summaryrefslogtreecommitdiff
path: root/network
diff options
context:
space:
mode:
Diffstat (limited to 'network')
-rw-r--r--network/psad/README15
-rw-r--r--network/psad/psad.SlackBuild6
-rw-r--r--network/psad/psad.info8
-rw-r--r--network/psad/slack-desc7
4 files changed, 25 insertions, 11 deletions
diff --git a/network/psad/README b/network/psad/README
index 524336af61..86f9ea698c 100644
--- a/network/psad/README
+++ b/network/psad/README
@@ -25,3 +25,18 @@ iptables -A INPUT -j LOG
iptables -A INPUT -j DROP
please see documentation for more information.
+
+NOTE:
+psad requires several perl modules:
+perl-Bit-Vector
+perl-Date-Calc
+perl-IPTables-Parse
+perl-IPTables-ChainMgr
+perl-NetAddr-IP
+perl-Unix-Syslog
+
+these are included in sources, so you don't need to install them.
+But if you get some weird perl modules errors, you must uninstall
+previous psad version before bulding new one.
+Alternatively you can manually install this modules, all are available
+on SlacBuilds.
diff --git a/network/psad/psad.SlackBuild b/network/psad/psad.SlackBuild
index d60dcdf5a7..b3f4cb6da5 100644
--- a/network/psad/psad.SlackBuild
+++ b/network/psad/psad.SlackBuild
@@ -2,7 +2,7 @@
# Slackware build script for psad
-# Copyright 2017 Boris V. <david.cla2@gmail.com>
+# Copyright 2017 davjohn <david.cla2@gmail.com>
# All rights reserved.
#
# Redistribution and use of this script, with or without modification, is
@@ -23,7 +23,7 @@
# ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
PRGNAM=psad
-VERSION=${VERSION:-2.4.3}
+VERSION=${VERSION:-2.4.4}
BUILD=${BUILD:-1}
TAG=${TAG:-_SBo}
ALERTSEMAIL=${ALERTSEMAIL:-root@localhost}
@@ -61,7 +61,7 @@ Would you like psad to only parse specific strings in iptables messages:
FW search strings: psad;
First is it ok to leave the HOME_NET setting as any: y;
Would you like to enable DShield alerts: n;
-Would you like to install the latest signatures from http www cipherdyne org psad signatures: n;
+Would you like to install the latest signatures from http www cipherdyne org psad signatures: y;
Enable psad at boot time: n;
EOF
find -L . \
diff --git a/network/psad/psad.info b/network/psad/psad.info
index f9f1912075..bb71b3fd52 100644
--- a/network/psad/psad.info
+++ b/network/psad/psad.info
@@ -1,10 +1,10 @@
PRGNAM="psad"
-VERSION="2.4.3"
+VERSION="2.4.4"
HOMEPAGE="http://www.cipherdyne.org/psad/"
-DOWNLOAD="http://www.cipherdyne.org/psad/download/psad-2.4.3.tar.bz2"
-MD5SUM="a0e51465ec662b4725a7018a9d2cda61"
+DOWNLOAD="http://www.cipherdyne.org/psad/download/psad-2.4.4.tar.bz2"
+MD5SUM="d11f0385c413c90f1722c1c213a6f955"
DOWNLOAD_x86_64=""
MD5SUM_x86_64=""
REQUIRES=""
-MAINTAINER="Boris V."
+MAINTAINER="davjohn"
EMAIL="david.cla2@gmail.com"
diff --git a/network/psad/slack-desc b/network/psad/slack-desc
index 9624bb23c7..007143d490 100644
--- a/network/psad/slack-desc
+++ b/network/psad/slack-desc
@@ -10,10 +10,9 @@ psad: psad (Intrusion Detection and Log Analysis with iptables)
psad:
psad: psad is a collection of three lightweight system daemons (two main
psad: daemons and one helper daemon) that run on Linux machines and analyze
-psad: iptables log messages to detect port scans and other suspicious
-psad: traffic.
-psad: A typical deployment is to run psad on the iptables firewall where
-psad: it has the fastest access to log data.
+psad: iptables log messages to detect port scans and other suspicious.
+psad: traffic. A typical deployment is to run psad on the iptables firewall
+psad: where it has the fastest access to log data.
psad:
psad: Homepage: http://www.cipherdyne.org/psad/
psad: