diff options
author | Patrick Lauer <patrick@gentoo.org> | 2010-11-02 18:22:10 +0000 |
---|---|---|
committer | Patrick Lauer <patrick@gentoo.org> | 2010-11-02 18:22:10 +0000 |
commit | d5e28343dc8f5dceeea4803c898ef6072ad29e9b (patch) | |
tree | aef6265e60491d440f08b54fbf296c8c0e08f8d0 /net-analyzer/snort | |
parent | Stable for PPC (bug #343069). (diff) | |
download | gentoo-2-d5e28343dc8f5dceeea4803c898ef6072ad29e9b.tar.gz gentoo-2-d5e28343dc8f5dceeea4803c898ef6072ad29e9b.tar.bz2 gentoo-2-d5e28343dc8f5dceeea4803c898ef6072ad29e9b.zip |
Bump for #341013, many ebuild improvements by Jason Wallace and pva
(Portage version: 2.2.0_alpha3/cvs/Linux x86_64)
Diffstat (limited to 'net-analyzer/snort')
-rw-r--r-- | net-analyzer/snort/ChangeLog | 8 | ||||
-rw-r--r-- | net-analyzer/snort/files/snort.rc10 | 50 | ||||
-rw-r--r-- | net-analyzer/snort/metadata.xml | 152 | ||||
-rw-r--r-- | net-analyzer/snort/snort-2.9.0.1.ebuild | 261 |
4 files changed, 433 insertions, 38 deletions
diff --git a/net-analyzer/snort/ChangeLog b/net-analyzer/snort/ChangeLog index d6b6835f875e..b047063d8414 100644 --- a/net-analyzer/snort/ChangeLog +++ b/net-analyzer/snort/ChangeLog @@ -1,6 +1,12 @@ # ChangeLog for net-analyzer/snort # Copyright 1999-2010 Gentoo Foundation; Distributed under the GPL v2 -# $Header: /var/cvsroot/gentoo-x86/net-analyzer/snort/ChangeLog,v 1.167 2010/08/13 11:12:02 patrick Exp $ +# $Header: /var/cvsroot/gentoo-x86/net-analyzer/snort/ChangeLog,v 1.168 2010/11/02 18:22:10 patrick Exp $ + +*snort-2.9.0.1 (02 Nov 2010) + + 02 Nov 2010; Patrick Lauer <patrick@gentoo.org> +snort-2.9.0.1.ebuild, + +files/snort.rc10, metadata.xml: + Bump for #341013, many ebuild improvements by Jason Wallace and pva *snort-2.8.6.1 (13 Aug 2010) diff --git a/net-analyzer/snort/files/snort.rc10 b/net-analyzer/snort/files/snort.rc10 new file mode 100644 index 000000000000..fa88cbd2d7ca --- /dev/null +++ b/net-analyzer/snort/files/snort.rc10 @@ -0,0 +1,50 @@ +#!/sbin/runscript +# Copyright 1999-2010 Gentoo Foundation +# Distributed under the terms of the GNU General Public License v2 +# $Header: /var/cvsroot/gentoo-x86/net-analyzer/snort/files/snort.rc10,v 1.1 2010/11/02 18:22:10 patrick Exp $ + +opts="checkconfig reload" + +depend() { + need net + after mysql + after postgresql +} + +checkconfig() { + if [ ! -e $CONF ] ; then + eerror "You need a configuration file to run snort" + eerror "There is an example config in /etc/snort/snort.conf.distrib" + return 1 + fi +} + +start() { + checkconfig || return 1 + ebegin "Starting snort" + start-stop-daemon --start --quiet --exec /usr/bin/snort \ + -- --nolock-pidfile --pid-path ${PIDPATH} ${SNORT_OPTS} >/dev/null 2>&1 + eend $? +} + +stop() { + ebegin "Stopping snort" + start-stop-daemon --stop --quiet --pidfile ${PIDPATH}/${PIDFILE} + # Snort needs a few seconds to fully shutdown + sleep 15 + eend $? +} + +reload() { + if [ ! -f ${PIDPATH}/${PIDFILE} ]; then + eerror "Snort isn't running" + return 1 + fi + + checkconfig || return 1 + ebegin "Reloading Snort" + start-stop-daemon --stop --oknodo --signal HUP --pidfile ${PIDPATH}/${PIDFILE} + eend $? +} + + diff --git a/net-analyzer/snort/metadata.xml b/net-analyzer/snort/metadata.xml index 424a9f37a4f6..01587a0a4759 100644 --- a/net-analyzer/snort/metadata.xml +++ b/net-analyzer/snort/metadata.xml @@ -1,37 +1,115 @@ -<?xml version="1.0" encoding="UTF-8"?> -<!DOCTYPE pkgmetadata SYSTEM "http://www.gentoo.org/dtd/metadata.dtd"> -<pkgmetadata> -<maintainer> - <email>patrick@gentoo.org</email> - <name>Patrick Lauer</name> -</maintainer> -<maintainer> - <email>jason.r.wallace@gmail.com</email> - <name>Jason Wallace</name> -</maintainer> - -<herd>netmon</herd> -<longdescription>Libpcap-based packet sniffer/logger/lightweight IDS</longdescription> -<use> - -<flag name='aruba'>Enable Aruba support</flag> -<flag name='decoder-preprocessor-rules'></flag> -<flag name='dynamicplugin'>Enable ability to dynamically load preprocessors, detection engine, and rules library</flag> -<flag name='flexresp'>Enable new connection tearing (not recommended)</flag> -<flag name='flexresp2'>Enable new connection tearing</flag> -<flag name='gre'>Enable GRE support</flag> -<flag name='inline'>Enable snort-inline for accepting packets from <pkg>net-firewall/iptables</pkg>, via libipq, rather than - <pkg>net-libs/libpcap</pkg>.</flag> -<flag name='inline-init-failopen'>Enable inline-init-failopen support</flag> -<flag name='linux-smp-stats'>Enable statistics reporting through proc on smp systems</flag> -<flag name='mpls'>Enable support for mpls networks</flag> -<flag name='perfprofiling'>Enable preprocessor and rule performance profiling</flag> -<flag name='ppm'>Enable ppm support</flag> -<flag name='react'>Enable interception and termination of offending HTTP accesses</flag> -<flag name='targetbased'>Enable targetbased support</flag> -<flag name='timestats'>Enable TimeStats functionality</flag> -<flag name='reload'>Enable reloading a configuration without restarting</flag> -<flag name='reload-error-restart'>Enable restarting on reload error</flag> -<flag name='zlib'>Enable Http Response Decompression</flag> -</use> -</pkgmetadata> +<?xml version="1.0" encoding="UTF-8"?>
+<!DOCTYPE pkgmetadata SYSTEM "http://www.gentoo.org/dtd/metadata.dtd">
+<pkgmetadata>
+ <herd>netmon</herd>
+ <maintainer>
+ <email>patrick@gentoo.org</email>
+ <name>Patrick Lauer</name>
+ </maintainer>
+ <maintainer>
+ <email>jason.r.wallace@gmail.com</email>
+ <name>Jason Wallace</name>
+ </maintainer>
+ <longdescription>
+ The de facto standard for intrusion detection and prevention
+ </longdescription>
+ <use>
+ <flag name='aruba'>
+ Adds support for monitoring wireless traffic using a Aruba Mobility
+ Controler.
+ </flag>
+ <flag name='decoder-preprocessor-rules'>
+ Added support to provide action control (alert, drop, pass, etc)
+ over preprocessor and decoder generated events.
+ </flag>
+ <flag name='dynamicplugin'>
+ Enable ability to dynamically load preprocessors, detection engine,
+ and rules library. This is required if you want to use shared
+ object (SO) snort rules.
+ </flag>
+ <flag name='flexresp'>
+ (DEPRECIATED) Original method for enabling connection tearing for
+ inline deployments. Replaced with flexresp3 in Snort-2.9.0.
+ </flag>
+ <flag name='flexresp2'>
+ (DEPRECIATED) Replaced flexresp for enabling connection tearing for
+ inline deployments. Replaced with flexresp3 in Snort-2.9.0.
+ </flag>
+ <flag name='gre'>
+ Enable support for inspecting and processing Generic Routing
+ Encapsulation (GRE) packet headders. Only needed if you are
+ monitoring GRE tunnels.
+ </flag>
+ <flag name='inline'>
+ (DEPRECIATED) Enables support for deploying snort inline. Uses
+ <pkg>net-firewall/iptables</pkg>, via libipq, rather than
+ <pkg>net-libs/libpcap</pkg>. Replaced by DAQ in Snort-2.9.0
+ </flag>
+ <flag name='inline-init-failopen'>
+ Enables support to allow traffic to pass (fail-open) through
+ inline deployments while snort is starting and not ready to begin
+ inspecting traffic. If this option is not enabled, network
+ traffic will not pass (fail-closed) until snort has fully started
+ and is ready to perform packet inspection.
+ </flag>
+ <flag name='linux-smp-stats'>
+ Enable accurate statistics reporting through /proc on systems with
+ multipule processors.
+ </flag>
+ <flag name='mpls'>
+ Enables support for processing and inspecting Multiprotocol Label
+ Switching MPLS network network traffic. Only needed if you are
+ monitoring an MPLS network.
+ </flag>
+ <flag name='perfprofiling'>
+ Enables support for preprocessor and rule performance profiling
+ using the perfmonitor preprocessor.
+ </flag>
+ <flag name='ppm'>
+ Enables support for setting per rule or per packet latency limits.
+ Helps protect against introducing network latency with inline
+ deployments.
+ </flag>
+ <flag name='react'>
+ Enables support for the react rule keyword. Supports interception,
+ termination, and redirection of HTTP connections.
+ </flag>
+ <flag name='targetbased'>
+ Enables support in snort for using a host attibute XML file
+ (attribute_table.dtd). This file needs to be created by the user
+ and should define the IP address, operating system, and services
+ for all hosts on the monitored network. This is cumbersome, but
+ can improve intrusion detection accuracy.
+ </flag>
+ <flag name='timestats'>
+ (DEPRECIATED) Enables support for printing packet stats on a per
+ hour and per protocol breakdown. Depreciated in Snort-2.9.0.
+ </flag>
+ <flag name='reload'>
+ Enables support for reloading a configuration without restarting
+ snort.
+ </flag>
+ <flag name='reload-error-restart'>
+ Enables support for completely restarting snort if an error is
+ detected durring a reload.
+ </flag>
+ <flag name='zlib'>
+ Enables HTTP inspection of compressed web traffic. Requires
+ dynamicplugin be enabled.
+ </flag>
+ <flag name='active-response'>
+ Enables support for automatically sending TCP resets and ICMP
+ unreachable messages to terminate connections. Used with inline
+ deployments.
+ </flag>
+ <flag name='normalizer'>
+ Enables support for normalizing packets in inline deployments to
+ help minimize the chances of detection evasion.
+ </flag>
+ <flag name='flexresp3'>
+ Enables support for new flexable response preprocessor for enabling
+ connection tearing for inline deployments. Replaces flexresp and
+ flexresp2.
+ </flag>
+ </use>
+</pkgmetadata>
diff --git a/net-analyzer/snort/snort-2.9.0.1.ebuild b/net-analyzer/snort/snort-2.9.0.1.ebuild new file mode 100644 index 000000000000..ebef3e95153c --- /dev/null +++ b/net-analyzer/snort/snort-2.9.0.1.ebuild @@ -0,0 +1,261 @@ +# Copyright 1999-2010 Gentoo Foundation +# Distributed under the terms of the GNU General Public License v2 +# $Header: /var/cvsroot/gentoo-x86/net-analyzer/snort/snort-2.9.0.1.ebuild,v 1.1 2010/11/02 18:22:10 patrick Exp $ + +EAPI="2" +inherit eutils autotools multilib + +DESCRIPTION="The de facto standard for intrusion detection/prevention" +HOMEPAGE="http://www.snort.org/" +SRC_URI="http://www.snort.org/downloads/308 -> ${P}.tar.gz" +LICENSE="GPL-2" +SLOT="0" +KEYWORDS="~amd64 ~x86" +IUSE="static +dynamicplugin ipv6 +zlib gre mpls targetbased +decoder-preprocessor-rules +ppm perfprofiling linux-smp-stats inline-init-failopen prelude +threads debug +active-response normalizer reload-error-restart react flexresp3 +aruba mysql odbc postgres selinux" + +DEPEND=">=net-libs/libpcap-1.0.0 + net-libs/daq + >=dev-libs/libpcre-6.0 + dev-libs/libdnet + postgres? ( dev-db/postgresql-base ) + mysql? ( virtual/mysql ) + odbc? ( dev-db/unixODBC ) + prelude? ( >=dev-libs/libprelude-0.9.0 ) + zlib? ( sys-libs/zlib )" + +RDEPEND="${DEPEND} + dev-lang/perl + selinux? ( sec-policy/selinux-snort )" + +pkg_setup() { + + if use zlib && ! use dynamicplugin; then + eerror + eerror "You have enabled the 'zlib' USE flag but not the 'dynamicplugin' USE flag." + eerror "'zlib' requires 'dynamicplugin' be enabled." + eerror + eerror + die + fi + + # pre_inst() is a better place to put this + # but we need it here for the 'fowners' statements in src_install() + enewgroup snort + enewuser snort -1 -1 /dev/null snort + +} + +src_prepare() { + + # Fix to prevent the docs Makefile from being used. + # Fixes #297190. + einfo "Applying documentation fix." + sed -i -e 's:src doc etc:src etc:g' \ + "${WORKDIR}/${P}/Makefile.am" || die "Doc fix Failed" + + #Multilib fix for the sf_engine + einfo "Applying multilib fix." + sed -i -e 's:${exec_prefix}/lib:${exec_prefix}/'$(get_libdir)':g' \ + "${WORKDIR}/${P}/src/dynamic-plugins/sf_engine/Makefile.am" \ + || die "sed for sf_engine failed" + + #Multilib fix for the curent set of dynamic-preprocessors + for i in ftptelnet smtp ssh dns ssl dcerpc2 sdf; do + sed -i -e 's:${exec_prefix}/lib:${exec_prefix}/'$(get_libdir)':g' \ + "${WORKDIR}/${P}/src/dynamic-preprocessors/$i/Makefile.am" \ + || die "sed for $i failed." + done + + if use prelude; then + einfo "Applying prelude fix." + sed -i -e "s:AC_PROG_RANLIB:AC_PROG_LIBTOOL:" configure.in + fi + + AT_M4DIR=m4 eautoreconf +} + +src_configure() { + + econf \ + $(use_enable !static shared) \ + $(use_enable static) \ + $(use_enable dynamicplugin) \ + $(use_enable ipv6) \ + $(use_enable zlib) \ + $(use_enable gre) \ + $(use_enable mpls) \ + $(use_enable targetbased) \ + $(use_enable decoder-preprocessor-rules) \ + $(use_enable ppm) \ + $(use_enable perfprofiling) \ + $(use_enable linux-smp-stats) \ + $(use_enable inline-init-failopen) \ + $(use_enable prelude) \ + $(use_enable threads pthread) \ + $(use_enable debug) \ + $(use_enable debug debug-msgs) \ + $(use_enable debug corefiles) \ + $(use_enable active-response) \ + $(use_enable normalizer) \ + $(use_enable reload-error-restart) \ + $(use_enable react) \ + $(use_enable flexresp3) \ + $(use_enable aruba) \ + $(use_with mysql) \ + $(use_with odbc) \ + $(use_with postgres postgresql) \ + --enable-reload \ + --disable-build-dynamic-examples \ + --disable-profile \ + --disable-ppm-test \ + --disable-dlclose \ + --disable-intel-soft-cpm \ + --disable-static-daq \ + --without-oracle + +} + +src_install() { + + emake DESTDIR="${D}" install || die "make install failed" + + keepdir /var/log/snort/ + fowners snort:snort /var/log/snort + + keepdir /var/run/snort/ + fowners snort:snort /var/run/snort/ + + dodoc ./doc/* ./RELEASE.NOTES ./tools/u2boat/README.u2boat ./schemas/* + rm -rf "${D}"usr/share/doc/snort/ + rm "${D}"usr/share/doc/"${P}"/Makefile* + + insinto /etc/snort + doins etc/attribute_table.dtd \ + etc/classification.config \ + etc/gen-msg.map \ + etc/reference.config \ + etc/threshold.conf \ + etc/unicode.map \ + || die "Failed to add files in /etc/snort" + + # We use snort.conf.distrib because the config file is complicated + # and the one shipped with snort can change drastically between versions. + # Users should migrate setting by hand and not with etc-update. + newins etc/snort.conf snort.conf.distrib \ + || die "Failed to add snort.conf.distrib" + + insinto /etc/snort/preproc_rules + doins preproc_rules/decoder.rules \ + preproc_rules/preprocessor.rules \ + || die "Failed to add files in /etc/snort/preproc_rules" + + keepdir /etc/snort/rules/ + fowners -R snort:snort /etc/snort/ + + keepdir /usr/$(get_libdir)/snort_dynamicrules + + newinitd "${FILESDIR}/snort.rc10" snort || die "Failed to add snort.rc10" + + newconfd "${FILESDIR}/snort.confd" snort || die "Failed to add snort.confd" + + # Set the correct lib path for dynamicengine, dynamicpreprocessor, and dynamicdetection + sed -i -e 's:/usr/local/lib:/usr/'$(get_libdir)':g' \ + "${D}etc/snort/snort.conf.distrib" \ + || die "Failed to update snort.conf.distrib lib paths" + + #Set the correct rule location in the config + sed -i -e 's:RULE_PATH ../rules:RULE_PATH /etc/snort/rules:g' \ + "${D}etc/snort/snort.conf.distrib" \ + || die "Failed to update snort.conf.distrib rule path" + + #Set the correct preprocessor/decoder rule location in the config + sed -i -e 's:PREPROC_RULE_PATH ../preproc_rules:PREPROC_RULE_PATH /etc/snort/preproc_rules:g' \ + "${D}etc/snort/snort.conf.distrib" \ + || die "Failed to update snort.conf.distrib preproc rule path" + + #Enable the preprocessor/decoder rules + sed -i -e 's:^# include $PREPROC_RULE_PATH:include $PREPROC_RULE_PATH:g' \ + "${D}etc/snort/snort.conf.distrib" \ + || die "Failed to uncomment snort.conf.distrib preproc rule path" + + sed -i -e 's:^# dynamicdetection directory:dynamicdetection directory:g' \ + "${D}etc/snort/snort.conf.distrib" \ + || die "Failed to uncomment snort.conf.distrib dynamicdetection directory" + + #Just some clean up of trailing /'s in the config + sed -i -e 's:snort_dynamicpreprocessor/$:snort_dynamicpreprocessor:g' \ + "${D}etc/snort/snort.conf.distrib" \ + || die "Failed to clean up snort.conf.distrib trailing slashes" + + #Make it clear in the config where these are... + sed -i -e 's:^include classification.config:include /etc/snort/classification.config:g' \ + "${D}etc/snort/snort.conf.distrib" \ + || die "Failed to update snort.conf.distrib classification.config path" + + sed -i -e 's:^include reference.config:include /etc/snort/reference.config:g' \ + "${D}etc/snort/snort.conf.distrib" \ + || die "Failed to update snort.conf.distrib /etc/snort/reference.config path" + + #Disable all rule files by default. + #Users need to choose what they want enabled. + sed -i -e 's:^include $RULE_PATH:# include $RULE_PATH:g' \ + "${D}etc/snort/snort.conf.distrib" \ + || die "Failed to disable rules in snort.conf.distrib" + +} + +pkg_postinst() { + elog + elog "${P} introduces the DAQ, or Data Acquisition library, for" + elog "packet I/O. The DAQ replaces direct calls to PCAP functions with" + elog "an abstraction layer that facilitates operation on a variety of" + elog "hardware and software interfaces without requiring changes to Snort." + elog + elog "The only DAQ modules supported with this ebuild are AFpacket, PCAP," + elog "and Dump. IPQ nad NFQ will be supported in future versions of this" + elog "package." + elog + elog "For passive (non-inline) Snort deployments you will want to use" + elog "either PCAP or AFpacket. For inline deployments you will need" + elog "to use AFpacket. The Dump DAQ is used for testing the various inline" + elog "features available in ${P}." + elog + elog "The core DQA libraries are installed in /usr/$(get_libdir)/. The libraries" + elog "for the individual DAQ modules (afpacket,pcap,dump) are installed in" + elog "/usr/$(get_libdir)/daq. To use these you will need to add the following" + elog "lines to your snort.conf:" + elog + elog "config daq: <DAQ module>" + elog "config daq_mode: <mode>" + elog "config daq_dir: /usr/$(get_libdir)/daq" + elog + elog "Please see the README file for DAQ for information about specific" + elog "DAQ modules and README.daq from the Snort 2.9 documentation" + elog "reguarding Snort and DAQ configuration information." + elog + elog "See /usr/share/doc/${PF} and /etc/snort/snort.conf.distrib for" + elog "information on configuring snort." + elog + + if [[ $(date +%Y%m%d) < 20101105 ]]; then + + ewarn + ewarn "Please note, you can not use ${PF} with the SO rules from" + ewarn "previous versions of Snort!" + ewarn + ewarn "If you do not have a subscription to the VRT rule set and you" + ewarn "wish to continue using the shared object (SO) rules, you will" + ewarn "need to downgrade Snort. The SO rules will be made available" + ewarn "to registered (non-subscription) users on Nov. 05, 2010" + ewarn "(30 days after being released to subscription users)." + ewarn + ewarn "Please see http://www.snort.org/snort-rules/#rules for more" + ewarn "details." + ewarn + + fi + +} |