diff options
author | Amish | 2018-10-20 08:29:30 +0530 |
---|---|---|
committer | Amish | 2018-10-20 08:29:30 +0530 |
commit | 4cf57afb5e24f6821c0571addd84ac0389287a68 (patch) | |
tree | 3cf3d41ad4eb7ea661f6b693d0d68bc0914b1d16 | |
parent | 094878c754bd942a15cb15ffcfdbe4baf88f545c (diff) | |
download | aur-4cf57afb5e24f6821c0571addd84ac0389287a68.tar.gz |
Update to 2.9.12
-rw-r--r-- | .SRCINFO | 19 | ||||
-rw-r--r-- | PKGBUILD | 80 | ||||
-rw-r--r-- | snort.install | 6 |
3 files changed, 58 insertions, 47 deletions
@@ -1,19 +1,28 @@ pkgbase = snort-nfqueue pkgdesc = A lightweight network intrusion detection system. - pkgver = 2.9.11.1 - pkgrel = 2 - url = http://www.snort.org + pkgver = 2.9.12 + pkgrel = 1 + url = https://www.snort.org install = snort.install arch = i686 arch = x86_64 license = GPL + makedepends = libtirpc + depends = dbus depends = libdaq-nfqueue depends = libdnet + depends = libgcrypt + depends = libgpg-error depends = libnetfilter_queue + depends = libnghttp2 + depends = libnl + depends = libnsl depends = libpcap + depends = lz4 depends = openssl depends = pcre depends = pulledpork + depends = xz depends = zlib provides = snort conflicts = snort @@ -27,12 +36,12 @@ pkgbase = snort-nfqueue backup = etc/snort/reference.config backup = etc/snort/classification.config backup = etc/logrotate.d/snort - source = https://www.snort.org/downloads/snort/snort-2.9.11.1.tar.gz + source = https://www.snort.org/downloads/snort/snort-2.9.12.tar.gz source = snort.logrotate source = snort.sysusers source = snort.tmpfiles source = snort.service - sha256sums = 9f6b3aeac5a109f55504bd370564ac431cb1773507929dc461626898f33f46cd + sha256sums = 7b02e11987c6cb4f6d79d72799ca9ad2b4bd59cc1d96bb7d6c91549f990d99d0 sha256sums = 7fe712141f651254b8e5aa0b3b7d73622d2d1d89bf53d7a522f8c1a067938421 sha256sums = ae3245c5de527fb487c459f2f4a9c78803ae6341e9c81b9a404277679cdee051 sha256sums = a92c591c409fc06661865988795093b0fb0447f614ac77951dbf9b1f6a8cf139 @@ -8,15 +8,16 @@ pkgname=snort-nfqueue _pkgname=snort -pkgver=2.9.11.1 -pkgrel=2 +pkgver=2.9.12 +pkgrel=1 pkgdesc='A lightweight network intrusion detection system.' arch=('i686' 'x86_64') -url='http://www.snort.org' +url='https://www.snort.org' license=('GPL') provides=('snort') conflicts=('snort') -depends=('libdaq-nfqueue' 'libdnet' 'libnetfilter_queue' 'libpcap' 'openssl' 'pcre' 'pulledpork' 'zlib') +depends=('dbus' 'libdaq-nfqueue' 'libdnet' 'libgcrypt' 'libgpg-error' 'libnetfilter_queue' 'libnghttp2' 'libnl' 'libnsl' 'libpcap' 'lz4' 'openssl' 'pcre' 'pulledpork' 'xz' 'zlib') +makedepends=('libtirpc') backup=('etc/snort/snort.conf' 'etc/snort/homenet.conf' 'etc/snort/rules/local.rules' @@ -31,51 +32,52 @@ source=("https://www.snort.org/downloads/snort/${_pkgname}-${pkgver}.tar.gz" 'snort.logrotate' 'snort.sysusers' 'snort.tmpfiles' - 'snort.service') -sha256sums=('9f6b3aeac5a109f55504bd370564ac431cb1773507929dc461626898f33f46cd' + 'snort.service') +sha256sums=('7b02e11987c6cb4f6d79d72799ca9ad2b4bd59cc1d96bb7d6c91549f990d99d0' '7fe712141f651254b8e5aa0b3b7d73622d2d1d89bf53d7a522f8c1a067938421' 'ae3245c5de527fb487c459f2f4a9c78803ae6341e9c81b9a404277679cdee051' 'a92c591c409fc06661865988795093b0fb0447f614ac77951dbf9b1f6a8cf139' 'b904ed172ea0c1a4eeaddb30745aadb8db21e333eb9faaf93400ce3db166f90d') build() { - cd "${srcdir}/${_pkgname}-${pkgver}" - ./configure --prefix=/usr --sysconfdir=/etc/snort --with-libpcap-includes=/usr/include/pcap \ - --with-daq-includes=/usr/include --with-daq-libraries=/usr/lib/daq/ \ - --enable-zlib --disable-static-daq - make + cd "${srcdir}/${_pkgname}-${pkgver}" + ./configure --prefix=/usr --sysconfdir=/etc/snort --with-libpcap-includes=/usr/include/pcap \ + --with-daq-includes=/usr/include --with-daq-libraries=/usr/lib/daq/ \ + --enable-zlib --disable-static-daq --disable-open-appid \ + CPPFLAGS="$CPPFLAGS -I/usr/include/tirpc/" + make } package() { - cd "${srcdir}/${_pkgname}-${pkgver}" - make DESTDIR="${pkgdir}" install + cd "${srcdir}/${_pkgname}-${pkgver}" + make DESTDIR="${pkgdir}" install - install -D -m644 -t "${pkgdir}"/etc/snort etc/{*.conf*,*.map} - install -D -m644 "${srcdir}"/snort.logrotate "${pkgdir}"/etc/logrotate.d/snort - install -D -m644 "${srcdir}"/snort.tmpfiles "${pkgdir}"/usr/lib/tmpfiles.d/snort.conf - install -D -m644 "${srcdir}"/snort.sysusers "${pkgdir}"/usr/lib/sysusers.d/snort.conf - install -D -m644 "${srcdir}"/snort.service "${pkgdir}"/usr/lib/systemd/system/snort.service + install -D -m644 -t "${pkgdir}"/etc/snort etc/{*.conf*,*.map} + install -D -m644 "${srcdir}"/snort.logrotate "${pkgdir}"/etc/logrotate.d/snort + install -D -m644 "${srcdir}"/snort.tmpfiles "${pkgdir}"/usr/lib/tmpfiles.d/snort.conf + install -D -m644 "${srcdir}"/snort.sysusers "${pkgdir}"/usr/lib/sysusers.d/snort.conf + install -D -m644 "${srcdir}"/snort.service "${pkgdir}"/usr/lib/systemd/system/snort.service - install -d -m755 "${pkgdir}"/etc/snort/{dynamic,}rules - install -Dm644 /dev/null "${pkgdir}"/etc/snort/rules/snort.rules - echo 'ipvar HOME_NET [10.0.0.0/8,172.16.0.0/12,192.168.0.0/16]' > "${pkgdir}"/etc/snort/homenet.conf - echo '#alert tcp any any <> any 80 (msg: "Test web activity"; sid:1000001;)' > "${pkgdir}"/etc/snort/rules/local.rules - chmod 0644 "${pkgdir}"/etc/snort/{homenet.conf,rules/{local,snort}.rules} + install -d -m755 "${pkgdir}"/etc/snort/{dynamic,}rules + install -Dm644 /dev/null "${pkgdir}"/etc/snort/rules/snort.rules + echo 'ipvar HOME_NET [10.0.0.0/8,172.16.0.0/12,192.168.0.0/16]' > "${pkgdir}"/etc/snort/homenet.conf + echo '#alert tcp any any <> any 80 (msg: "Test web activity"; sid:1000001;)' > "${pkgdir}"/etc/snort/rules/local.rules + chmod 0644 "${pkgdir}"/etc/snort/{homenet.conf,rules/{local,snort}.rules} - # config for NFQUEUE support, rule files and output logging - install -m644 "${pkgdir}"/etc/snort/snort.conf "${pkgdir}"/etc/snort/snort.conf.default - sed -i -e '/ipvar\s\+HOME_NET\s/ a include homenet.conf' \ - -e 's/^\(ipvar\s\+HOME_NET\s\)/#\1/g' \ - -e 's/^\(var\s\+RULE_PATH\s\).*/\1rules/g' \ - -e 's/^\(include\s\+$RULE_PATH\/\)/#\1/g' \ - -e 's/^#\(include\s\+$RULE_PATH\/local.rules\)/\1/g' \ - -e 's#/usr/local/lib#/usr/lib#g' \ - -e 's#/usr/local/lib/snort_dynamicrules#/etc/snort/dynamicrules#g' \ - -e 's#/usr/lib/snort_dynamicrules#/etc/snort/dynamicrules#g' \ - -e '/^preprocessor\s\+reputation:\s/,/^\s\+blacklist\s/ s/^/#/g' \ - -e $'/^#\\s*config daq:/,/^\\s*$/ {/^\\s*$/i\\\nconfig daq: nfq\\\nconfig daq_mode: inline\\\nconfig daq_dir: /usr/lib/daq\\\n#config daq_var: queue=0\n}' \ - -e $'/^#\\s*output\\s\\+unified2:\\s/ a\\\noutput unified2: filename snort_unified.log, limit 128\\\n\\\n# alert fast\\\noutput alert_fast: alert' \ - -e $'/include\\s\\+$RULE_PATH\\/local.rules/ i\\\n\\\n# fetched via pulledpork\\\ninclude $RULE_PATH/snort.rules\\\n\\\n# emergingthreats\\\n#include $RULE_PATH/emerging.conf\\\n' \ - "${pkgdir}"/etc/snort/snort.conf - install -m644 "${pkgdir}"/etc/snort/snort.conf "${pkgdir}"/etc/snort/snort-nfqueue.conf.default + # config for NFQUEUE support, rule files and output logging + install -m644 "${pkgdir}"/etc/snort/snort.conf "${pkgdir}"/etc/snort/snort.conf.default + sed -i -e '/ipvar\s\+HOME_NET\s/ a include homenet.conf' \ + -e 's/^\(ipvar\s\+HOME_NET\s\)/#\1/g' \ + -e 's/^\(var\s\+RULE_PATH\s\).*/\1rules/g' \ + -e 's/^\(include\s\+$RULE_PATH\/\)/#\1/g' \ + -e 's/^#\(include\s\+$RULE_PATH\/local.rules\)/\1/g' \ + -e 's#/usr/local/lib#/usr/lib#g' \ + -e 's#/usr/local/lib/snort_dynamicrules#/etc/snort/dynamicrules#g' \ + -e 's#/usr/lib/snort_dynamicrules#/etc/snort/dynamicrules#g' \ + -e '/^preprocessor\s\+reputation:\s/,/^\s\+blacklist\s/ s/^/#/g' \ + -e $'/^#\\s*config daq:/,/^\\s*$/ {/^\\s*$/i\\\nconfig daq: nfq\\\nconfig daq_mode: inline\\\nconfig daq_dir: /usr/lib/daq\\\n#config daq_var: queue=0\n}' \ + -e $'/^#\\s*output\\s\\+unified2:\\s/ a\\\noutput unified2: filename snort_unified.log, limit 128\\\n\\\n# alert fast\\\noutput alert_fast: alert' \ + -e $'/include\\s\\+$RULE_PATH\\/local.rules/ i\\\n\\\n# fetched via pulledpork\\\ninclude $RULE_PATH/snort.rules\\\n\\\n# emergingthreats\\\n#include $RULE_PATH/emerging.conf\\\n' \ + "${pkgdir}"/etc/snort/snort.conf + install -m644 "${pkgdir}"/etc/snort/snort.conf "${pkgdir}"/etc/snort/snort-nfqueue.conf.default } diff --git a/snort.install b/snort.install index 8ea75eb51799..8493d731ec9d 100644 --- a/snort.install +++ b/snort.install @@ -1,6 +1,6 @@ post_install() { - /usr/bin/nohup /usr/bin/pulledpork_update.sh /etc/snort/rules/snort.rules > /dev/null 2>&1 & - cat << EOF + /usr/bin/nohup /usr/bin/pulledpork_update.sh /etc/snort/rules/snort.rules > /dev/null 2>&1 & + cat << EOF >>> EDIT /etc/snort/homenet.conf file to match your local network. >>> Add local rules to /etc/snort/rules/local.rules @@ -13,7 +13,7 @@ EOF } post_upgrade() { - post_install $1 + post_install $1 } # vim:set ts=2 sw=2 et: |