summarylogtreecommitdiffstats
diff options
context:
space:
mode:
authorAmish2018-10-20 08:29:30 +0530
committerAmish2018-10-20 08:29:30 +0530
commit4cf57afb5e24f6821c0571addd84ac0389287a68 (patch)
tree3cf3d41ad4eb7ea661f6b693d0d68bc0914b1d16
parent094878c754bd942a15cb15ffcfdbe4baf88f545c (diff)
downloadaur-4cf57afb5e24f6821c0571addd84ac0389287a68.tar.gz
Update to 2.9.12
-rw-r--r--.SRCINFO19
-rw-r--r--PKGBUILD80
-rw-r--r--snort.install6
3 files changed, 58 insertions, 47 deletions
diff --git a/.SRCINFO b/.SRCINFO
index 2f95abf860ab..fd52a4d59796 100644
--- a/.SRCINFO
+++ b/.SRCINFO
@@ -1,19 +1,28 @@
pkgbase = snort-nfqueue
pkgdesc = A lightweight network intrusion detection system.
- pkgver = 2.9.11.1
- pkgrel = 2
- url = http://www.snort.org
+ pkgver = 2.9.12
+ pkgrel = 1
+ url = https://www.snort.org
install = snort.install
arch = i686
arch = x86_64
license = GPL
+ makedepends = libtirpc
+ depends = dbus
depends = libdaq-nfqueue
depends = libdnet
+ depends = libgcrypt
+ depends = libgpg-error
depends = libnetfilter_queue
+ depends = libnghttp2
+ depends = libnl
+ depends = libnsl
depends = libpcap
+ depends = lz4
depends = openssl
depends = pcre
depends = pulledpork
+ depends = xz
depends = zlib
provides = snort
conflicts = snort
@@ -27,12 +36,12 @@ pkgbase = snort-nfqueue
backup = etc/snort/reference.config
backup = etc/snort/classification.config
backup = etc/logrotate.d/snort
- source = https://www.snort.org/downloads/snort/snort-2.9.11.1.tar.gz
+ source = https://www.snort.org/downloads/snort/snort-2.9.12.tar.gz
source = snort.logrotate
source = snort.sysusers
source = snort.tmpfiles
source = snort.service
- sha256sums = 9f6b3aeac5a109f55504bd370564ac431cb1773507929dc461626898f33f46cd
+ sha256sums = 7b02e11987c6cb4f6d79d72799ca9ad2b4bd59cc1d96bb7d6c91549f990d99d0
sha256sums = 7fe712141f651254b8e5aa0b3b7d73622d2d1d89bf53d7a522f8c1a067938421
sha256sums = ae3245c5de527fb487c459f2f4a9c78803ae6341e9c81b9a404277679cdee051
sha256sums = a92c591c409fc06661865988795093b0fb0447f614ac77951dbf9b1f6a8cf139
diff --git a/PKGBUILD b/PKGBUILD
index 5014d4bf17ba..9fb223045844 100644
--- a/PKGBUILD
+++ b/PKGBUILD
@@ -8,15 +8,16 @@
pkgname=snort-nfqueue
_pkgname=snort
-pkgver=2.9.11.1
-pkgrel=2
+pkgver=2.9.12
+pkgrel=1
pkgdesc='A lightweight network intrusion detection system.'
arch=('i686' 'x86_64')
-url='http://www.snort.org'
+url='https://www.snort.org'
license=('GPL')
provides=('snort')
conflicts=('snort')
-depends=('libdaq-nfqueue' 'libdnet' 'libnetfilter_queue' 'libpcap' 'openssl' 'pcre' 'pulledpork' 'zlib')
+depends=('dbus' 'libdaq-nfqueue' 'libdnet' 'libgcrypt' 'libgpg-error' 'libnetfilter_queue' 'libnghttp2' 'libnl' 'libnsl' 'libpcap' 'lz4' 'openssl' 'pcre' 'pulledpork' 'xz' 'zlib')
+makedepends=('libtirpc')
backup=('etc/snort/snort.conf'
'etc/snort/homenet.conf'
'etc/snort/rules/local.rules'
@@ -31,51 +32,52 @@ source=("https://www.snort.org/downloads/snort/${_pkgname}-${pkgver}.tar.gz"
'snort.logrotate'
'snort.sysusers'
'snort.tmpfiles'
- 'snort.service')
-sha256sums=('9f6b3aeac5a109f55504bd370564ac431cb1773507929dc461626898f33f46cd'
+ 'snort.service')
+sha256sums=('7b02e11987c6cb4f6d79d72799ca9ad2b4bd59cc1d96bb7d6c91549f990d99d0'
'7fe712141f651254b8e5aa0b3b7d73622d2d1d89bf53d7a522f8c1a067938421'
'ae3245c5de527fb487c459f2f4a9c78803ae6341e9c81b9a404277679cdee051'
'a92c591c409fc06661865988795093b0fb0447f614ac77951dbf9b1f6a8cf139'
'b904ed172ea0c1a4eeaddb30745aadb8db21e333eb9faaf93400ce3db166f90d')
build() {
- cd "${srcdir}/${_pkgname}-${pkgver}"
- ./configure --prefix=/usr --sysconfdir=/etc/snort --with-libpcap-includes=/usr/include/pcap \
- --with-daq-includes=/usr/include --with-daq-libraries=/usr/lib/daq/ \
- --enable-zlib --disable-static-daq
- make
+ cd "${srcdir}/${_pkgname}-${pkgver}"
+ ./configure --prefix=/usr --sysconfdir=/etc/snort --with-libpcap-includes=/usr/include/pcap \
+ --with-daq-includes=/usr/include --with-daq-libraries=/usr/lib/daq/ \
+ --enable-zlib --disable-static-daq --disable-open-appid \
+ CPPFLAGS="$CPPFLAGS -I/usr/include/tirpc/"
+ make
}
package() {
- cd "${srcdir}/${_pkgname}-${pkgver}"
- make DESTDIR="${pkgdir}" install
+ cd "${srcdir}/${_pkgname}-${pkgver}"
+ make DESTDIR="${pkgdir}" install
- install -D -m644 -t "${pkgdir}"/etc/snort etc/{*.conf*,*.map}
- install -D -m644 "${srcdir}"/snort.logrotate "${pkgdir}"/etc/logrotate.d/snort
- install -D -m644 "${srcdir}"/snort.tmpfiles "${pkgdir}"/usr/lib/tmpfiles.d/snort.conf
- install -D -m644 "${srcdir}"/snort.sysusers "${pkgdir}"/usr/lib/sysusers.d/snort.conf
- install -D -m644 "${srcdir}"/snort.service "${pkgdir}"/usr/lib/systemd/system/snort.service
+ install -D -m644 -t "${pkgdir}"/etc/snort etc/{*.conf*,*.map}
+ install -D -m644 "${srcdir}"/snort.logrotate "${pkgdir}"/etc/logrotate.d/snort
+ install -D -m644 "${srcdir}"/snort.tmpfiles "${pkgdir}"/usr/lib/tmpfiles.d/snort.conf
+ install -D -m644 "${srcdir}"/snort.sysusers "${pkgdir}"/usr/lib/sysusers.d/snort.conf
+ install -D -m644 "${srcdir}"/snort.service "${pkgdir}"/usr/lib/systemd/system/snort.service
- install -d -m755 "${pkgdir}"/etc/snort/{dynamic,}rules
- install -Dm644 /dev/null "${pkgdir}"/etc/snort/rules/snort.rules
- echo 'ipvar HOME_NET [10.0.0.0/8,172.16.0.0/12,192.168.0.0/16]' > "${pkgdir}"/etc/snort/homenet.conf
- echo '#alert tcp any any <> any 80 (msg: "Test web activity"; sid:1000001;)' > "${pkgdir}"/etc/snort/rules/local.rules
- chmod 0644 "${pkgdir}"/etc/snort/{homenet.conf,rules/{local,snort}.rules}
+ install -d -m755 "${pkgdir}"/etc/snort/{dynamic,}rules
+ install -Dm644 /dev/null "${pkgdir}"/etc/snort/rules/snort.rules
+ echo 'ipvar HOME_NET [10.0.0.0/8,172.16.0.0/12,192.168.0.0/16]' > "${pkgdir}"/etc/snort/homenet.conf
+ echo '#alert tcp any any <> any 80 (msg: "Test web activity"; sid:1000001;)' > "${pkgdir}"/etc/snort/rules/local.rules
+ chmod 0644 "${pkgdir}"/etc/snort/{homenet.conf,rules/{local,snort}.rules}
- # config for NFQUEUE support, rule files and output logging
- install -m644 "${pkgdir}"/etc/snort/snort.conf "${pkgdir}"/etc/snort/snort.conf.default
- sed -i -e '/ipvar\s\+HOME_NET\s/ a include homenet.conf' \
- -e 's/^\(ipvar\s\+HOME_NET\s\)/#\1/g' \
- -e 's/^\(var\s\+RULE_PATH\s\).*/\1rules/g' \
- -e 's/^\(include\s\+$RULE_PATH\/\)/#\1/g' \
- -e 's/^#\(include\s\+$RULE_PATH\/local.rules\)/\1/g' \
- -e 's#/usr/local/lib#/usr/lib#g' \
- -e 's#/usr/local/lib/snort_dynamicrules#/etc/snort/dynamicrules#g' \
- -e 's#/usr/lib/snort_dynamicrules#/etc/snort/dynamicrules#g' \
- -e '/^preprocessor\s\+reputation:\s/,/^\s\+blacklist\s/ s/^/#/g' \
- -e $'/^#\\s*config daq:/,/^\\s*$/ {/^\\s*$/i\\\nconfig daq: nfq\\\nconfig daq_mode: inline\\\nconfig daq_dir: /usr/lib/daq\\\n#config daq_var: queue=0\n}' \
- -e $'/^#\\s*output\\s\\+unified2:\\s/ a\\\noutput unified2: filename snort_unified.log, limit 128\\\n\\\n# alert fast\\\noutput alert_fast: alert' \
- -e $'/include\\s\\+$RULE_PATH\\/local.rules/ i\\\n\\\n# fetched via pulledpork\\\ninclude $RULE_PATH/snort.rules\\\n\\\n# emergingthreats\\\n#include $RULE_PATH/emerging.conf\\\n' \
- "${pkgdir}"/etc/snort/snort.conf
- install -m644 "${pkgdir}"/etc/snort/snort.conf "${pkgdir}"/etc/snort/snort-nfqueue.conf.default
+ # config for NFQUEUE support, rule files and output logging
+ install -m644 "${pkgdir}"/etc/snort/snort.conf "${pkgdir}"/etc/snort/snort.conf.default
+ sed -i -e '/ipvar\s\+HOME_NET\s/ a include homenet.conf' \
+ -e 's/^\(ipvar\s\+HOME_NET\s\)/#\1/g' \
+ -e 's/^\(var\s\+RULE_PATH\s\).*/\1rules/g' \
+ -e 's/^\(include\s\+$RULE_PATH\/\)/#\1/g' \
+ -e 's/^#\(include\s\+$RULE_PATH\/local.rules\)/\1/g' \
+ -e 's#/usr/local/lib#/usr/lib#g' \
+ -e 's#/usr/local/lib/snort_dynamicrules#/etc/snort/dynamicrules#g' \
+ -e 's#/usr/lib/snort_dynamicrules#/etc/snort/dynamicrules#g' \
+ -e '/^preprocessor\s\+reputation:\s/,/^\s\+blacklist\s/ s/^/#/g' \
+ -e $'/^#\\s*config daq:/,/^\\s*$/ {/^\\s*$/i\\\nconfig daq: nfq\\\nconfig daq_mode: inline\\\nconfig daq_dir: /usr/lib/daq\\\n#config daq_var: queue=0\n}' \
+ -e $'/^#\\s*output\\s\\+unified2:\\s/ a\\\noutput unified2: filename snort_unified.log, limit 128\\\n\\\n# alert fast\\\noutput alert_fast: alert' \
+ -e $'/include\\s\\+$RULE_PATH\\/local.rules/ i\\\n\\\n# fetched via pulledpork\\\ninclude $RULE_PATH/snort.rules\\\n\\\n# emergingthreats\\\n#include $RULE_PATH/emerging.conf\\\n' \
+ "${pkgdir}"/etc/snort/snort.conf
+ install -m644 "${pkgdir}"/etc/snort/snort.conf "${pkgdir}"/etc/snort/snort-nfqueue.conf.default
}
diff --git a/snort.install b/snort.install
index 8ea75eb51799..8493d731ec9d 100644
--- a/snort.install
+++ b/snort.install
@@ -1,6 +1,6 @@
post_install() {
- /usr/bin/nohup /usr/bin/pulledpork_update.sh /etc/snort/rules/snort.rules > /dev/null 2>&1 &
- cat << EOF
+ /usr/bin/nohup /usr/bin/pulledpork_update.sh /etc/snort/rules/snort.rules > /dev/null 2>&1 &
+ cat << EOF
>>> EDIT /etc/snort/homenet.conf file to match your local network.
>>> Add local rules to /etc/snort/rules/local.rules
@@ -13,7 +13,7 @@ EOF
}
post_upgrade() {
- post_install $1
+ post_install $1
}
# vim:set ts=2 sw=2 et: