diff options
author | dougb <dougb@FreeBSD.org> | 2011-10-10 00:57:06 +0800 |
---|---|---|
committer | dougb <dougb@FreeBSD.org> | 2011-10-10 00:57:06 +0800 |
commit | 281200d132d609858875c597158648cb7b17f8ea (patch) | |
tree | 96ad09954d6393032e6e77484b5cb68f89dd7079 /security | |
parent | de987d189cf9a165ad1c2150e2ebe58b4dea8644 (diff) | |
download | freebsd-ports-gnome-281200d132d609858875c597158648cb7b17f8ea.tar.gz freebsd-ports-gnome-281200d132d609858875c597158648cb7b17f8ea.tar.zst freebsd-ports-gnome-281200d132d609858875c597158648cb7b17f8ea.zip |
Remove security/snort_inline:
Does not build properly, no longer supported upstream
PR: ports/161410
Approved by: maintainer
Diffstat (limited to 'security')
-rw-r--r-- | security/Makefile | 1 | ||||
-rw-r--r-- | security/snort_inline/Makefile | 124 | ||||
-rw-r--r-- | security/snort_inline/distinfo | 2 | ||||
-rw-r--r-- | security/snort_inline/files/snort.sh.in | 37 | ||||
-rw-r--r-- | security/snort_inline/pkg-descr | 8 | ||||
-rw-r--r-- | security/snort_inline/pkg-message | 24 | ||||
-rw-r--r-- | security/snort_inline/pkg-plist | 55 |
7 files changed, 0 insertions, 251 deletions
diff --git a/security/Makefile b/security/Makefile index 271fa1f31632..3aa2ca1416a0 100644 --- a/security/Makefile +++ b/security/Makefile @@ -792,7 +792,6 @@ SUBDIR += snoopy SUBDIR += snort SUBDIR += snort-rep - SUBDIR += snort_inline SUBDIR += snortreport SUBDIR += snortsam SUBDIR += snortsms diff --git a/security/snort_inline/Makefile b/security/snort_inline/Makefile deleted file mode 100644 index efba74fdbfe6..000000000000 --- a/security/snort_inline/Makefile +++ /dev/null @@ -1,124 +0,0 @@ -#/ New ports collection makefile for: snort_inline -# Date created: 4 March 2005 -# Whom: nick@rogness.net -# -# $FreeBSD$ -# - -PORTNAME= snort_inline -PORTVERSION= 2.6.1.5 -CATEGORIES= security -MASTER_SITES= http://freebsd.rogness.net/ports/snort_inline/ - -MAINTAINER= nick@rogness.net -COMMENT= An inline IPS system based on snort using ipfw - -LIB_DEPENDS= pcre.0:${PORTSDIR}/devel/pcre - -GNU_CONFIGURE= yes -CONFIGURE_ARGS+= --enable-inline --enable-ipfw - -LIB_DEPENDS+= dnet:${PORTSDIR}/net/libdnet - -USE_LDCONFIG= yes - -OPTIONS= MYSQL "With MySQL support" off \ - ODBC "With ODBC support" off \ - POSTGRESQL "With POSTGRESQL support" off \ - FLEXRESP "With flexible responses (resp. w/packet resets)" off - -BROKEN= this port does not build properly -DEPRECATED= no longer supported upstream -EXPIRATION_DATE= 2011/09/04 - -.include <bsd.port.pre.mk> - -.if defined(WITH_MYSQL) -USE_MYSQL= yes -CONFIGURE_ARGS+= --with-mysql=${LOCALBASE} -.else -CONFIGURE_ARGS+= --with-mysql=no -.endif - -.if defined(WITH_ODBC) -LIB_DEPENDS+= odbc.1:${PORTSDIR}/databases/unixODBC -CONFIGURE_ARGS+= --with-odbc=${LOCALBASE} -LDFLAGS+= ${PTHREAD_LIBS} -.else -CONFIGURE_ARGS+= --with-odbc=no -.endif - -.if defined(WITH_POSTGRESQL) -USE_PGSQL= yes -CONFIGURE_ARGS+= --with-postgresql=${LOCALBASE} -.if exists(/usr/lib/libssl.a) && exists(/usr/lib/libcrypto.a) -LDFLAGS+= -lssl -lcrypto -.endif -.else -CONFIGURE_ARGS+= --with-postgresql=no -.endif - -.if defined(WITH_FLEXRESP) -LIBNET_CONFIG?= ${LOCALBASE}/bin/libnet10-config - -.if exists(${LIBNET_CONFIG}) -LIBNET_CFLAGS!= ${LIBNET_CONFIG} --cflags -LIBNET_LIBS!= ${LIBNET_CONFIG} --libs -LIBNET_INCDIR= ${LIBNET_CFLAGS:M-I*:S/-I//} -LIBNET_LIBDIR= ${LIBNET_LIBS:M-L*:S/-L//} -.endif - -BUILD_DEPENDS+= ${LIBNET_CONFIG}:${PORTSDIR}/net/libnet10 -CONFIGURE_ARGS+= --enable-flexresp \ - --with-libnet-includes=${LIBNET_INCDIR} \ - --with-libnet-libraries=${LIBNET_LIBDIR} -.endif - -MAN8= snort.8 snort_inline.8 -DOCS= ChangeLog doc/AUTHORS doc/BUGS doc/CREDITS doc/faq* doc/NEWS \ - doc/README* doc/TODO doc/USAGE doc/*.pdf - -RULE_PATH= ${DATADIR}/rules - -USE_RC_SUBR= snort.sh - -post-patch: - ${REINPLACE_CMD} "s,%%PREFIX%%,${PREFIX}," ${WRKSRC}/src/snort.c - ${REINPLACE_CMD} "s,/etc/snort_inline/drop-rules,${RULE_PATH}," ${WRKSRC}/etc/snort_inline.conf - ${REINPLACE_CMD} "s,$RULE_PATH/classification.config,${DATADIR}/classification.config," ${WRKSRC}/etc/snort_inline.conf - ${REINPLACE_CMD} "s,$RULE_PATH/reference.config,${DATADIR}/reference.config," ${WRKSRC}/etc/snort_inline.conf - ${REINPLACE_CMD} -e "s/^unicode.map/\/usr\/local\/share\/snort_inline\/unicode.map/" ${WRKSRC}/etc/snort_inline.conf -.if defined(WITH_FLEXRESP) - ${REINPLACE_CMD} -e 's|libnet-config|${LIBNET_CONFIG}|g' ${WRKSRC}/configure -.endif - -post-install: - @${MKDIR} ${DATADIR} - @${MKDIR} ${RULE_PATH} - ${INSTALL_DATA} ${WRKSRC}/etc/classification.config \ - ${DATADIR}/classification.config-sample - [ -f ${DATADIR}/classification.config ] || \ - ${CP} ${DATADIR}/classification.config-sample \ - ${DATADIR}/classification.config - ${INSTALL_DATA} ${WRKSRC}/etc/reference.config \ - ${DATADIR}/reference.config-sample - [ -f ${DATADIR}/reference.config ] || \ - ${CP} ${DATADIR}/reference.config-sample ${DATADIR}/reference.config - ${INSTALL_DATA} ${WRKSRC}/etc/threshold.conf \ - ${DATADIR}/threshold.conf-sample - [ -f ${DATADIR}/threshold.conf ] || \ - ${CP} ${DATADIR}/threshold.conf-sample ${DATADIR}/threshold.conf - ${INSTALL_DATA} ${WRKSRC}/etc/unicode.map \ - ${DATADIR}/unicode.map -.for f in snort.conf snort_inline.conf - ${INSTALL_DATA} ${WRKSRC}/etc/${f} ${PREFIX}/etc/${f}-sample - [ -f ${PREFIX}/etc/${f} ] || \ - ${INSTALL_DATA} ${WRKSRC}/etc/${f} ${PREFIX}/etc/${f} -.endfor -.if !defined(NOPORTDOCS) - @${MKDIR} ${DOCSDIR} - cd ${WRKSRC} && ${INSTALL_DATA} ${DOCS} ${DOCSDIR} -.endif - @${CAT} ${PKGMESSAGE} - -.include <bsd.port.post.mk> diff --git a/security/snort_inline/distinfo b/security/snort_inline/distinfo deleted file mode 100644 index 531fcf50b1b4..000000000000 --- a/security/snort_inline/distinfo +++ /dev/null @@ -1,2 +0,0 @@ -SHA256 (snort_inline-2.6.1.5.tar.gz) = 5831643c211d45539ad9442690e084559fcd8625a973976c813813acf5c5b6db -SIZE (snort_inline-2.6.1.5.tar.gz) = 4232674 diff --git a/security/snort_inline/files/snort.sh.in b/security/snort_inline/files/snort.sh.in deleted file mode 100644 index 5522b6fbd2d9..000000000000 --- a/security/snort_inline/files/snort.sh.in +++ /dev/null @@ -1,37 +0,0 @@ -#!/bin/sh - -# $FreeBSD$ - -# PROVIDE: snort -# REQUIRE: DAEMON -# BEFORE: LOGIN -# KEYWORD: shutdown - -# Add the following lines to /etc/rc.conf to enable snort: -# snort_enable (bool): Set to YES to enable snort -# Default: NO -# snort_flags (str): Extra flags passed to snort -# Default: -Dq -J 8000 -# snort_interface (str): Network interface to sniff -# Default: "" -# snort_conf (str): Snort configuration file -# Default: ${PREFIX}/etc/snort_inline.conf -# - -. /etc/rc.subr - -name="snort" -rcvar=`set_rcvar` - -command="%%PREFIX%%/bin/snort_inline" - -load_rc_config $name - -[ -z "$snort_enable" ] && snort_enable="NO" -[ -z "$snort_conf" ] && snort_conf="%%PREFIX%%/etc/snort_inline.conf" -[ -z "$snort_flags" ] && snort_flags="-Dq -J 8000" - -[ -n "$snort_interface" ] && snort_flags="$snort_flags -i $snort_interface" -[ -n "$snort_conf" ] && snort_flags="$snort_flags -c $snort_conf" - -run_rc_command "$1" diff --git a/security/snort_inline/pkg-descr b/security/snort_inline/pkg-descr deleted file mode 100644 index 7ead26910606..000000000000 --- a/security/snort_inline/pkg-descr +++ /dev/null @@ -1,8 +0,0 @@ -snort-inline is a variation of snort that interfaces with the -IPFW firewall and divert sockets to provide a simple IPS system -using snort signatures. - -WWW: http://freebsd.rogness.net/snort_inline - -- Nick Rogness -nick@rogness.net diff --git a/security/snort_inline/pkg-message b/security/snort_inline/pkg-message deleted file mode 100644 index 17bd6382d2ba..000000000000 --- a/security/snort_inline/pkg-message +++ /dev/null @@ -1,24 +0,0 @@ - *********************************** - * !!!!!!!!!!! WARNING !!!!!!!!!!! * - *********************************** - -snort_inline uses rcNG startup scripts and must be enabled via /etc/rc.conf - -Available variables: - - snort_enable (bool): Set to YES to enable snort - Default: NO - snort_flags (str): Extra flags passed to snort - Default: -Dq -J 8000 - snort_interface (str): Network interface to sniff - Default: "" - snort_conf (str): Snort configuration file - Default: ${PREFIX}/etc/snort_inline.conf - -Also, make sure that your kernel is compiled with: - - options IPFIREWALL - options IPDIVERT - -The default divert port is 8000. See http://freebsd.rogness.net/snort_inline -for more information. diff --git a/security/snort_inline/pkg-plist b/security/snort_inline/pkg-plist deleted file mode 100644 index 1304bfebc148..000000000000 --- a/security/snort_inline/pkg-plist +++ /dev/null @@ -1,55 +0,0 @@ -bin/snort_inline -@unexec if [ -f %D/etc/snort.conf ] && cmp -s %D/etc/snort.conf %D/etc/snort.conf-sample; then rm -f %D/etc/snort.conf; fi -etc/snort.conf-sample -@exec [ -f %B/snort.conf ] || cp %B/%f %B/snort.conf -@unexec if [ -f %D/etc/snort_inline.conf ] && cmp -s %D/etc/snort_inline.conf %D/etc/snort_inline.conf-sample; then rm -f %D/etc/snort_inline.conf; fi -etc/snort_inline.conf-sample -@exec [ -f %B/snort_inline.conf ] || cp %B/%f %B/snort_inline.conf -@unexec if [ -f %B/unicode.map ] && cmp -s %B/unicode.map %B/unicode.map-sample; then rm -f %B/etc/unicode.map; fi -%%DATADIR%%/unicode.map -@exec [ -f %B/unicode.map ] || cp %B/%f %B/unicode.map -@unexec if [ -f %B/threshold.conf ] && cmp -s %B/threshold.conf %B/threshold.conf-sample; then rm -f %B/threshold.conf; fi -%%DATADIR%%/threshold.conf-sample -@exec [ -f %B/threshold.conf ] || cp %B/%f %B/threshold.conf -%%PORTDOCS%%%%DOCSDIR%%/AUTHORS -%%PORTDOCS%%%%DOCSDIR%%/BUGS -%%PORTDOCS%%%%DOCSDIR%%/CREDITS -%%PORTDOCS%%%%DOCSDIR%%/ChangeLog -%%PORTDOCS%%%%DOCSDIR%%/faq.pdf -%%PORTDOCS%%%%DOCSDIR%%/faq.tex -%%PORTDOCS%%%%DOCSDIR%%/NEWS -%%PORTDOCS%%%%DOCSDIR%%/README -%%PORTDOCS%%%%DOCSDIR%%/README.INLINE -%%PORTDOCS%%%%DOCSDIR%%/README.FLEXRESP -%%PORTDOCS%%%%DOCSDIR%%/README.PLUGINS -%%PORTDOCS%%%%DOCSDIR%%/README.UNSOCK -%%PORTDOCS%%%%DOCSDIR%%/README.WIN32 -%%PORTDOCS%%%%DOCSDIR%%/README.alert_order -%%PORTDOCS%%%%DOCSDIR%%/README.csv -%%PORTDOCS%%%%DOCSDIR%%/README.database -%%PORTDOCS%%%%DOCSDIR%%/README.event_queue -%%PORTDOCS%%%%DOCSDIR%%/README.flow -%%PORTDOCS%%%%DOCSDIR%%/README.flowbits -%%PORTDOCS%%%%DOCSDIR%%/README.flow-portscan -%%PORTDOCS%%%%DOCSDIR%%/README.sfportscan -%%PORTDOCS%%%%DOCSDIR%%/README.asn1 -%%PORTDOCS%%%%DOCSDIR%%/README.http_inspect -%%PORTDOCS%%%%DOCSDIR%%/README.thresholding -%%PORTDOCS%%%%DOCSDIR%%/README.wireless -%%PORTDOCS%%%%DOCSDIR%%/README.NFQUEUE -%%PORTDOCS%%%%DOCSDIR%%/README.clamav -%%PORTDOCS%%%%DOCSDIR%%/README.frag3 -%%PORTDOCS%%%%DOCSDIR%%/TODO -%%PORTDOCS%%%%DOCSDIR%%/USAGE -%%PORTDOCS%%%%DOCSDIR%%/snort_manual.pdf -%%PORTDOCS%%%%DOCSDIR%%/snort_schema_v106.pdf -%%PORTDOCS%%@dirrm %%DOCSDIR%% -@unexec if [ -f %B/classification.config ] && cmp -s %B/classification.config %B/classification.config-sample; then rm -f %B/classification.config; fi -%%DATADIR%%/classification.config-sample -@exec [ -f %B/classification.config ] || cp %B/%f %B/classification.config -%%DATADIR%%/classification.config -@unexec if [ -f %B/reference.config ] && cmp -s %B/reference.config %B/reference.config-sample; then rm -f %B/reference.config; fi -%%DATADIR%%/reference.config-sample -@exec [ -f %B/reference.config ] || cp %B/%f %B/reference.config -@dirrmtry %%DATADIR%%/rules -@dirrm %%DATADIR%% |