summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorPatrick Lauer <patrick@gentoo.org>2010-11-02 18:22:10 +0000
committerPatrick Lauer <patrick@gentoo.org>2010-11-02 18:22:10 +0000
commitd5e28343dc8f5dceeea4803c898ef6072ad29e9b (patch)
treeaef6265e60491d440f08b54fbf296c8c0e08f8d0 /net-analyzer/snort
parentStable for PPC (bug #343069). (diff)
downloadgentoo-2-d5e28343dc8f5dceeea4803c898ef6072ad29e9b.tar.gz
gentoo-2-d5e28343dc8f5dceeea4803c898ef6072ad29e9b.tar.bz2
gentoo-2-d5e28343dc8f5dceeea4803c898ef6072ad29e9b.zip
Bump for #341013, many ebuild improvements by Jason Wallace and pva
(Portage version: 2.2.0_alpha3/cvs/Linux x86_64)
Diffstat (limited to 'net-analyzer/snort')
-rw-r--r--net-analyzer/snort/ChangeLog8
-rw-r--r--net-analyzer/snort/files/snort.rc1050
-rw-r--r--net-analyzer/snort/metadata.xml152
-rw-r--r--net-analyzer/snort/snort-2.9.0.1.ebuild261
4 files changed, 433 insertions, 38 deletions
diff --git a/net-analyzer/snort/ChangeLog b/net-analyzer/snort/ChangeLog
index d6b6835f875e..b047063d8414 100644
--- a/net-analyzer/snort/ChangeLog
+++ b/net-analyzer/snort/ChangeLog
@@ -1,6 +1,12 @@
# ChangeLog for net-analyzer/snort
# Copyright 1999-2010 Gentoo Foundation; Distributed under the GPL v2
-# $Header: /var/cvsroot/gentoo-x86/net-analyzer/snort/ChangeLog,v 1.167 2010/08/13 11:12:02 patrick Exp $
+# $Header: /var/cvsroot/gentoo-x86/net-analyzer/snort/ChangeLog,v 1.168 2010/11/02 18:22:10 patrick Exp $
+
+*snort-2.9.0.1 (02 Nov 2010)
+
+ 02 Nov 2010; Patrick Lauer <patrick@gentoo.org> +snort-2.9.0.1.ebuild,
+ +files/snort.rc10, metadata.xml:
+ Bump for #341013, many ebuild improvements by Jason Wallace and pva
*snort-2.8.6.1 (13 Aug 2010)
diff --git a/net-analyzer/snort/files/snort.rc10 b/net-analyzer/snort/files/snort.rc10
new file mode 100644
index 000000000000..fa88cbd2d7ca
--- /dev/null
+++ b/net-analyzer/snort/files/snort.rc10
@@ -0,0 +1,50 @@
+#!/sbin/runscript
+# Copyright 1999-2010 Gentoo Foundation
+# Distributed under the terms of the GNU General Public License v2
+# $Header: /var/cvsroot/gentoo-x86/net-analyzer/snort/files/snort.rc10,v 1.1 2010/11/02 18:22:10 patrick Exp $
+
+opts="checkconfig reload"
+
+depend() {
+ need net
+ after mysql
+ after postgresql
+}
+
+checkconfig() {
+ if [ ! -e $CONF ] ; then
+ eerror "You need a configuration file to run snort"
+ eerror "There is an example config in /etc/snort/snort.conf.distrib"
+ return 1
+ fi
+}
+
+start() {
+ checkconfig || return 1
+ ebegin "Starting snort"
+ start-stop-daemon --start --quiet --exec /usr/bin/snort \
+ -- --nolock-pidfile --pid-path ${PIDPATH} ${SNORT_OPTS} >/dev/null 2>&1
+ eend $?
+}
+
+stop() {
+ ebegin "Stopping snort"
+ start-stop-daemon --stop --quiet --pidfile ${PIDPATH}/${PIDFILE}
+ # Snort needs a few seconds to fully shutdown
+ sleep 15
+ eend $?
+}
+
+reload() {
+ if [ ! -f ${PIDPATH}/${PIDFILE} ]; then
+ eerror "Snort isn't running"
+ return 1
+ fi
+
+ checkconfig || return 1
+ ebegin "Reloading Snort"
+ start-stop-daemon --stop --oknodo --signal HUP --pidfile ${PIDPATH}/${PIDFILE}
+ eend $?
+}
+
+
diff --git a/net-analyzer/snort/metadata.xml b/net-analyzer/snort/metadata.xml
index 424a9f37a4f6..01587a0a4759 100644
--- a/net-analyzer/snort/metadata.xml
+++ b/net-analyzer/snort/metadata.xml
@@ -1,37 +1,115 @@
-<?xml version="1.0" encoding="UTF-8"?>
-<!DOCTYPE pkgmetadata SYSTEM "http://www.gentoo.org/dtd/metadata.dtd">
-<pkgmetadata>
-<maintainer>
- <email>patrick@gentoo.org</email>
- <name>Patrick Lauer</name>
-</maintainer>
-<maintainer>
- <email>jason.r.wallace@gmail.com</email>
- <name>Jason Wallace</name>
-</maintainer>
-
-<herd>netmon</herd>
-<longdescription>Libpcap-based packet sniffer/logger/lightweight IDS</longdescription>
-<use>
-
-<flag name='aruba'>Enable Aruba support</flag>
-<flag name='decoder-preprocessor-rules'></flag>
-<flag name='dynamicplugin'>Enable ability to dynamically load preprocessors, detection engine, and rules library</flag>
-<flag name='flexresp'>Enable new connection tearing (not recommended)</flag>
-<flag name='flexresp2'>Enable new connection tearing</flag>
-<flag name='gre'>Enable GRE support</flag>
-<flag name='inline'>Enable snort-inline for accepting packets from <pkg>net-firewall/iptables</pkg>, via libipq, rather than
- <pkg>net-libs/libpcap</pkg>.</flag>
-<flag name='inline-init-failopen'>Enable inline-init-failopen support</flag>
-<flag name='linux-smp-stats'>Enable statistics reporting through proc on smp systems</flag>
-<flag name='mpls'>Enable support for mpls networks</flag>
-<flag name='perfprofiling'>Enable preprocessor and rule performance profiling</flag>
-<flag name='ppm'>Enable ppm support</flag>
-<flag name='react'>Enable interception and termination of offending HTTP accesses</flag>
-<flag name='targetbased'>Enable targetbased support</flag>
-<flag name='timestats'>Enable TimeStats functionality</flag>
-<flag name='reload'>Enable reloading a configuration without restarting</flag>
-<flag name='reload-error-restart'>Enable restarting on reload error</flag>
-<flag name='zlib'>Enable Http Response Decompression</flag>
-</use>
-</pkgmetadata>
+<?xml version="1.0" encoding="UTF-8"?>
+<!DOCTYPE pkgmetadata SYSTEM "http://www.gentoo.org/dtd/metadata.dtd">
+<pkgmetadata>
+ <herd>netmon</herd>
+ <maintainer>
+ <email>patrick@gentoo.org</email>
+ <name>Patrick Lauer</name>
+ </maintainer>
+ <maintainer>
+ <email>jason.r.wallace@gmail.com</email>
+ <name>Jason Wallace</name>
+ </maintainer>
+ <longdescription>
+ The de facto standard for intrusion detection and prevention
+ </longdescription>
+ <use>
+ <flag name='aruba'>
+ Adds support for monitoring wireless traffic using a Aruba Mobility
+ Controler.
+ </flag>
+ <flag name='decoder-preprocessor-rules'>
+ Added support to provide action control (alert, drop, pass, etc)
+ over preprocessor and decoder generated events.
+ </flag>
+ <flag name='dynamicplugin'>
+ Enable ability to dynamically load preprocessors, detection engine,
+ and rules library. This is required if you want to use shared
+ object (SO) snort rules.
+ </flag>
+ <flag name='flexresp'>
+ (DEPRECIATED) Original method for enabling connection tearing for
+ inline deployments. Replaced with flexresp3 in Snort-2.9.0.
+ </flag>
+ <flag name='flexresp2'>
+ (DEPRECIATED) Replaced flexresp for enabling connection tearing for
+ inline deployments. Replaced with flexresp3 in Snort-2.9.0.
+ </flag>
+ <flag name='gre'>
+ Enable support for inspecting and processing Generic Routing
+ Encapsulation (GRE) packet headders. Only needed if you are
+ monitoring GRE tunnels.
+ </flag>
+ <flag name='inline'>
+ (DEPRECIATED) Enables support for deploying snort inline. Uses
+ <pkg>net-firewall/iptables</pkg>, via libipq, rather than
+ <pkg>net-libs/libpcap</pkg>. Replaced by DAQ in Snort-2.9.0
+ </flag>
+ <flag name='inline-init-failopen'>
+ Enables support to allow traffic to pass (fail-open) through
+ inline deployments while snort is starting and not ready to begin
+ inspecting traffic. If this option is not enabled, network
+ traffic will not pass (fail-closed) until snort has fully started
+ and is ready to perform packet inspection.
+ </flag>
+ <flag name='linux-smp-stats'>
+ Enable accurate statistics reporting through /proc on systems with
+ multipule processors.
+ </flag>
+ <flag name='mpls'>
+ Enables support for processing and inspecting Multiprotocol Label
+ Switching MPLS network network traffic. Only needed if you are
+ monitoring an MPLS network.
+ </flag>
+ <flag name='perfprofiling'>
+ Enables support for preprocessor and rule performance profiling
+ using the perfmonitor preprocessor.
+ </flag>
+ <flag name='ppm'>
+ Enables support for setting per rule or per packet latency limits.
+ Helps protect against introducing network latency with inline
+ deployments.
+ </flag>
+ <flag name='react'>
+ Enables support for the react rule keyword. Supports interception,
+ termination, and redirection of HTTP connections.
+ </flag>
+ <flag name='targetbased'>
+ Enables support in snort for using a host attibute XML file
+ (attribute_table.dtd). This file needs to be created by the user
+ and should define the IP address, operating system, and services
+ for all hosts on the monitored network. This is cumbersome, but
+ can improve intrusion detection accuracy.
+ </flag>
+ <flag name='timestats'>
+ (DEPRECIATED) Enables support for printing packet stats on a per
+ hour and per protocol breakdown. Depreciated in Snort-2.9.0.
+ </flag>
+ <flag name='reload'>
+ Enables support for reloading a configuration without restarting
+ snort.
+ </flag>
+ <flag name='reload-error-restart'>
+ Enables support for completely restarting snort if an error is
+ detected durring a reload.
+ </flag>
+ <flag name='zlib'>
+ Enables HTTP inspection of compressed web traffic. Requires
+ dynamicplugin be enabled.
+ </flag>
+ <flag name='active-response'>
+ Enables support for automatically sending TCP resets and ICMP
+ unreachable messages to terminate connections. Used with inline
+ deployments.
+ </flag>
+ <flag name='normalizer'>
+ Enables support for normalizing packets in inline deployments to
+ help minimize the chances of detection evasion.
+ </flag>
+ <flag name='flexresp3'>
+ Enables support for new flexable response preprocessor for enabling
+ connection tearing for inline deployments. Replaces flexresp and
+ flexresp2.
+ </flag>
+ </use>
+</pkgmetadata>
diff --git a/net-analyzer/snort/snort-2.9.0.1.ebuild b/net-analyzer/snort/snort-2.9.0.1.ebuild
new file mode 100644
index 000000000000..ebef3e95153c
--- /dev/null
+++ b/net-analyzer/snort/snort-2.9.0.1.ebuild
@@ -0,0 +1,261 @@
+# Copyright 1999-2010 Gentoo Foundation
+# Distributed under the terms of the GNU General Public License v2
+# $Header: /var/cvsroot/gentoo-x86/net-analyzer/snort/snort-2.9.0.1.ebuild,v 1.1 2010/11/02 18:22:10 patrick Exp $
+
+EAPI="2"
+inherit eutils autotools multilib
+
+DESCRIPTION="The de facto standard for intrusion detection/prevention"
+HOMEPAGE="http://www.snort.org/"
+SRC_URI="http://www.snort.org/downloads/308 -> ${P}.tar.gz"
+LICENSE="GPL-2"
+SLOT="0"
+KEYWORDS="~amd64 ~x86"
+IUSE="static +dynamicplugin ipv6 +zlib gre mpls targetbased +decoder-preprocessor-rules
+ppm perfprofiling linux-smp-stats inline-init-failopen prelude +threads debug
+active-response normalizer reload-error-restart react flexresp3
+aruba mysql odbc postgres selinux"
+
+DEPEND=">=net-libs/libpcap-1.0.0
+ net-libs/daq
+ >=dev-libs/libpcre-6.0
+ dev-libs/libdnet
+ postgres? ( dev-db/postgresql-base )
+ mysql? ( virtual/mysql )
+ odbc? ( dev-db/unixODBC )
+ prelude? ( >=dev-libs/libprelude-0.9.0 )
+ zlib? ( sys-libs/zlib )"
+
+RDEPEND="${DEPEND}
+ dev-lang/perl
+ selinux? ( sec-policy/selinux-snort )"
+
+pkg_setup() {
+
+ if use zlib && ! use dynamicplugin; then
+ eerror
+ eerror "You have enabled the 'zlib' USE flag but not the 'dynamicplugin' USE flag."
+ eerror "'zlib' requires 'dynamicplugin' be enabled."
+ eerror
+ eerror
+ die
+ fi
+
+ # pre_inst() is a better place to put this
+ # but we need it here for the 'fowners' statements in src_install()
+ enewgroup snort
+ enewuser snort -1 -1 /dev/null snort
+
+}
+
+src_prepare() {
+
+ # Fix to prevent the docs Makefile from being used.
+ # Fixes #297190.
+ einfo "Applying documentation fix."
+ sed -i -e 's:src doc etc:src etc:g' \
+ "${WORKDIR}/${P}/Makefile.am" || die "Doc fix Failed"
+
+ #Multilib fix for the sf_engine
+ einfo "Applying multilib fix."
+ sed -i -e 's:${exec_prefix}/lib:${exec_prefix}/'$(get_libdir)':g' \
+ "${WORKDIR}/${P}/src/dynamic-plugins/sf_engine/Makefile.am" \
+ || die "sed for sf_engine failed"
+
+ #Multilib fix for the curent set of dynamic-preprocessors
+ for i in ftptelnet smtp ssh dns ssl dcerpc2 sdf; do
+ sed -i -e 's:${exec_prefix}/lib:${exec_prefix}/'$(get_libdir)':g' \
+ "${WORKDIR}/${P}/src/dynamic-preprocessors/$i/Makefile.am" \
+ || die "sed for $i failed."
+ done
+
+ if use prelude; then
+ einfo "Applying prelude fix."
+ sed -i -e "s:AC_PROG_RANLIB:AC_PROG_LIBTOOL:" configure.in
+ fi
+
+ AT_M4DIR=m4 eautoreconf
+}
+
+src_configure() {
+
+ econf \
+ $(use_enable !static shared) \
+ $(use_enable static) \
+ $(use_enable dynamicplugin) \
+ $(use_enable ipv6) \
+ $(use_enable zlib) \
+ $(use_enable gre) \
+ $(use_enable mpls) \
+ $(use_enable targetbased) \
+ $(use_enable decoder-preprocessor-rules) \
+ $(use_enable ppm) \
+ $(use_enable perfprofiling) \
+ $(use_enable linux-smp-stats) \
+ $(use_enable inline-init-failopen) \
+ $(use_enable prelude) \
+ $(use_enable threads pthread) \
+ $(use_enable debug) \
+ $(use_enable debug debug-msgs) \
+ $(use_enable debug corefiles) \
+ $(use_enable active-response) \
+ $(use_enable normalizer) \
+ $(use_enable reload-error-restart) \
+ $(use_enable react) \
+ $(use_enable flexresp3) \
+ $(use_enable aruba) \
+ $(use_with mysql) \
+ $(use_with odbc) \
+ $(use_with postgres postgresql) \
+ --enable-reload \
+ --disable-build-dynamic-examples \
+ --disable-profile \
+ --disable-ppm-test \
+ --disable-dlclose \
+ --disable-intel-soft-cpm \
+ --disable-static-daq \
+ --without-oracle
+
+}
+
+src_install() {
+
+ emake DESTDIR="${D}" install || die "make install failed"
+
+ keepdir /var/log/snort/
+ fowners snort:snort /var/log/snort
+
+ keepdir /var/run/snort/
+ fowners snort:snort /var/run/snort/
+
+ dodoc ./doc/* ./RELEASE.NOTES ./tools/u2boat/README.u2boat ./schemas/*
+ rm -rf "${D}"usr/share/doc/snort/
+ rm "${D}"usr/share/doc/"${P}"/Makefile*
+
+ insinto /etc/snort
+ doins etc/attribute_table.dtd \
+ etc/classification.config \
+ etc/gen-msg.map \
+ etc/reference.config \
+ etc/threshold.conf \
+ etc/unicode.map \
+ || die "Failed to add files in /etc/snort"
+
+ # We use snort.conf.distrib because the config file is complicated
+ # and the one shipped with snort can change drastically between versions.
+ # Users should migrate setting by hand and not with etc-update.
+ newins etc/snort.conf snort.conf.distrib \
+ || die "Failed to add snort.conf.distrib"
+
+ insinto /etc/snort/preproc_rules
+ doins preproc_rules/decoder.rules \
+ preproc_rules/preprocessor.rules \
+ || die "Failed to add files in /etc/snort/preproc_rules"
+
+ keepdir /etc/snort/rules/
+ fowners -R snort:snort /etc/snort/
+
+ keepdir /usr/$(get_libdir)/snort_dynamicrules
+
+ newinitd "${FILESDIR}/snort.rc10" snort || die "Failed to add snort.rc10"
+
+ newconfd "${FILESDIR}/snort.confd" snort || die "Failed to add snort.confd"
+
+ # Set the correct lib path for dynamicengine, dynamicpreprocessor, and dynamicdetection
+ sed -i -e 's:/usr/local/lib:/usr/'$(get_libdir)':g' \
+ "${D}etc/snort/snort.conf.distrib" \
+ || die "Failed to update snort.conf.distrib lib paths"
+
+ #Set the correct rule location in the config
+ sed -i -e 's:RULE_PATH ../rules:RULE_PATH /etc/snort/rules:g' \
+ "${D}etc/snort/snort.conf.distrib" \
+ || die "Failed to update snort.conf.distrib rule path"
+
+ #Set the correct preprocessor/decoder rule location in the config
+ sed -i -e 's:PREPROC_RULE_PATH ../preproc_rules:PREPROC_RULE_PATH /etc/snort/preproc_rules:g' \
+ "${D}etc/snort/snort.conf.distrib" \
+ || die "Failed to update snort.conf.distrib preproc rule path"
+
+ #Enable the preprocessor/decoder rules
+ sed -i -e 's:^# include $PREPROC_RULE_PATH:include $PREPROC_RULE_PATH:g' \
+ "${D}etc/snort/snort.conf.distrib" \
+ || die "Failed to uncomment snort.conf.distrib preproc rule path"
+
+ sed -i -e 's:^# dynamicdetection directory:dynamicdetection directory:g' \
+ "${D}etc/snort/snort.conf.distrib" \
+ || die "Failed to uncomment snort.conf.distrib dynamicdetection directory"
+
+ #Just some clean up of trailing /'s in the config
+ sed -i -e 's:snort_dynamicpreprocessor/$:snort_dynamicpreprocessor:g' \
+ "${D}etc/snort/snort.conf.distrib" \
+ || die "Failed to clean up snort.conf.distrib trailing slashes"
+
+ #Make it clear in the config where these are...
+ sed -i -e 's:^include classification.config:include /etc/snort/classification.config:g' \
+ "${D}etc/snort/snort.conf.distrib" \
+ || die "Failed to update snort.conf.distrib classification.config path"
+
+ sed -i -e 's:^include reference.config:include /etc/snort/reference.config:g' \
+ "${D}etc/snort/snort.conf.distrib" \
+ || die "Failed to update snort.conf.distrib /etc/snort/reference.config path"
+
+ #Disable all rule files by default.
+ #Users need to choose what they want enabled.
+ sed -i -e 's:^include $RULE_PATH:# include $RULE_PATH:g' \
+ "${D}etc/snort/snort.conf.distrib" \
+ || die "Failed to disable rules in snort.conf.distrib"
+
+}
+
+pkg_postinst() {
+ elog
+ elog "${P} introduces the DAQ, or Data Acquisition library, for"
+ elog "packet I/O. The DAQ replaces direct calls to PCAP functions with"
+ elog "an abstraction layer that facilitates operation on a variety of"
+ elog "hardware and software interfaces without requiring changes to Snort."
+ elog
+ elog "The only DAQ modules supported with this ebuild are AFpacket, PCAP,"
+ elog "and Dump. IPQ nad NFQ will be supported in future versions of this"
+ elog "package."
+ elog
+ elog "For passive (non-inline) Snort deployments you will want to use"
+ elog "either PCAP or AFpacket. For inline deployments you will need"
+ elog "to use AFpacket. The Dump DAQ is used for testing the various inline"
+ elog "features available in ${P}."
+ elog
+ elog "The core DQA libraries are installed in /usr/$(get_libdir)/. The libraries"
+ elog "for the individual DAQ modules (afpacket,pcap,dump) are installed in"
+ elog "/usr/$(get_libdir)/daq. To use these you will need to add the following"
+ elog "lines to your snort.conf:"
+ elog
+ elog "config daq: <DAQ module>"
+ elog "config daq_mode: <mode>"
+ elog "config daq_dir: /usr/$(get_libdir)/daq"
+ elog
+ elog "Please see the README file for DAQ for information about specific"
+ elog "DAQ modules and README.daq from the Snort 2.9 documentation"
+ elog "reguarding Snort and DAQ configuration information."
+ elog
+ elog "See /usr/share/doc/${PF} and /etc/snort/snort.conf.distrib for"
+ elog "information on configuring snort."
+ elog
+
+ if [[ $(date +%Y%m%d) < 20101105 ]]; then
+
+ ewarn
+ ewarn "Please note, you can not use ${PF} with the SO rules from"
+ ewarn "previous versions of Snort!"
+ ewarn
+ ewarn "If you do not have a subscription to the VRT rule set and you"
+ ewarn "wish to continue using the shared object (SO) rules, you will"
+ ewarn "need to downgrade Snort. The SO rules will be made available"
+ ewarn "to registered (non-subscription) users on Nov. 05, 2010"
+ ewarn "(30 days after being released to subscription users)."
+ ewarn
+ ewarn "Please see http://www.snort.org/snort-rules/#rules for more"
+ ewarn "details."
+ ewarn
+
+ fi
+
+}