network/psad: Updated for version 2.4.4.

Signed-off-by: Willy Sudiarto Raharjo <willysr@slackbuilds.org>
This commit is contained in:
davjohn 2017-03-02 22:58:28 +07:00 committed by Willy Sudiarto Raharjo
parent b536f66ef4
commit d9935e73b6
4 changed files with 25 additions and 11 deletions

View file

@ -25,3 +25,18 @@ iptables -A INPUT -j LOG
iptables -A INPUT -j DROP iptables -A INPUT -j DROP
please see documentation for more information. please see documentation for more information.
NOTE:
psad requires several perl modules:
perl-Bit-Vector
perl-Date-Calc
perl-IPTables-Parse
perl-IPTables-ChainMgr
perl-NetAddr-IP
perl-Unix-Syslog
these are included in sources, so you don't need to install them.
But if you get some weird perl modules errors, you must uninstall
previous psad version before bulding new one.
Alternatively you can manually install this modules, all are available
on SlacBuilds.

View file

@ -2,7 +2,7 @@
# Slackware build script for psad # Slackware build script for psad
# Copyright 2017 Boris V. <david.cla2@gmail.com> # Copyright 2017 davjohn <david.cla2@gmail.com>
# All rights reserved. # All rights reserved.
# #
# Redistribution and use of this script, with or without modification, is # Redistribution and use of this script, with or without modification, is
@ -23,7 +23,7 @@
# ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. # ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
PRGNAM=psad PRGNAM=psad
VERSION=${VERSION:-2.4.3} VERSION=${VERSION:-2.4.4}
BUILD=${BUILD:-1} BUILD=${BUILD:-1}
TAG=${TAG:-_SBo} TAG=${TAG:-_SBo}
ALERTSEMAIL=${ALERTSEMAIL:-root@localhost} ALERTSEMAIL=${ALERTSEMAIL:-root@localhost}
@ -61,7 +61,7 @@ Would you like psad to only parse specific strings in iptables messages:
FW search strings: psad; FW search strings: psad;
First is it ok to leave the HOME_NET setting as any: y; First is it ok to leave the HOME_NET setting as any: y;
Would you like to enable DShield alerts: n; Would you like to enable DShield alerts: n;
Would you like to install the latest signatures from http www cipherdyne org psad signatures: n; Would you like to install the latest signatures from http www cipherdyne org psad signatures: y;
Enable psad at boot time: n; Enable psad at boot time: n;
EOF EOF
find -L . \ find -L . \

View file

@ -1,10 +1,10 @@
PRGNAM="psad" PRGNAM="psad"
VERSION="2.4.3" VERSION="2.4.4"
HOMEPAGE="http://www.cipherdyne.org/psad/" HOMEPAGE="http://www.cipherdyne.org/psad/"
DOWNLOAD="http://www.cipherdyne.org/psad/download/psad-2.4.3.tar.bz2" DOWNLOAD="http://www.cipherdyne.org/psad/download/psad-2.4.4.tar.bz2"
MD5SUM="a0e51465ec662b4725a7018a9d2cda61" MD5SUM="d11f0385c413c90f1722c1c213a6f955"
DOWNLOAD_x86_64="" DOWNLOAD_x86_64=""
MD5SUM_x86_64="" MD5SUM_x86_64=""
REQUIRES="" REQUIRES=""
MAINTAINER="Boris V." MAINTAINER="davjohn"
EMAIL="david.cla2@gmail.com" EMAIL="david.cla2@gmail.com"

View file

@ -10,10 +10,9 @@ psad: psad (Intrusion Detection and Log Analysis with iptables)
psad: psad:
psad: psad is a collection of three lightweight system daemons (two main psad: psad is a collection of three lightweight system daemons (two main
psad: daemons and one helper daemon) that run on Linux machines and analyze psad: daemons and one helper daemon) that run on Linux machines and analyze
psad: iptables log messages to detect port scans and other suspicious psad: iptables log messages to detect port scans and other suspicious.
psad: traffic. psad: traffic. A typical deployment is to run psad on the iptables firewall
psad: A typical deployment is to run psad on the iptables firewall where psad: where it has the fastest access to log data.
psad: it has the fastest access to log data.
psad: psad:
psad: Homepage: http://www.cipherdyne.org/psad/ psad: Homepage: http://www.cipherdyne.org/psad/
psad: psad: