summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorMarcelo Góes <vanquirius@gentoo.org>2006-07-08 01:40:14 +0000
committerMarcelo Góes <vanquirius@gentoo.org>2006-07-08 01:40:14 +0000
commit619419247824c62814e55829fd5d26587fdf9986 (patch)
tree82aef50c39cc55da391d9b11afc50b7c561f7b10 /net-analyzer/snort
parentmask >=net-analyzer/snort-2.6.0 for testing, please see bug 136250 for more d... (diff)
downloadgentoo-2-619419247824c62814e55829fd5d26587fdf9986.tar.gz
gentoo-2-619419247824c62814e55829fd5d26587fdf9986.tar.bz2
gentoo-2-619419247824c62814e55829fd5d26587fdf9986.zip
2.6.0 version bump for bug 136250. Thanks to Ed Davison <ed.davison at mccombs dot utexas dot edu>, Andrew Ross <aross at westnet dot com dot au>, Jason Wallace <jason.r.wallace at gmail dot com> and Brett Edgar <bedgar at desasecurity dot com>. Currently in package.mask for testing.
(Portage version: 2.1-r1)
Diffstat (limited to 'net-analyzer/snort')
-rw-r--r--net-analyzer/snort/ChangeLog10
-rw-r--r--net-analyzer/snort/files/digest-snort-2.6.012
-rw-r--r--net-analyzer/snort/snort-2.6.0.ebuild178
3 files changed, 199 insertions, 1 deletions
diff --git a/net-analyzer/snort/ChangeLog b/net-analyzer/snort/ChangeLog
index 58f08c91d34a..0d25a55d8cb6 100644
--- a/net-analyzer/snort/ChangeLog
+++ b/net-analyzer/snort/ChangeLog
@@ -1,6 +1,14 @@
# ChangeLog for net-analyzer/snort
# Copyright 2002-2006 Gentoo Foundation; Distributed under the GPL v2
-# $Header: /var/cvsroot/gentoo-x86/net-analyzer/snort/ChangeLog,v 1.104 2006/07/08 01:23:26 vanquirius Exp $
+# $Header: /var/cvsroot/gentoo-x86/net-analyzer/snort/ChangeLog,v 1.105 2006/07/08 01:40:13 vanquirius Exp $
+
+*snort-2.6.0 (08 Jul 2006)
+
+ 08 Jul 2006; Marcelo Goes <vanquirius@gentoo.org> +snort-2.6.0.ebuild:
+ 2.6.0 version bump for bug 136250. Thanks to Ed Davison <ed.davison at
+ mccombs dot utexas dot edu>, Andrew Ross <aross at westnet dot com dot au>,
+ Jason Wallace <jason.r.wallace at gmail dot com> and Brett Edgar <bedgar at
+ desasecurity dot com>. Currently in package.mask for testing.
08 Jul 2006; Marcelo Goes <vanquirius@gentoo.org>
-files/2.3.0-libnet-1.0.patch, -files/snort-2.3.3-log.c.diff,
diff --git a/net-analyzer/snort/files/digest-snort-2.6.0 b/net-analyzer/snort/files/digest-snort-2.6.0
new file mode 100644
index 000000000000..3d477d1d625e
--- /dev/null
+++ b/net-analyzer/snort/files/digest-snort-2.6.0
@@ -0,0 +1,12 @@
+MD5 39d8250f47a33aaec4712e29c0dcd1d0 Community-Rules.tar.gz 11678
+RMD160 a65b656e4dbf29f1c807622e865e945f509fe0c5 Community-Rules.tar.gz 11678
+SHA256 fd37a897455dcb4bace1f7f0af11747b5360e0e3896cd0b9649e5d19281bb2cf Community-Rules.tar.gz 11678
+MD5 88bb7f628e5bf1edc6409fbb126eaed0 snort-2.6.0.tar.gz 3322826
+RMD160 862cfd20b866b58dcc5a27cb3f4fcad90c1b7550 snort-2.6.0.tar.gz 3322826
+SHA256 0acbfedf728df3d63ed075a56259b81ab5e26099051ceb5808e0c87329fe588d snort-2.6.0.tar.gz 3322826
+MD5 35d9a2486f8c0280bb493aa03c011927 snortrules-pr-2.4.tar.gz 789097
+RMD160 dd2179b3ce8a55699d2e1b857426e5489191a121 snortrules-pr-2.4.tar.gz 789097
+SHA256 19d2545a2a150dff8b4dbcbd0def389b6865c4c70f5084172d08a7b151e1a504 snortrules-pr-2.4.tar.gz 789097
+MD5 2eeef1a7a040d67c3afaf9d749905e47 snortsam-20050110.tar.gz 29395
+RMD160 ec80ce024ed7a013da35444ef1098ba3faa6cfc3 snortsam-20050110.tar.gz 29395
+SHA256 dc428458f3c47684aabb89036ca7e601a6aa92864dbf23b31f33732b76c2a01e snortsam-20050110.tar.gz 29395
diff --git a/net-analyzer/snort/snort-2.6.0.ebuild b/net-analyzer/snort/snort-2.6.0.ebuild
new file mode 100644
index 000000000000..b9e2948c6078
--- /dev/null
+++ b/net-analyzer/snort/snort-2.6.0.ebuild
@@ -0,0 +1,178 @@
+# Copyright 1999-2006 Gentoo Foundation
+# Distributed under the terms of the GNU General Public License v2
+# $Header: /var/cvsroot/gentoo-x86/net-analyzer/snort/snort-2.6.0.ebuild,v 1.1 2006/07/08 01:40:13 vanquirius Exp $
+
+inherit eutils flag-o-matic autotools
+
+DESCRIPTION="Libpcap-based packet sniffer/logger/lightweight IDS"
+HOMEPAGE="http://www.snort.org/"
+SRC_URI="http://www.snort.org/dl/current/${P}.tar.gz
+ http://www.snort.org/pub-bin/downloads.cgi/Download/comm_rules/Community-Rules.tar.gz
+ http://www.snort.org/pub-bin/downloads.cgi/Download/vrt_pr/snortrules-pr-2.4.tar.gz
+ snortsam? ( mirror://gentoo/snortsam-20050110.tar.gz )"
+
+LICENSE="GPL-2"
+SLOT="0"
+KEYWORDS="-alpha ~amd64 ~ppc ~ppc64 -sparc ~x86"
+IUSE="ssl postgres mysql flexresp selinux snortsam odbc prelude inline sguil dynamicplugin timestats perfprofiling linux-smp-stats"
+
+DEPEND="virtual/libc
+ >=dev-libs/libpcre-4.2-r1
+ virtual/libpcap
+ flexresp? ( ~net-libs/libnet-1.0.2a )
+ postgres? ( >=dev-db/postgresql-7.2 )
+ mysql? ( >=dev-db/mysql-3.23.26 )
+ ssl? ( >=dev-libs/openssl-0.9.6b )
+ prelude? ( >=dev-libs/libprelude-0.9.0 )
+ odbc? ( dev-db/unixODBC )
+ >=sys-devel/libtool-1.4
+ inline? (
+ ~net-libs/libnet-1.0.2a
+ net-firewall/iptables
+ )"
+
+RDEPEND="${DEPEND}
+ dev-lang/perl
+ selinux? ( sec-policy/selinux-snort )
+ snortsam? ( net-analyzer/snortsam )"
+
+pkg_setup() {
+ enewgroup snort
+ enewuser snort -1 -1 /dev/null snort
+}
+
+src_unpack() {
+ unpack ${A}
+ cd "${S}"
+
+ if use flexresp || use inline ; then
+ epatch "${WORKDIR}/2.4.0-libnet-1.0.patch"
+ fi
+
+ sed -i "s:var RULE_PATH ../rules:var RULE_PATH /etc/snort/rules:" \
+ etc/snort.conf || die "sed snort.conf failed"
+
+ if use prelude ; then
+ sed -i -e "s:AC_PROG_RANLIB:AC_PROG_LIBTOOL:" configure.in \
+ || die "sed configure.in failed"
+ fi
+
+ if use sguil ; then
+ epatch "${WORKDIR}/2.4.0-spp_portscan_sguil.patch"
+ epatch "${WORKDIR}/2.4.0-spp_stream4_sguil.patch"
+ fi
+
+ if use snortsam ; then
+ cd ..
+ einfo "Applying snortsam patch"
+ ./patchsnort.sh "${S}" || die "snortsam patch failed"
+ cd "${S}"
+ fi
+
+ einfo "Regenerating autoconf/automake files"
+ AT_M4DIR=m4 eautoreconf
+}
+
+src_compile() {
+ local myconf
+
+ # There is no --disable-flexresp, cannot use use_enable
+ use flexresp && myconf="${myconf} --enable-flexresp"
+
+ use inline && append-flags -I/usr/include/libipq
+
+ econf \
+ $(use_with postgres postgresql) \
+ $(use_with mysql) \
+ $(use_with ssl openssl) \
+ $(use_with odbc) \
+ --without-oracle \
+ $(use_enable prelude) \
+ $(use_with sguil) \
+ $(use_enable inline) \
+ $(use_enable dynamicplugin) \
+ $(use_enable timestats) \
+ $(use_enable perfprofiling) \
+ $(use_enable linux-smp-stats) \
+ ${myconf} || die "bad ./configure"
+
+ emake || die "compile problem"
+}
+
+src_install() {
+ make DESTDIR="${D}" install || die "make install failed"
+
+ keepdir /var/log/snort/
+
+ dodoc doc/*
+ dodoc ./RELEASE.NOTES
+ docinto schemas ; dodoc schemas/*
+
+ insinto /etc/snort
+ doins etc/reference.config etc/classification.config \
+ etc/*.map etc/threshold.conf
+ newins etc/snort.conf snort.conf
+ if use sguil ; then
+ sed -i -e "/^# output log_unified/s:# ::" \
+ -e "s:snort.log:snort_unified.log:" \
+ "${D}/etc/snort/snort.conf" || die "sed failed"
+ fi
+
+ newinitd "${FILESDIR}/snort.rc7" snort
+ newconfd "${FILESDIR}/snort.confd" snort
+ if use sguil ; then
+ sed -i -e "s:/var/log/snort:/var/lib/sguil/$(hostname):" \
+ -e "/^SNORT_OPTS/s%-u snort%-m 122 -u sguil -g sguil -A none%" \
+ "${D}/etc/conf.d/snort" || die "sed failed"
+ fi
+
+ fowners snort:snort /var/log/snort
+ fperms 0770 /var/log/snort
+
+ # install rules
+ dodir /etc/snort/rules
+ mv "${WORKDIR}"/rules/* "${D}/etc/snort/rules/"
+}
+
+pkg_postinst() {
+ ewarn
+ ewarn "Users upgrading from snort 2.4.x should take care when updating"
+ ewarn "their snort.conf. A number of significant changes have been"
+ ewarn "have been added to snort 2.6 including the addition of"
+ ewarn "dynamically loadable preprocessors, detection engine and rules."
+ ewarn "Snort 2.6 also includes the addition of performance profiling"
+ ewarn "for rules & preprocessors and uses a new default pattern matcher"
+ ewarn "which provides faster matching at the expense of being very"
+ ewarn "memory intensive."
+ ewarn
+ ewarn "If you find that snort is using too much memory, your system"
+ ewarn "freezes, or snort crashes after a few minutes try adding the"
+ ewarn "following to your snort.conf..."
+ ewarn
+ ewarn "'config detection: search-method ac-sparsebands'"
+ ewarn
+ ewarn "This will provide high pattern matching performance at a much"
+ ewarn "lower cost to memory. For more information on the new features"
+ ewarn "in snort 2.6, please take a look at the release notes located in..."
+ ewarn
+ ewarn " /usr/share/doc/${PF}/RELEASE.NOTES.gz"
+ ewarn
+ einfo "To use a database as a backend for snort you will have to"
+ einfo "import the correct tables to the database."
+ einfo "You will have to setup a database called snort before doing the"
+ einfo "following..."
+ einfo
+ einfo " MySQL: zcat /usr/share/doc/${PF}/schemas/create_mysql.gz | mysql -p snort"
+ einfo
+ einfo " PostgreSQL: import /usr/share/doc/${PF}/schemas/create_postgresql.gz"
+ einfo
+ einfo " ODBC: look at /usr/share/doc/${PF}/schemas/"
+ einfo
+ einfo "Users using the unified output plugin and barnyard do not need to"
+ einfo "compile database support into snort, but still need to set up their"
+ einfo "database as shown above."
+ einfo
+ ewarn "Only a basic set of rules was installed."
+ ewarn "Please add your other sets of rules to /etc/snort/rules."
+ ewarn "For more information on rules, visit ${HOMEPAGE}."
+}