mirror of
https://github.com/Ponce/slackbuilds
synced 2024-11-24 10:02:29 +01:00
network/psad: Updated for version 2.4.4.
Signed-off-by: Willy Sudiarto Raharjo <willysr@slackbuilds.org>
This commit is contained in:
parent
b536f66ef4
commit
d9935e73b6
4 changed files with 25 additions and 11 deletions
|
@ -25,3 +25,18 @@ iptables -A INPUT -j LOG
|
||||||
iptables -A INPUT -j DROP
|
iptables -A INPUT -j DROP
|
||||||
|
|
||||||
please see documentation for more information.
|
please see documentation for more information.
|
||||||
|
|
||||||
|
NOTE:
|
||||||
|
psad requires several perl modules:
|
||||||
|
perl-Bit-Vector
|
||||||
|
perl-Date-Calc
|
||||||
|
perl-IPTables-Parse
|
||||||
|
perl-IPTables-ChainMgr
|
||||||
|
perl-NetAddr-IP
|
||||||
|
perl-Unix-Syslog
|
||||||
|
|
||||||
|
these are included in sources, so you don't need to install them.
|
||||||
|
But if you get some weird perl modules errors, you must uninstall
|
||||||
|
previous psad version before bulding new one.
|
||||||
|
Alternatively you can manually install this modules, all are available
|
||||||
|
on SlacBuilds.
|
||||||
|
|
|
@ -2,7 +2,7 @@
|
||||||
|
|
||||||
# Slackware build script for psad
|
# Slackware build script for psad
|
||||||
|
|
||||||
# Copyright 2017 Boris V. <david.cla2@gmail.com>
|
# Copyright 2017 davjohn <david.cla2@gmail.com>
|
||||||
# All rights reserved.
|
# All rights reserved.
|
||||||
#
|
#
|
||||||
# Redistribution and use of this script, with or without modification, is
|
# Redistribution and use of this script, with or without modification, is
|
||||||
|
@ -23,7 +23,7 @@
|
||||||
# ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
# ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||||
|
|
||||||
PRGNAM=psad
|
PRGNAM=psad
|
||||||
VERSION=${VERSION:-2.4.3}
|
VERSION=${VERSION:-2.4.4}
|
||||||
BUILD=${BUILD:-1}
|
BUILD=${BUILD:-1}
|
||||||
TAG=${TAG:-_SBo}
|
TAG=${TAG:-_SBo}
|
||||||
ALERTSEMAIL=${ALERTSEMAIL:-root@localhost}
|
ALERTSEMAIL=${ALERTSEMAIL:-root@localhost}
|
||||||
|
@ -61,7 +61,7 @@ Would you like psad to only parse specific strings in iptables messages:
|
||||||
FW search strings: psad;
|
FW search strings: psad;
|
||||||
First is it ok to leave the HOME_NET setting as any: y;
|
First is it ok to leave the HOME_NET setting as any: y;
|
||||||
Would you like to enable DShield alerts: n;
|
Would you like to enable DShield alerts: n;
|
||||||
Would you like to install the latest signatures from http www cipherdyne org psad signatures: n;
|
Would you like to install the latest signatures from http www cipherdyne org psad signatures: y;
|
||||||
Enable psad at boot time: n;
|
Enable psad at boot time: n;
|
||||||
EOF
|
EOF
|
||||||
find -L . \
|
find -L . \
|
||||||
|
|
|
@ -1,10 +1,10 @@
|
||||||
PRGNAM="psad"
|
PRGNAM="psad"
|
||||||
VERSION="2.4.3"
|
VERSION="2.4.4"
|
||||||
HOMEPAGE="http://www.cipherdyne.org/psad/"
|
HOMEPAGE="http://www.cipherdyne.org/psad/"
|
||||||
DOWNLOAD="http://www.cipherdyne.org/psad/download/psad-2.4.3.tar.bz2"
|
DOWNLOAD="http://www.cipherdyne.org/psad/download/psad-2.4.4.tar.bz2"
|
||||||
MD5SUM="a0e51465ec662b4725a7018a9d2cda61"
|
MD5SUM="d11f0385c413c90f1722c1c213a6f955"
|
||||||
DOWNLOAD_x86_64=""
|
DOWNLOAD_x86_64=""
|
||||||
MD5SUM_x86_64=""
|
MD5SUM_x86_64=""
|
||||||
REQUIRES=""
|
REQUIRES=""
|
||||||
MAINTAINER="Boris V."
|
MAINTAINER="davjohn"
|
||||||
EMAIL="david.cla2@gmail.com"
|
EMAIL="david.cla2@gmail.com"
|
||||||
|
|
|
@ -10,10 +10,9 @@ psad: psad (Intrusion Detection and Log Analysis with iptables)
|
||||||
psad:
|
psad:
|
||||||
psad: psad is a collection of three lightweight system daemons (two main
|
psad: psad is a collection of three lightweight system daemons (two main
|
||||||
psad: daemons and one helper daemon) that run on Linux machines and analyze
|
psad: daemons and one helper daemon) that run on Linux machines and analyze
|
||||||
psad: iptables log messages to detect port scans and other suspicious
|
psad: iptables log messages to detect port scans and other suspicious.
|
||||||
psad: traffic.
|
psad: traffic. A typical deployment is to run psad on the iptables firewall
|
||||||
psad: A typical deployment is to run psad on the iptables firewall where
|
psad: where it has the fastest access to log data.
|
||||||
psad: it has the fastest access to log data.
|
|
||||||
psad:
|
psad:
|
||||||
psad: Homepage: http://www.cipherdyne.org/psad/
|
psad: Homepage: http://www.cipherdyne.org/psad/
|
||||||
psad:
|
psad:
|
||||||
|
|
Loading…
Reference in a new issue