Search
j0ke.net Open Build Service
>
Projects
>
ha
:
firewall
>
fwsnort
> fwsnort-nobuildreqs.spec
Sign Up
|
Log In
Username
Password
Cancel
Overview
Repositories
Revisions
Requests
Users
Advanced
Attributes
Meta
File fwsnort-nobuildreqs.spec of Package fwsnort (Revision 2)
Currently displaying revision
2
,
show latest
%define name fwsnort %define version 1.6.2 %define release 1 %define fwsnortlibdir %_libdir/%name %define fwsnortlogdir /var/log/fwsnort ### get the first @INC directory that includes the string "linux". ### This may be 'i386-linux', or 'i686-linux-thread-multi', etc. %define fwsnortmoddir `perl -e '$path='i386-linux'; for (@INC) { if($_ =~ m|.*/(.*linux.*)|) {$path = $1; last; }} print $path'` Summary: Fwsnort translates Snort rules into equivalent iptables rules Name: %name Version: %version Release: %release License: GPL Group: System/Servers Url: http://www.cipherdyne.org/fwsnort/ Source: %name-%version.tar.bz2 BuildRoot: %_tmppath/%{name}-buildroot Requires: iptables #Prereq: rpm-helper %description fwsnort translates Snort rules into equivalent iptables rules and generates a Bourne shell script that implements the resulting iptables commands. This ruleset allows network traffic that exhibits Snort signatures to be logged and/or dropped by iptables directly without putting any interface into promiscuous mode or queuing packets from kernel to user space. In addition, fwsnort (optionally) uses the IPTables::Parse module to parse the iptables ruleset on the machine to determine which Snort rules are applicable to the specific iptables policy. After all, if iptables is blocking all inbound http traffic from external addresses, it is probably not of much use to try detecting inbound attacks against against tcp/80. By default fwsnort generates iptables rules that log Snort sid's with --log-prefix to klogd where the messages can be analyzed with a log watcher such as logwatch or psad (see http://www.cipherdyne.org/psad). fwsnort relies on the iptables string match module to match Snort content fields in the application portion of ip traffic. Since Snort rules can contain hex data in content fields, fwsnort implements a patch against iptables-1.2.7a which adds a "--hex-string" option which will accept content fields such as "|0d0a5b52504c5d3030320d0a|". fwsnort is able to translate approximately 60% of all rules from the Snort-2.3.3 IDS into equivalent iptables rules. For more information about the translation strategy as well as advantages/disadvantages of the method used by fwsnort to obtain intrusion detection data, see the README included with the fwsnort sources or browse to: http://www.cipherdyne.org/fwsnort/ %prep [ "$RPM_BUILD_ROOT" != "/" ] && rm -rf $RPM_BUILD_ROOT %setup -q cd deps cd IPTables-Parse && perl Makefile.PL PREFIX=%fwsnortlibdir LIB=%fwsnortlibdir cd .. cd Net-IPv4Addr && perl Makefile.PL PREFIX=%fwsnortlibdir LIB=%fwsnortlibdir cd ../.. %build ### build perl modules used by fwsnort cd deps make OPTS="$RPM_OPT_FLAGS" -C IPTables-Parse make OPTS="$RPM_OPT_FLAGS" -C Net-IPv4Addr cd .. %install ### config directory ### log directory mkdir -p $RPM_BUILD_ROOT%fwsnortlogdir ### fwsnort module dirs mkdir -p $RPM_BUILD_ROOT%fwsnortlibdir/%fwsnortmoddir/auto/Net/IPv4Addr mkdir -p $RPM_BUILD_ROOT%fwsnortlibdir/%fwsnortmoddir/auto/IPTables/Parse mkdir -p $RPM_BUILD_ROOT%fwsnortlibdir/auto/Net/IPv4Addr mkdir -p $RPM_BUILD_ROOT%fwsnortlibdir/Net mkdir -p $RPM_BUILD_ROOT%fwsnortlibdir/IPTables mkdir -p $RPM_BUILD_ROOT%_bindir mkdir -p $RPM_BUILD_ROOT%{_mandir}/man8 mkdir -p $RPM_BUILD_ROOT%_sbindir ### fwsnort config mkdir -p $RPM_BUILD_ROOT%_sysconfdir/%name install -m 500 fwsnort $RPM_BUILD_ROOT%_sbindir/ install -m 644 fwsnort.conf $RPM_BUILD_ROOT%_sysconfdir/%name/ install -m 644 fwsnort.8 $RPM_BUILD_ROOT%{_mandir}/man8/ ### install perl modules used by fwsnort cd deps install -m 444 Net-IPv4Addr/blib/lib/auto/Net/IPv4Addr/autosplit.ix $RPM_BUILD_ROOT%fwsnortlibdir/auto/Net/IPv4Addr/autosplit.ix install -m 444 Net-IPv4Addr/blib/lib/Net/IPv4Addr.pm $RPM_BUILD_ROOT%fwsnortlibdir/Net/IPv4Addr.pm install -m 444 IPTables-Parse/blib/lib/IPTables/Parse.pm $RPM_BUILD_ROOT%fwsnortlibdir/IPTables/Parse.pm cd .. ### install snort rules files cp -r deps/snort_rules $RPM_BUILD_ROOT%_sysconfdir/%name %clean [ "$RPM_BUILD_ROOT" != "/" ] && rm -rf $RPM_BUILD_ROOT %pre ### not used %post ### not used %preun ### not used %files %defattr(-,root,root) %dir %fwsnortlogdir %_sbindir/* %{_mandir}/man8/* %dir %_sysconfdir/%name %config(noreplace) %_sysconfdir/%name/fwsnort.conf %dir %_sysconfdir/%name/snort_rules %config(noreplace) %_sysconfdir/%name/snort_rules/* %_libdir/%name %changelog * Thu Aug 11 2011 Michael Rash <mbr@cipherydne.org> - fwsnort-1.6.1 release * Wed Jul 27 2011 Michael Rash <mbr@cipherydne.org> - fwsnort-1.6 release * Sat Jan 08 2011 Michael Rash <mbr@cipherydne.org> - fwsnort-1.5 release * Tue Jan 05 2010 Michael Rash <mbr@cipherydne.org> - fwsnort-1.1 release * Sat May 29 2009 Michael Rash <mbr@cipherydne.org> - Added the "BuildRequires: perl-ExtUtils-MakeMaker" statement. - fwsnort-1.0.6 release * Thu Aug 21 2008 Michael Rash <mbr@cipherydne.org> - Updated to use the deps/ directory for all perl module sources. - fwsnort-1.0.5 release * Tue Jan 22 2008 Michael Rash <mbr@cipherydne.org> - fwsnort-1.0.4 release * Thu Nov 22 2007 Michael Rash <mbr@cipherydne.org> - fwsnort-1.0.3 release * Sun Aug 26 2007 Michael Rash <mbr@cipherydne.org> - fwsnort-1.0.2 release * Sun Aug 26 2007 Michael Rash <mbr@cipherydne.org> - fwsnort-1.0.1 release * Thu Apr 19 2007 Michael Rash <mbr@cipherydne.org> - fwsnort-1.0 release * Fri Mar 22 2007 Michael Rash <mbr@cipherydne.org> - fwsnort-0.9.0 release * Sat Feb 17 2007 Michael Rash <mbr@cipherydne.org> - fwsnort-0.8.2 release * Mon Sep 04 2006 Michael Rash <mbr@cipherydne.org> - Updated to install new IPTables::Parse module out of the IPTables-Parse directory. - Removed smtpdaemon requirement since fwsnort does not deal with email. * Fri Nov 11 2005 Michael Rash <mbr@cipherydne.org> - Initial RPM release