summaryrefslogtreecommitdiff
path: root/network
diff options
context:
space:
mode:
Diffstat (limited to 'network')
-rw-r--r--network/snort/README.SLACKWARE4
-rw-r--r--network/snort/doinst.sh1
-rw-r--r--network/snort/slack-desc12
-rw-r--r--network/snort/snort.SlackBuild10
-rw-r--r--network/snort/snort.info6
5 files changed, 14 insertions, 19 deletions
diff --git a/network/snort/README.SLACKWARE b/network/snort/README.SLACKWARE
index 4190e5c614..ea7307c44e 100644
--- a/network/snort/README.SLACKWARE
+++ b/network/snort/README.SLACKWARE
@@ -22,13 +22,13 @@ or start it as:
IFACE=xxxx /etc/rc.d/rc.snort start|stop|restart
-As an example, you can put this in your /etc/rc.d/rc.local script:
+As an example, you can this in your /etc/rc.d/rc.local script:
if [ -x /etc/rc.d/rc.snort ]; then
IFACE=eth1 /etc/rc.d/rc.snort start
fi
-And this in your /etc/rc.d/rc.local_shutdown:
+and put this in your /etc/rc.d/rc.local_shutdown:
if [ -x /etc/rc.d/rc.snort ]; then
IFACE=xxxx /etc/rc.d/rc.snort stop
diff --git a/network/snort/doinst.sh b/network/snort/doinst.sh
index 6dc7804cb7..42ced9f56e 100644
--- a/network/snort/doinst.sh
+++ b/network/snort/doinst.sh
@@ -28,6 +28,5 @@ config etc/snort/threshold.conf.new
config etc/snort/attribute_table.dtd.new
config etc/snort/classification.config.new
config etc/snort/gen-msg.map.new
-#config etc/snort/sid-msg.map.new
config etc/snort/unicode.map.new
diff --git a/network/snort/slack-desc b/network/snort/slack-desc
index e8639797b6..bcb9dab07f 100644
--- a/network/snort/slack-desc
+++ b/network/snort/slack-desc
@@ -9,11 +9,11 @@
snort: Snort (Intrusion Detection and Prevention System)
snort:
snort: Snort is an open source network intrusion detection and prevention
-snort: system. It is capable of performing real-time traffic analysis,
-snort: alerting, blocking and packet logging on IP networks. It utilizes a
-snort: combination of protocol analysis and pattern matching in order to
+snort: system.
+snort:
+snort: Snort is capable of performing real-time traffic analysis, alerting,
+snort: blocking, session sniping, logging, and dropping sessions and packets.
+snort: It uses a combination of protocol analysis and pattern matching to
snort: detect anomalies, misuse and attacks.
-snort: Snort is capable of detecting and responding in real-time, sending
-snort: alerts, performing session sniping, logging packets, or dropping
-snort: sessions/packets when deployed in-line.
+snort:
snort:
diff --git a/network/snort/snort.SlackBuild b/network/snort/snort.SlackBuild
index 6194ecb516..835c53fd96 100644
--- a/network/snort/snort.SlackBuild
+++ b/network/snort/snort.SlackBuild
@@ -26,7 +26,7 @@
# Maintained by David Spencer <baildon.research@googlemail.com>
PRGNAM=snort
-VERSION=${VERSION:-2.9.7.0}
+VERSION=${VERSION:-2.9.7.2}
BUILD=${BUILD:-1}
TAG=${TAG:-_SBo}
@@ -67,7 +67,7 @@ tar xvf $CWD/$PRGNAM-$VERSION.tar.gz
cd $PRGNAM-$VERSION
# The Makefiles do not respect the --libdir setting, which causes the libs to
-# go to /usr/lib/ on Slackware64. We'll "teach them" how to do it right :)
+# go to /usr/lib/ on Slackware64. We'll "teach them" how to do it right :)
for mf in $( find src/ -name Makefile.in ) ; do
sed -i "s|\${exec_prefix}/lib/snort_dynamic|@libdir@/snort_dynamic|g" $mf
done
@@ -105,7 +105,7 @@ for i in $( find $PKG/usr/man -type l ) ; do ln -s $(readlink $i).gz $i.gz ; rm
# Set up a sane config directory - snort won't do this on its own
mkdir -p $PKG/etc/$PRGNAM
# Fix paths for libraries in snort.conf, also 64-bits and rules paths...
-# also set "unified2" as standard output, without special options
+# also set "unified2" as standard output, without special options
sed -e "s|usr/local/lib|usr/lib${LIBDIRSUFFIX}|g" \
-e "s|PATH ../|PATH |g" \
-e "/^# output unified2*/aoutput unified2: filename snort.log, limit 128" \
@@ -115,10 +115,6 @@ cat etc/reference.config > $PKG/etc/snort/reference.config.new
cat etc/classification.config > $PKG/etc/snort/classification.config.new
cat etc/attribute_table.dtd > $PKG/etc/snort/attribute_table.dtd.new
cat etc/gen-msg.map > $PKG/etc/snort/gen-msg.map.new
-# sid-msg.map is not included in the source tarball, but it is in the
-# snort-rules package. We'll just skip it for now, it might come back in
-# some release...
-#cat etc/sid-msg.map > $PKG/etc/snort/sid-msg.map.new
cat etc/unicode.map > $PKG/etc/snort/unicode.map.new
# Create default, empty directory for rules
diff --git a/network/snort/snort.info b/network/snort/snort.info
index 770d11009e..7885888220 100644
--- a/network/snort/snort.info
+++ b/network/snort/snort.info
@@ -1,8 +1,8 @@
PRGNAM="snort"
-VERSION="2.9.7.0"
+VERSION="2.9.7.2"
HOMEPAGE="http://www.snort.org/"
-DOWNLOAD="https://www.snort.org/downloads/snort/snort-2.9.7.0.tar.gz"
-MD5SUM="c2a45bc56441ee9456478f219dd8d1e2"
+DOWNLOAD="http://sourceforge.net/projects/slackbuildsdirectlinks/files/snort/snort-2.9.7.2.tar.gz"
+MD5SUM="b01e9964827394c39194a0147bc15705"
DOWNLOAD_x86_64=""
MD5SUM_x86_64=""
REQUIRES="daq"