Package Details: ossec-local 2.9.3-1

Git Clone URL: https://aur.archlinux.org/ossec-local.git (read-only)
Package Base: ossec-local
Description: Open Source Host-based Intrusion Detection System
Upstream URL: http://www.ossec.net/
Licenses: GPL3
Submitter: stativ
Maintainer: None
Last Packager: freeboson
Votes: 15
Popularity: 0.000000
First Submitted: 2007-09-29 15:40
Last Updated: 2018-01-29 02:20

Pinned Comments

freeboson commented on 2018-01-29 02:22

Before using makepkg, you must import the key (into your keyring) that signs the release from upstream. You can do that via this command:

gpg --keyserver pool.sks-keyservers.net --recv-keys B50FB1947A0AE31145D05FADEE1B0E6B2D8387B7

or import directly via

sh -c 'gpg --import <<EOF
-----BEGIN PGP PUBLIC KEY BLOCK-----
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=zBNU
-----END PGP PUBLIC KEY BLOCK-----
EOF'

Latest Comments

« First ‹ Previous 1 2

stativ commented on 2010-07-26 10:47

Finkregh: OSSEC needs several users and groups to exist for proper function. Because it's improbable that OSSEC gets it's way into the official distribution it's not possible to reserve the group and user names names in the official /etc/group and /etc/passwd. For that reason I chose the group and user ID's which are not likely to be used. The OSSEC's install script not only sets the file permissions according to these setting but also tries to create specified groups and users (which has to fail unless you are building as root). Necessary groups and users (with the exactly same ID's) are created during installation (see the install script).

According to the other errors you can ignore these safely too.

Anonymous comment on 2010-07-26 08:56

groupadd: '525' is not a valid group name
useradd: group '525' does not exist
useradd: group '525' does not exist
useradd: group '525' does not exist
cp: cannot create regular file `/var/ossec/tmp/yaourt-tmp-root/aur-ossec-local/pkg/etc/ossec-init.conf': No such file or directory
chmod: cannot access `/var/ossec/tmp/yaourt-tmp-root/aur-ossec-local/pkg/etc/ossec-init.conf': No such file or directory

hmm... :)

stativ commented on 2010-05-27 15:31

New updated PKGBUILD is out!

* generated rules should be correct now (thanks to somebody who pointed that out before the comments on AUR were lost)
* it is possible to change some of the settings in the config file (eg. e-mail notification)
* startup script is now colored (thanks Yorokobi)

stativ commented on 2010-04-24 18:00

Thank you for the suggestion. I'll take a look at it later, because I've to redesign PKGBUILD a bit. I had some reports that installed rules doesn't work properly.

Anonymous comment on 2010-04-24 17:57

Suggestion for ossec.rc: add '. /etc/rc.conf' before '. /etc/rc.d/functions' to enabled colorful stat_{busy|done}