From d9935e73b64a352af06be60cfadfa85c5f8c8e09 Mon Sep 17 00:00:00 2001 From: davjohn Date: Thu, 2 Mar 2017 22:58:28 +0700 Subject: [PATCH] network/psad: Updated for version 2.4.4. Signed-off-by: Willy Sudiarto Raharjo --- network/psad/README | 15 +++++++++++++++ network/psad/psad.SlackBuild | 6 +++--- network/psad/psad.info | 8 ++++---- network/psad/slack-desc | 7 +++---- 4 files changed, 25 insertions(+), 11 deletions(-) diff --git a/network/psad/README b/network/psad/README index 524336af61..86f9ea698c 100644 --- a/network/psad/README +++ b/network/psad/README @@ -25,3 +25,18 @@ iptables -A INPUT -j LOG iptables -A INPUT -j DROP please see documentation for more information. + +NOTE: +psad requires several perl modules: +perl-Bit-Vector +perl-Date-Calc +perl-IPTables-Parse +perl-IPTables-ChainMgr +perl-NetAddr-IP +perl-Unix-Syslog + +these are included in sources, so you don't need to install them. +But if you get some weird perl modules errors, you must uninstall +previous psad version before bulding new one. +Alternatively you can manually install this modules, all are available +on SlacBuilds. diff --git a/network/psad/psad.SlackBuild b/network/psad/psad.SlackBuild index d60dcdf5a7..b3f4cb6da5 100644 --- a/network/psad/psad.SlackBuild +++ b/network/psad/psad.SlackBuild @@ -2,7 +2,7 @@ # Slackware build script for psad -# Copyright 2017 Boris V. +# Copyright 2017 davjohn # All rights reserved. # # Redistribution and use of this script, with or without modification, is @@ -23,7 +23,7 @@ # ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. PRGNAM=psad -VERSION=${VERSION:-2.4.3} +VERSION=${VERSION:-2.4.4} BUILD=${BUILD:-1} TAG=${TAG:-_SBo} ALERTSEMAIL=${ALERTSEMAIL:-root@localhost} @@ -61,7 +61,7 @@ Would you like psad to only parse specific strings in iptables messages: FW search strings: psad; First is it ok to leave the HOME_NET setting as any: y; Would you like to enable DShield alerts: n; -Would you like to install the latest signatures from http www cipherdyne org psad signatures: n; +Would you like to install the latest signatures from http www cipherdyne org psad signatures: y; Enable psad at boot time: n; EOF find -L . \ diff --git a/network/psad/psad.info b/network/psad/psad.info index f9f1912075..bb71b3fd52 100644 --- a/network/psad/psad.info +++ b/network/psad/psad.info @@ -1,10 +1,10 @@ PRGNAM="psad" -VERSION="2.4.3" +VERSION="2.4.4" HOMEPAGE="http://www.cipherdyne.org/psad/" -DOWNLOAD="http://www.cipherdyne.org/psad/download/psad-2.4.3.tar.bz2" -MD5SUM="a0e51465ec662b4725a7018a9d2cda61" +DOWNLOAD="http://www.cipherdyne.org/psad/download/psad-2.4.4.tar.bz2" +MD5SUM="d11f0385c413c90f1722c1c213a6f955" DOWNLOAD_x86_64="" MD5SUM_x86_64="" REQUIRES="" -MAINTAINER="Boris V." +MAINTAINER="davjohn" EMAIL="david.cla2@gmail.com" diff --git a/network/psad/slack-desc b/network/psad/slack-desc index 9624bb23c7..007143d490 100644 --- a/network/psad/slack-desc +++ b/network/psad/slack-desc @@ -10,10 +10,9 @@ psad: psad (Intrusion Detection and Log Analysis with iptables) psad: psad: psad is a collection of three lightweight system daemons (two main psad: daemons and one helper daemon) that run on Linux machines and analyze -psad: iptables log messages to detect port scans and other suspicious -psad: traffic. -psad: A typical deployment is to run psad on the iptables firewall where -psad: it has the fastest access to log data. +psad: iptables log messages to detect port scans and other suspicious. +psad: traffic. A typical deployment is to run psad on the iptables firewall +psad: where it has the fastest access to log data. psad: psad: Homepage: http://www.cipherdyne.org/psad/ psad: