mirror of
https://github.com/Ponce/slackbuilds
synced 2024-11-21 19:42:24 +01:00
network/psad: Updated for version 2.4.4.
Signed-off-by: Willy Sudiarto Raharjo <willysr@slackbuilds.org>
This commit is contained in:
parent
b536f66ef4
commit
d9935e73b6
4 changed files with 25 additions and 11 deletions
|
@ -25,3 +25,18 @@ iptables -A INPUT -j LOG
|
|||
iptables -A INPUT -j DROP
|
||||
|
||||
please see documentation for more information.
|
||||
|
||||
NOTE:
|
||||
psad requires several perl modules:
|
||||
perl-Bit-Vector
|
||||
perl-Date-Calc
|
||||
perl-IPTables-Parse
|
||||
perl-IPTables-ChainMgr
|
||||
perl-NetAddr-IP
|
||||
perl-Unix-Syslog
|
||||
|
||||
these are included in sources, so you don't need to install them.
|
||||
But if you get some weird perl modules errors, you must uninstall
|
||||
previous psad version before bulding new one.
|
||||
Alternatively you can manually install this modules, all are available
|
||||
on SlacBuilds.
|
||||
|
|
|
@ -2,7 +2,7 @@
|
|||
|
||||
# Slackware build script for psad
|
||||
|
||||
# Copyright 2017 Boris V. <david.cla2@gmail.com>
|
||||
# Copyright 2017 davjohn <david.cla2@gmail.com>
|
||||
# All rights reserved.
|
||||
#
|
||||
# Redistribution and use of this script, with or without modification, is
|
||||
|
@ -23,7 +23,7 @@
|
|||
# ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||
|
||||
PRGNAM=psad
|
||||
VERSION=${VERSION:-2.4.3}
|
||||
VERSION=${VERSION:-2.4.4}
|
||||
BUILD=${BUILD:-1}
|
||||
TAG=${TAG:-_SBo}
|
||||
ALERTSEMAIL=${ALERTSEMAIL:-root@localhost}
|
||||
|
@ -61,7 +61,7 @@ Would you like psad to only parse specific strings in iptables messages:
|
|||
FW search strings: psad;
|
||||
First is it ok to leave the HOME_NET setting as any: y;
|
||||
Would you like to enable DShield alerts: n;
|
||||
Would you like to install the latest signatures from http www cipherdyne org psad signatures: n;
|
||||
Would you like to install the latest signatures from http www cipherdyne org psad signatures: y;
|
||||
Enable psad at boot time: n;
|
||||
EOF
|
||||
find -L . \
|
||||
|
|
|
@ -1,10 +1,10 @@
|
|||
PRGNAM="psad"
|
||||
VERSION="2.4.3"
|
||||
VERSION="2.4.4"
|
||||
HOMEPAGE="http://www.cipherdyne.org/psad/"
|
||||
DOWNLOAD="http://www.cipherdyne.org/psad/download/psad-2.4.3.tar.bz2"
|
||||
MD5SUM="a0e51465ec662b4725a7018a9d2cda61"
|
||||
DOWNLOAD="http://www.cipherdyne.org/psad/download/psad-2.4.4.tar.bz2"
|
||||
MD5SUM="d11f0385c413c90f1722c1c213a6f955"
|
||||
DOWNLOAD_x86_64=""
|
||||
MD5SUM_x86_64=""
|
||||
REQUIRES=""
|
||||
MAINTAINER="Boris V."
|
||||
MAINTAINER="davjohn"
|
||||
EMAIL="david.cla2@gmail.com"
|
||||
|
|
|
@ -10,10 +10,9 @@ psad: psad (Intrusion Detection and Log Analysis with iptables)
|
|||
psad:
|
||||
psad: psad is a collection of three lightweight system daemons (two main
|
||||
psad: daemons and one helper daemon) that run on Linux machines and analyze
|
||||
psad: iptables log messages to detect port scans and other suspicious
|
||||
psad: traffic.
|
||||
psad: A typical deployment is to run psad on the iptables firewall where
|
||||
psad: it has the fastest access to log data.
|
||||
psad: iptables log messages to detect port scans and other suspicious.
|
||||
psad: traffic. A typical deployment is to run psad on the iptables firewall
|
||||
psad: where it has the fastest access to log data.
|
||||
psad:
|
||||
psad: Homepage: http://www.cipherdyne.org/psad/
|
||||
psad:
|
||||
|
|
Loading…
Reference in a new issue