@Hollander:
1. The thread you posted is clear. Except for the part about 'changeSID'. I have no clue what I am seeing, as in: it doesn't fit in my limited brain; either you have enabled SID's, or you have disabled them. Why the third list?
The modifysid option is for actually changing the text of the rule body. For example, you could change the "alert" keyword to "drop". This will have more meaning once a true IPS mode is implemented. Then, "alert" rules will simply print messages in the logs and on the ALERTS tab; but "drop" rules will be the ones that actually drop (or block) the offending traffic. Today on pfSense any "alert" causes a block, but on a true IPS that is not the case. Alerts are like notices and "drop" rules are the only ones that should block traffic. You might for example only want alerts for rules that identify older versions of Java or something, but you would want drops for rules that identify known malware phoning home.
As the Snort and Suricata packages exist today, the modifysid function is not really necessary yet.
@Hollander:
2. Do you have thoughts on keeping separate SID-lists for Snort and Suricata? Or 'one list fits all'? (Does it? I don't know).
This is an admin decision. Just remember that there are many, many Snort rules that contain keywords or rule options that Suricata does not recognize. No sense even trying to load those rules on Suricata.
@Hollander:
3. Do you have thoughts on the lists having exclusive SID's (-> if a SID is on list 1 it shouldn't be on list two, and vice versa), or are there good reasons to do things differently?
If you are using only literal SIDs in the files, then it does not make sense to put the same SID in both files. However, when you use the more advanced PCRE options; it is conceivable to match the same SID. In those situations, the setting of the SID STATE ORDER control becomes important.
@Hollander:
4. How can one manage the part of new SID's appearing after an update? Is there a 'new SID's added during update' list somewhere? Because these need to be processed into the github-list one way or the other I guess(?)
Each time the rules are updated the vendors post an updated Change Log on their web sites.
Bill