aboutsummaryrefslogtreecommitdiff
path: root/security/snort_inline
diff options
context:
space:
mode:
authorDoug Barton <dougb@FreeBSD.org>2011-10-09 16:57:06 +0000
committerDoug Barton <dougb@FreeBSD.org>2011-10-09 16:57:06 +0000
commitfc6844c746615b00dd09465a30ec6f6cf5b62d53 (patch)
treec4d01d85384f064a32868871015388c64ed8181b /security/snort_inline
parent17743c3aea1cbbb7992b381f8502d6f8fade9e1a (diff)
downloadports-fc6844c746615b00dd09465a30ec6f6cf5b62d53.tar.gz
ports-fc6844c746615b00dd09465a30ec6f6cf5b62d53.zip
Notes
Diffstat (limited to 'security/snort_inline')
-rw-r--r--security/snort_inline/Makefile124
-rw-r--r--security/snort_inline/distinfo2
-rw-r--r--security/snort_inline/files/snort.sh.in37
-rw-r--r--security/snort_inline/pkg-descr8
-rw-r--r--security/snort_inline/pkg-message24
-rw-r--r--security/snort_inline/pkg-plist55
6 files changed, 0 insertions, 250 deletions
diff --git a/security/snort_inline/Makefile b/security/snort_inline/Makefile
deleted file mode 100644
index efba74fdbfe6..000000000000
--- a/security/snort_inline/Makefile
+++ /dev/null
@@ -1,124 +0,0 @@
-#/ New ports collection makefile for: snort_inline
-# Date created: 4 March 2005
-# Whom: nick@rogness.net
-#
-# $FreeBSD$
-#
-
-PORTNAME= snort_inline
-PORTVERSION= 2.6.1.5
-CATEGORIES= security
-MASTER_SITES= http://freebsd.rogness.net/ports/snort_inline/
-
-MAINTAINER= nick@rogness.net
-COMMENT= An inline IPS system based on snort using ipfw
-
-LIB_DEPENDS= pcre.0:${PORTSDIR}/devel/pcre
-
-GNU_CONFIGURE= yes
-CONFIGURE_ARGS+= --enable-inline --enable-ipfw
-
-LIB_DEPENDS+= dnet:${PORTSDIR}/net/libdnet
-
-USE_LDCONFIG= yes
-
-OPTIONS= MYSQL "With MySQL support" off \
- ODBC "With ODBC support" off \
- POSTGRESQL "With POSTGRESQL support" off \
- FLEXRESP "With flexible responses (resp. w/packet resets)" off
-
-BROKEN= this port does not build properly
-DEPRECATED= no longer supported upstream
-EXPIRATION_DATE= 2011/09/04
-
-.include <bsd.port.pre.mk>
-
-.if defined(WITH_MYSQL)
-USE_MYSQL= yes
-CONFIGURE_ARGS+= --with-mysql=${LOCALBASE}
-.else
-CONFIGURE_ARGS+= --with-mysql=no
-.endif
-
-.if defined(WITH_ODBC)
-LIB_DEPENDS+= odbc.1:${PORTSDIR}/databases/unixODBC
-CONFIGURE_ARGS+= --with-odbc=${LOCALBASE}
-LDFLAGS+= ${PTHREAD_LIBS}
-.else
-CONFIGURE_ARGS+= --with-odbc=no
-.endif
-
-.if defined(WITH_POSTGRESQL)
-USE_PGSQL= yes
-CONFIGURE_ARGS+= --with-postgresql=${LOCALBASE}
-.if exists(/usr/lib/libssl.a) && exists(/usr/lib/libcrypto.a)
-LDFLAGS+= -lssl -lcrypto
-.endif
-.else
-CONFIGURE_ARGS+= --with-postgresql=no
-.endif
-
-.if defined(WITH_FLEXRESP)
-LIBNET_CONFIG?= ${LOCALBASE}/bin/libnet10-config
-
-.if exists(${LIBNET_CONFIG})
-LIBNET_CFLAGS!= ${LIBNET_CONFIG} --cflags
-LIBNET_LIBS!= ${LIBNET_CONFIG} --libs
-LIBNET_INCDIR= ${LIBNET_CFLAGS:M-I*:S/-I//}
-LIBNET_LIBDIR= ${LIBNET_LIBS:M-L*:S/-L//}
-.endif
-
-BUILD_DEPENDS+= ${LIBNET_CONFIG}:${PORTSDIR}/net/libnet10
-CONFIGURE_ARGS+= --enable-flexresp \
- --with-libnet-includes=${LIBNET_INCDIR} \
- --with-libnet-libraries=${LIBNET_LIBDIR}
-.endif
-
-MAN8= snort.8 snort_inline.8
-DOCS= ChangeLog doc/AUTHORS doc/BUGS doc/CREDITS doc/faq* doc/NEWS \
- doc/README* doc/TODO doc/USAGE doc/*.pdf
-
-RULE_PATH= ${DATADIR}/rules
-
-USE_RC_SUBR= snort.sh
-
-post-patch:
- ${REINPLACE_CMD} "s,%%PREFIX%%,${PREFIX}," ${WRKSRC}/src/snort.c
- ${REINPLACE_CMD} "s,/etc/snort_inline/drop-rules,${RULE_PATH}," ${WRKSRC}/etc/snort_inline.conf
- ${REINPLACE_CMD} "s,$RULE_PATH/classification.config,${DATADIR}/classification.config," ${WRKSRC}/etc/snort_inline.conf
- ${REINPLACE_CMD} "s,$RULE_PATH/reference.config,${DATADIR}/reference.config," ${WRKSRC}/etc/snort_inline.conf
- ${REINPLACE_CMD} -e "s/^unicode.map/\/usr\/local\/share\/snort_inline\/unicode.map/" ${WRKSRC}/etc/snort_inline.conf
-.if defined(WITH_FLEXRESP)
- ${REINPLACE_CMD} -e 's|libnet-config|${LIBNET_CONFIG}|g' ${WRKSRC}/configure
-.endif
-
-post-install:
- @${MKDIR} ${DATADIR}
- @${MKDIR} ${RULE_PATH}
- ${INSTALL_DATA} ${WRKSRC}/etc/classification.config \
- ${DATADIR}/classification.config-sample
- [ -f ${DATADIR}/classification.config ] || \
- ${CP} ${DATADIR}/classification.config-sample \
- ${DATADIR}/classification.config
- ${INSTALL_DATA} ${WRKSRC}/etc/reference.config \
- ${DATADIR}/reference.config-sample
- [ -f ${DATADIR}/reference.config ] || \
- ${CP} ${DATADIR}/reference.config-sample ${DATADIR}/reference.config
- ${INSTALL_DATA} ${WRKSRC}/etc/threshold.conf \
- ${DATADIR}/threshold.conf-sample
- [ -f ${DATADIR}/threshold.conf ] || \
- ${CP} ${DATADIR}/threshold.conf-sample ${DATADIR}/threshold.conf
- ${INSTALL_DATA} ${WRKSRC}/etc/unicode.map \
- ${DATADIR}/unicode.map
-.for f in snort.conf snort_inline.conf
- ${INSTALL_DATA} ${WRKSRC}/etc/${f} ${PREFIX}/etc/${f}-sample
- [ -f ${PREFIX}/etc/${f} ] || \
- ${INSTALL_DATA} ${WRKSRC}/etc/${f} ${PREFIX}/etc/${f}
-.endfor
-.if !defined(NOPORTDOCS)
- @${MKDIR} ${DOCSDIR}
- cd ${WRKSRC} && ${INSTALL_DATA} ${DOCS} ${DOCSDIR}
-.endif
- @${CAT} ${PKGMESSAGE}
-
-.include <bsd.port.post.mk>
diff --git a/security/snort_inline/distinfo b/security/snort_inline/distinfo
deleted file mode 100644
index 531fcf50b1b4..000000000000
--- a/security/snort_inline/distinfo
+++ /dev/null
@@ -1,2 +0,0 @@
-SHA256 (snort_inline-2.6.1.5.tar.gz) = 5831643c211d45539ad9442690e084559fcd8625a973976c813813acf5c5b6db
-SIZE (snort_inline-2.6.1.5.tar.gz) = 4232674
diff --git a/security/snort_inline/files/snort.sh.in b/security/snort_inline/files/snort.sh.in
deleted file mode 100644
index 5522b6fbd2d9..000000000000
--- a/security/snort_inline/files/snort.sh.in
+++ /dev/null
@@ -1,37 +0,0 @@
-#!/bin/sh
-
-# $FreeBSD$
-
-# PROVIDE: snort
-# REQUIRE: DAEMON
-# BEFORE: LOGIN
-# KEYWORD: shutdown
-
-# Add the following lines to /etc/rc.conf to enable snort:
-# snort_enable (bool): Set to YES to enable snort
-# Default: NO
-# snort_flags (str): Extra flags passed to snort
-# Default: -Dq -J 8000
-# snort_interface (str): Network interface to sniff
-# Default: ""
-# snort_conf (str): Snort configuration file
-# Default: ${PREFIX}/etc/snort_inline.conf
-#
-
-. /etc/rc.subr
-
-name="snort"
-rcvar=`set_rcvar`
-
-command="%%PREFIX%%/bin/snort_inline"
-
-load_rc_config $name
-
-[ -z "$snort_enable" ] && snort_enable="NO"
-[ -z "$snort_conf" ] && snort_conf="%%PREFIX%%/etc/snort_inline.conf"
-[ -z "$snort_flags" ] && snort_flags="-Dq -J 8000"
-
-[ -n "$snort_interface" ] && snort_flags="$snort_flags -i $snort_interface"
-[ -n "$snort_conf" ] && snort_flags="$snort_flags -c $snort_conf"
-
-run_rc_command "$1"
diff --git a/security/snort_inline/pkg-descr b/security/snort_inline/pkg-descr
deleted file mode 100644
index 7ead26910606..000000000000
--- a/security/snort_inline/pkg-descr
+++ /dev/null
@@ -1,8 +0,0 @@
-snort-inline is a variation of snort that interfaces with the
-IPFW firewall and divert sockets to provide a simple IPS system
-using snort signatures.
-
-WWW: http://freebsd.rogness.net/snort_inline
-
-- Nick Rogness
-nick@rogness.net
diff --git a/security/snort_inline/pkg-message b/security/snort_inline/pkg-message
deleted file mode 100644
index 17bd6382d2ba..000000000000
--- a/security/snort_inline/pkg-message
+++ /dev/null
@@ -1,24 +0,0 @@
- ***********************************
- * !!!!!!!!!!! WARNING !!!!!!!!!!! *
- ***********************************
-
-snort_inline uses rcNG startup scripts and must be enabled via /etc/rc.conf
-
-Available variables:
-
- snort_enable (bool): Set to YES to enable snort
- Default: NO
- snort_flags (str): Extra flags passed to snort
- Default: -Dq -J 8000
- snort_interface (str): Network interface to sniff
- Default: ""
- snort_conf (str): Snort configuration file
- Default: ${PREFIX}/etc/snort_inline.conf
-
-Also, make sure that your kernel is compiled with:
-
- options IPFIREWALL
- options IPDIVERT
-
-The default divert port is 8000. See http://freebsd.rogness.net/snort_inline
-for more information.
diff --git a/security/snort_inline/pkg-plist b/security/snort_inline/pkg-plist
deleted file mode 100644
index 1304bfebc148..000000000000
--- a/security/snort_inline/pkg-plist
+++ /dev/null
@@ -1,55 +0,0 @@
-bin/snort_inline
-@unexec if [ -f %D/etc/snort.conf ] && cmp -s %D/etc/snort.conf %D/etc/snort.conf-sample; then rm -f %D/etc/snort.conf; fi
-etc/snort.conf-sample
-@exec [ -f %B/snort.conf ] || cp %B/%f %B/snort.conf
-@unexec if [ -f %D/etc/snort_inline.conf ] && cmp -s %D/etc/snort_inline.conf %D/etc/snort_inline.conf-sample; then rm -f %D/etc/snort_inline.conf; fi
-etc/snort_inline.conf-sample
-@exec [ -f %B/snort_inline.conf ] || cp %B/%f %B/snort_inline.conf
-@unexec if [ -f %B/unicode.map ] && cmp -s %B/unicode.map %B/unicode.map-sample; then rm -f %B/etc/unicode.map; fi
-%%DATADIR%%/unicode.map
-@exec [ -f %B/unicode.map ] || cp %B/%f %B/unicode.map
-@unexec if [ -f %B/threshold.conf ] && cmp -s %B/threshold.conf %B/threshold.conf-sample; then rm -f %B/threshold.conf; fi
-%%DATADIR%%/threshold.conf-sample
-@exec [ -f %B/threshold.conf ] || cp %B/%f %B/threshold.conf
-%%PORTDOCS%%%%DOCSDIR%%/AUTHORS
-%%PORTDOCS%%%%DOCSDIR%%/BUGS
-%%PORTDOCS%%%%DOCSDIR%%/CREDITS
-%%PORTDOCS%%%%DOCSDIR%%/ChangeLog
-%%PORTDOCS%%%%DOCSDIR%%/faq.pdf
-%%PORTDOCS%%%%DOCSDIR%%/faq.tex
-%%PORTDOCS%%%%DOCSDIR%%/NEWS
-%%PORTDOCS%%%%DOCSDIR%%/README
-%%PORTDOCS%%%%DOCSDIR%%/README.INLINE
-%%PORTDOCS%%%%DOCSDIR%%/README.FLEXRESP
-%%PORTDOCS%%%%DOCSDIR%%/README.PLUGINS
-%%PORTDOCS%%%%DOCSDIR%%/README.UNSOCK
-%%PORTDOCS%%%%DOCSDIR%%/README.WIN32
-%%PORTDOCS%%%%DOCSDIR%%/README.alert_order
-%%PORTDOCS%%%%DOCSDIR%%/README.csv
-%%PORTDOCS%%%%DOCSDIR%%/README.database
-%%PORTDOCS%%%%DOCSDIR%%/README.event_queue
-%%PORTDOCS%%%%DOCSDIR%%/README.flow
-%%PORTDOCS%%%%DOCSDIR%%/README.flowbits
-%%PORTDOCS%%%%DOCSDIR%%/README.flow-portscan
-%%PORTDOCS%%%%DOCSDIR%%/README.sfportscan
-%%PORTDOCS%%%%DOCSDIR%%/README.asn1
-%%PORTDOCS%%%%DOCSDIR%%/README.http_inspect
-%%PORTDOCS%%%%DOCSDIR%%/README.thresholding
-%%PORTDOCS%%%%DOCSDIR%%/README.wireless
-%%PORTDOCS%%%%DOCSDIR%%/README.NFQUEUE
-%%PORTDOCS%%%%DOCSDIR%%/README.clamav
-%%PORTDOCS%%%%DOCSDIR%%/README.frag3
-%%PORTDOCS%%%%DOCSDIR%%/TODO
-%%PORTDOCS%%%%DOCSDIR%%/USAGE
-%%PORTDOCS%%%%DOCSDIR%%/snort_manual.pdf
-%%PORTDOCS%%%%DOCSDIR%%/snort_schema_v106.pdf
-%%PORTDOCS%%@dirrm %%DOCSDIR%%
-@unexec if [ -f %B/classification.config ] && cmp -s %B/classification.config %B/classification.config-sample; then rm -f %B/classification.config; fi
-%%DATADIR%%/classification.config-sample
-@exec [ -f %B/classification.config ] || cp %B/%f %B/classification.config
-%%DATADIR%%/classification.config
-@unexec if [ -f %B/reference.config ] && cmp -s %B/reference.config %B/reference.config-sample; then rm -f %B/reference.config; fi
-%%DATADIR%%/reference.config-sample
-@exec [ -f %B/reference.config ] || cp %B/%f %B/reference.config
-@dirrmtry %%DATADIR%%/rules
-@dirrm %%DATADIR%%