742cefa21398e27f30a4bdf5/scada_all.rules
Owner: https://github.com/raymondtestproject/SCADA-Rules
Offending Link: https://github.com/raymondtestproject/SCADA-Rules/blob/81a3755bdb48f0aa742cefa21398e27f30a4bdf5/scada_all.rules
Owner: https://github.com/mikesxrs/Open-Source-snort-and-suri-rules
Offending Link: https://github.com/mikesxrs/Open-Source-snort-and-suri-rules/blob/246ee5d07ad9b652072b32b30b1298987a6f51f1/ETPRO%20TROJAN%20Trojan.DownLoader10.36780%20User-Agent%20(odin).rules
**Have you searched for any forks of the allegedly infringing files or repositories? Each fork is a distinct repository and must be identified separately if you believe it is infringing and wish to have it taken down.**
It looks like there is a fork above, as there are two AlienVault repos that have the same infringing code, i listed all of the links just the same.
**Is the work licensed under an open source license? If so, which open source license? Are the allegedly infringing files being used under the open source license, or are they in violation of the license?**
It is not open source, each file has it's license clearly stated (most of these files were copied in whole and even have the offending license text, though some just copied out individual rules and omitted the license)
**What would be the best solution for the alleged infringement? Are there specific changes the other person can make other than removal?**
All of these rules are Proofpoint's IP so they need to remove them. We publish an ET Open ruleset which is BSD licensed and meant for non-paying customers to use: https://rules.emergingthreats.net/open/snort-2.9.0/
**Do you have the alleged infringers contact information? If so, please provide it:**
I provided the owner of the repo for each of the 58 separate instances above.
**Type (or copy and paste) the following statement: "I have a good faith belief that use of the copyrighted materials described above on the infringing web pages is not authorized by the copyright owner, or its agent, or the law. I have taken fair use into consideration."**
I have a good faith belief that use of the copyrighted materials described above on the infringing web pages is not authorized by the copyright owner, or its agent, or the law. I have taken fair use into consideration.
**Type (or copy and paste) the following statement: "I swear, under penalty of perjury, that the information in this notification is accurate and that I am the copyright owner, or am authorized to act on behalf of the owner, of an exclusive right that is allegedly infringed."**
I swear, under penalty of perjury, that the information in this notification is accurate and that I am the copyright owner, or am authorized to act on behalf of the owner, of an exclusive right that is allegedly infringed.
**Please confirm that you have you have read our Guide to Submitting a DMCA Takedown Notice: https://help.github.com/articles/guide-to-submitting-a-dmca-takedown-notice/**
Yes
**So that we can get back to you, please provide either your telephone number or physical address:**
[private], [private], [private]
**Please type your full legal name below to sign this request:**
[private]