Update of /cvsroot/fink/dists/10.3/unstable/crypto/finkinfo
In directory sc8-pr-cvs1.sourceforge.net:/tmp/cvs-serv13440/crypto/finkinfo
Added Files:
snort.info snort.patch
Log Message:
samba is crypto, so snort must be also
--- NEW FILE: snort.patch ---
--- snort/src/snort.c.orig 2003-04-22 20:27:16.000000000 +0200
+++ snort/src/snort.c 2003-04-22 20:27:40.000000000 +0200
@@ -1729,7 +1729,7 @@
{
struct stat st;
int i;
- char *conf_files[]={"/etc/snort.conf", "./snort.conf", NULL};
+ char *conf_files[]={"@PREFIX@/etc/snort.conf", "./snort.conf", NULL};
char *fname = NULL;
char *home_dir = NULL;
char *rval = NULL;
--- snort/etc/snort.conf.orig 2003-04-22 20:59:34.000000000 +0200
+++ snort/etc/snort.conf 2003-04-22 21:01:23.000000000 +0200
@@ -99,7 +99,7 @@
var AIM_SERVERS
[64.12.24.0/24,64.12.25.0/24,64.12.26.14/24,64.12.28.0/24,64.12.29.0/24,64.12.161.0/24,64.12.163.0/24,205.188.5.0/24,205.188.9.0/24]
# Path to your rules files (this can be a relative path)
-var RULE_PATH ../rules
+var RULE_PATH .
# Configure the snort decoder:
# ============================
--- snort/src/parser.c.orig 2003-04-22 21:03:50.000000000 +0200
+++ snort/src/parser.c 2003-04-22 21:04:11.000000000 +0200
@@ -3210,7 +3210,7 @@
}
else
{
- strlcpy(buffer, "/var/log/snort", STD_BUF);
+ strlcpy(buffer, "@PREFIX@/var/log/snort", STD_BUF);
}
strlcat(buffer, "/", STD_BUF - strlen(buffer));
--- snort/src/snort.h.orig 2003-04-22 21:05:21.000000000 +0200
+++ snort/src/snort.h 2003-04-22 21:05:40.000000000 +0200
@@ -68,7 +68,7 @@
#endif
#ifndef WIN32
- #define DEFAULT_LOG_DIR "/var/log/snort"
+ #define DEFAULT_LOG_DIR "@PREFIX@/var/log/snort"
#define DEFAULT_DAEMON_ALERT_FILE "alert"
#else
#define DEFAULT_LOG_DIR "log"
--- snort/src/util.c.orig 2003-04-22 21:14:10.000000000 +0200
+++ snort/src/util.c 2003-04-22 21:14:51.000000000 +0200
@@ -713,7 +713,7 @@
}
#ifndef _PATH_VARRUN
#ifndef WIN32
- strlcpy(_PATH_VARRUN, "/var/run/", 10);
+ strlcpy(_PATH_VARRUN, "@PREFIX@/var/run/", 10);
#else
if (GetCurrentDirectory(sizeof (dir)-1, dir))
strncpy (_PATH_VARRUN, dir, sizeof(dir)-1);
@@ -731,8 +731,8 @@
if(!S_ISDIR(pt.st_mode) || access(_PATH_VARRUN, W_OK) == -1)
{
LogMessage("WARNING: _PATH_VARRUN is invalid, trying "
- "/var/log...\n");
- strncpy(pv.pid_path, "/var/log/", strlen("/var/log/"));
+ "@PREFIX@/var/log...\n");
+ strncpy(pv.pid_path, "@PREFIX@/var/log/",
strlen("@PREFIX@/var/log/"));
stat(pv.pid_path, &pt);
if(!S_ISDIR(pt.st_mode) || access(pv.pid_path, W_OK) == -1)
--- snort-2.0.2/src/util.h.orig 2003-09-30 17:25:13.000000000 +0200
+++ snort-2.0.2/src/util.h 2003-09-30 17:25:31.000000000 +0200
@@ -39,6 +39,8 @@
#include "strlcpyu.h"
#endif
+#include <sys/types.h>
+
extern u_long netmasks[33];
/* Self preservation memory control struct */
--- NEW FILE: snort.info ---
Package: snort
Version: 2.1.3
Revision: 2
Depends: libpcap, samba, mysql12-shlibs, postgresql73-shlibs |
postgresql73-ssl-shlibs, daemonic, passwd, pcre-shlibs
Builddepends: mysql12-dev, postgresql73-unified-dev, libnet1.0, pcre, pcre-bin
Source: http://www.snort.org/dl/%n-%vRC1.tar.gz
Source-MD5: c66d1bfb15457a9413aa00a6bfe4e065
PatchScript: sed -e 's|@PREFIX@|%p|g' < %a/%n.patch | patch -p1
ConfigureParams: --mandir=%p/share/man --infodir=%p/share/info
--libexecdir=%p/lib --enable-sourcefire --enable-perfmonitor --enable-smbalerts
--enable-flexresp --with-mysql=%p --with-postgresql=%p
--with-libnet-includes=%p/include --with-libnet-libraries=%p/lib
InstallScript: <<
install -m 755 -d %i/etc/snort
install -m 755 rules/*.rules %i/etc/snort
install -m 755 etc/*.config etc/snort.conf etc/*.map etc/sid %i/etc/snort
install -m 755 -d %i/bin
install -m 755 contrib/snort_stat.pl %i/bin/
make install prefix=%i
install -m 755 -d %i/var/log/snort
install -m 755 -d %i/var/run
<<
DocFiles: doc/AUTHORS doc/BUGS COPYING doc/CREDITS ChangeLog doc/FAQ
doc/INSTALL LICENSE doc/NEWS doc/README* doc/RULES.todo doc/snort_manual.pdf
doc/USAGE contrib/create_* contrib/snortdb-extra.gz
DaemonicName: snort
DaemonicFile: <<
<service>
<description>Snort Network Intrusion Detection</description>
<message>Snort NIDS</message>
<daemon name="snort">
<executable background="yes">%p/bin/snort</executable>
<parameters> -d -D -l %p/var/log/snort -c %p/etc/snort/snort.conf</parameters>
<configfile>%p/etc/snort/snort.conf</configfile>
</daemon>
</service>
<<
PreRmScript: <<
if [ $1 != "upgrade" ]; then
daemonic remove snort
fi
<<
Description: Open Source Network Intrusion Detection
DescDetail: <<
Snort is a lightweight network intrusion detection system, capable of
performing real-time
traffic analysis and packet logging on IP networks. It can perform protocol
analysis,
content searching/matching and can be used to detect a variety of attacks and
probes, such
as buffer overflows, stealth port scans, CGI attacks, SMB probes, OS
fingerprinting attempts,
and much more. Snort uses a flexible rules language to describe traffic that it
should collect
or pass, as well as a detection engine that utilizes a modular plugin
architecture. Snort has
a real-time alerting capability as well, incorporating alerting mechanisms for
syslog, a user
specified file, a UNIX socket, or WinPopup messages to Windows clients using
Samba's smbclient.
<<
License: GPL
Maintainer: Thomas Kotzian <[EMAIL PROTECTED]>
Homepage: http://www.snort.org
-------------------------------------------------------
This SF.net email is sponsored by: Splunk Inc. Do you grep through log files
for problems? Stop! Download the new AJAX search engine that makes
searching your log files as easy as surfing the web. DOWNLOAD SPLUNK!
http://sel.as-us.falkag.net/sel?cmd=lnk&kid=103432&bid=230486&dat=121642
_______________________________________________
Fink-commits mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/fink-commits