Clone from server:monitoring OBS project
This commit is contained in:
23
.gitattributes
vendored
Normal file
23
.gitattributes
vendored
Normal file
@@ -0,0 +1,23 @@
|
||||
## Default LFS
|
||||
*.7z filter=lfs diff=lfs merge=lfs -text
|
||||
*.bsp filter=lfs diff=lfs merge=lfs -text
|
||||
*.bz2 filter=lfs diff=lfs merge=lfs -text
|
||||
*.gem filter=lfs diff=lfs merge=lfs -text
|
||||
*.gz filter=lfs diff=lfs merge=lfs -text
|
||||
*.jar filter=lfs diff=lfs merge=lfs -text
|
||||
*.lz filter=lfs diff=lfs merge=lfs -text
|
||||
*.lzma filter=lfs diff=lfs merge=lfs -text
|
||||
*.obscpio filter=lfs diff=lfs merge=lfs -text
|
||||
*.oxt filter=lfs diff=lfs merge=lfs -text
|
||||
*.pdf filter=lfs diff=lfs merge=lfs -text
|
||||
*.png filter=lfs diff=lfs merge=lfs -text
|
||||
*.rpm filter=lfs diff=lfs merge=lfs -text
|
||||
*.tbz filter=lfs diff=lfs merge=lfs -text
|
||||
*.tbz2 filter=lfs diff=lfs merge=lfs -text
|
||||
*.tgz filter=lfs diff=lfs merge=lfs -text
|
||||
*.ttf filter=lfs diff=lfs merge=lfs -text
|
||||
*.txz filter=lfs diff=lfs merge=lfs -text
|
||||
*.whl filter=lfs diff=lfs merge=lfs -text
|
||||
*.xz filter=lfs diff=lfs merge=lfs -text
|
||||
*.zip filter=lfs diff=lfs merge=lfs -text
|
||||
*.zst filter=lfs diff=lfs merge=lfs -text
|
1
.gitignore
vendored
Normal file
1
.gitignore
vendored
Normal file
@@ -0,0 +1 @@
|
||||
.osc
|
3
_service
Normal file
3
_service
Normal file
@@ -0,0 +1,3 @@
|
||||
<services>
|
||||
<service name="download_files" mode="manual" />
|
||||
</services>
|
BIN
suricata-7.0.8.tar.gz
(Stored with Git LFS)
Normal file
BIN
suricata-7.0.8.tar.gz
(Stored with Git LFS)
Normal file
Binary file not shown.
BIN
suricata-7.0.8.tar.gz.sig
Normal file
BIN
suricata-7.0.8.tar.gz.sig
Normal file
Binary file not shown.
538
suricata.changes
Normal file
538
suricata.changes
Normal file
@@ -0,0 +1,538 @@
|
||||
-------------------------------------------------------------------
|
||||
Wed Jan 15 16:47:35 UTC 2025 - Eyad Issa <eyadlorenzo@gmail.com>
|
||||
|
||||
- Added suricata-devel package
|
||||
- Added libsuricata package
|
||||
* Enable shared library build
|
||||
|
||||
- Use pkgconfig to find build dependencies
|
||||
- Remove coccinelle build dependency
|
||||
|
||||
- Only build with XDP/eBPF support when available
|
||||
- Only build with libmagic/libnet support when available
|
||||
|
||||
- Update to version 7.0.8:
|
||||
* Various security, performance, accuracy, and stability issues
|
||||
have been fixed.
|
||||
* This release addresses CVE IDs:
|
||||
~ CVE-2024-55627: CRITICAL
|
||||
~ CVE-2024-55605: CRITICAL
|
||||
~ CVE-2024-55629: HIGH
|
||||
~ CVE-2024-55628: HIGH
|
||||
~ CVE-2024-55626: LOW
|
||||
|
||||
- Update to version 7.0.7:
|
||||
* LibHTP has been updated to version 0.5.49
|
||||
* Various security, performance, accuracy, and stability issues
|
||||
have been fixed.
|
||||
* This release addresses CVE IDs:
|
||||
~ CVE-2024-45797: CRITICAL
|
||||
~ CVE-2024-47187: CRITICAL
|
||||
~ CVE-2024-47188: CRITICAL
|
||||
~ CVE-2024-47522: HIGH
|
||||
~ CVE-2024-45795: HIGH
|
||||
~ CVE-2024-45796: HIGH
|
||||
|
||||
- Update to version 7.0.6
|
||||
* Various security, performance, accuracy, and stability issues
|
||||
have been fixed.
|
||||
* JA4 for TLS and QUIC has been backported to Suricata 7.0.6.
|
||||
* These releases address CVE IDs:
|
||||
~ CVE-2024-37151: CRITICAL
|
||||
~ CVE-2024-38536: HIGH
|
||||
~ CVE-2024-38534: HIGH
|
||||
~ CVE-2024-38535: CRITICAL
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Mon Jul 15 17:54:13 UTC 2024 - Eyad Issa <eyadlorenzo@gmail.com>
|
||||
|
||||
- Depend on vectorscan, as hyperscan has gone closed source
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Sat Jun 22 18:38:38 UTC 2024 - Eyad Issa <eyadlorenzo@gmail.com>
|
||||
|
||||
- Update to version 7.0.5
|
||||
* LibHTP has been updated to version 0.5.48. This version is
|
||||
bundled with these new Suricata releases.
|
||||
* Suricata-Update has been updated to 1.3.3 in Suricata 7.0.5.
|
||||
* Various security, performance, accuracy, and stability issues
|
||||
have been fixed.
|
||||
https://redmine.openinfosecfoundation.org/versions/206
|
||||
* These releases address CVE IDs:
|
||||
~ CVE-2024-32663 - Critical severity
|
||||
~ CVE-2024-32664 - High severity
|
||||
~ CVE-2024-32867 - Moderate severity
|
||||
|
||||
- Update to version 7.0.4
|
||||
* Various security, performance, accuracy, and stability issues
|
||||
have been fixed.
|
||||
https://redmine.openinfosecfoundation.org/versions/202
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Mon Feb 19 07:26:30 UTC 2024 - Otto Hollmann <otto.hollmann@suse.com>
|
||||
|
||||
- Update to version 7.0.3
|
||||
* LibHTP required version is 0.5.46. This is the version that is bundled
|
||||
with the releases.
|
||||
* Various security, performance, accuracy, and stability issues have been fixed.
|
||||
https://redmine.openinfosecfoundation.org/versions/200
|
||||
* These releases address CVE IDs:
|
||||
- CVE-2024-23839 - Critical severity
|
||||
- CVE-2024-23836 - Critical severity
|
||||
- CVE-2024-23835 - High severity
|
||||
- CVE-2024-24568 - Moderate severity
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Thu Oct 19 17:24:49 UTC 2023 - Otto Hollmann <otto.hollmann@suse.com>
|
||||
|
||||
- Update to version 7.0.2
|
||||
* Various security, performance, accuracy, and stability issues have been fixed.
|
||||
https://redmine.openinfosecfoundation.org/versions/198
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Mon Sep 25 07:04:49 UTC 2023 - Otto Hollmann <otto.hollmann@suse.com>
|
||||
|
||||
- Update to version 7.0.1
|
||||
* LibHTP required version is 0.5.45. This is the version that is bundled
|
||||
with the release.
|
||||
* Various security, performance, accuracy, and stability issues have been
|
||||
fixed.
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Thu Jul 27 08:44:46 UTC 2023 - Otto Hollmann <otto.hollmann@suse.com>
|
||||
|
||||
- Update to version 7.0.0
|
||||
* Main features:
|
||||
- DPDK IDS/IPS 35 support for primary mode was added
|
||||
- AF_XDP IDS 17support by Richard McConnell at Rapid7
|
||||
- HTTP/HTTP2 new keywords for header inspection
|
||||
- TLS: client certificate logging and detection
|
||||
- Bittorrent parser by Aaron Bungay
|
||||
- IPS: new default DROP behavior for exception policies 7
|
||||
- EVE documented and validated with a json schema
|
||||
- HTTP/2 support is no longer considered experimental
|
||||
- NETMAP API 14
|
||||
- Conditional PCAP 43 by Eric Leblond and Scott Jordan
|
||||
- Initial libsuricata support
|
||||
- VLAN support extended from 2 to 3 layers
|
||||
* Performance improvements:
|
||||
- file.data MPM split per app protocol
|
||||
- New lighter rule profiling mode by Eric Leblond
|
||||
- SMB: many fixes and optimizations
|
||||
- Hash calculation using Rust crypto instead of NSS
|
||||
- Flow manager tuning
|
||||
- Many more performance-related counters
|
||||
- Stream buffer, which is used by stream engine, file tracking, and more, is more memory efficient
|
||||
* Secure Deployment / Security
|
||||
- Linux Landlock support added by Eric Leblond
|
||||
- Use of setrlimit to prevent Suricata from creating another process
|
||||
- Lock cargo crates
|
||||
- Default to secure settings for Datasets and Lua
|
||||
- Maximum number of transactions for several protocols
|
||||
- New Security Policies: https://github.com/OISF/suricata/blob/master/SECURITY.md 15
|
||||
* Protocols
|
||||
- QUICv1, GQUIC support added. GQUIC contributed by Emmanuel Thompson
|
||||
- PostgreSQL support added
|
||||
- HTTP/2 deflate decompression, byte-ranges support
|
||||
- VN-Tag support
|
||||
- Modbus rewritten to Rust with Eve logging added by Simon Dugas
|
||||
- IKEv1 support added by Sascha Steinbiss and Frank Honza
|
||||
- ESP flow tracking and logging
|
||||
- Minimal telnet parser
|
||||
- Active flow and TCP counters
|
||||
- Network service header
|
||||
- Remove dependency on system’s /etc/protocols
|
||||
* Rules
|
||||
- Added new rule keywords for DHCP, Kerberos, SNMP, TLS, QUIC
|
||||
- JA3(s) support for QUIC
|
||||
- New (experimental) class of keywords through “frames API”: NFS, SMB, DNS, telnet, SSL/TLS
|
||||
- HTTP request files and NFS now support file.data
|
||||
- “XOR” transform was added
|
||||
- Lua: access to more rule info
|
||||
- The byte_test, byte_math, and byte_jump keywords allow a variable name for the byte count value.
|
||||
- flow.age keyword was added
|
||||
* IPS
|
||||
- Exception Policies added to better control packet handling in such conditions as memory caps being hit
|
||||
- DPDK support
|
||||
* Socket Control
|
||||
- Get flow stats over Unix socket
|
||||
- Datasets management commands were added
|
||||
* Output
|
||||
- Conditional packet capture allows packets to be written to disk only after an alert has been triggered
|
||||
- New “stream” eve output type for debugging the stream engine
|
||||
- Log engine verdict on rejected/dropped/passed packets
|
||||
* Dev corner
|
||||
- Total: 1375 files changed, 130027 insertions(+), 127626 deletions(-)
|
||||
- Rust: 173 files changed, 39279 insertions(+), 13830 deletions(-)
|
||||
- C: 978 files changed, 73882 insertions(+), 109446 deletions(-)
|
||||
- Docs: 142 files changed, 6636 insertions(+), 1890 deletions(-)
|
||||
- Much stricter C compiler flags.
|
||||
- Clang’s scan-build clean, which is enforced in CI.
|
||||
- CI was expanded.
|
||||
- Rust parsers upgraded to using Nom 7
|
||||
* Upgrade notes:
|
||||
- Suricata 7.0 now uses pcre2 instead of pcre1.
|
||||
- The MSRV (minimum supported Rust version) has been updated to 1.63.0 from 1.41.1 minimum in Suricata 6.0.
|
||||
- Support for Prelude (libprelude) has been removed
|
||||
- Suricata 7.0 requires and bundles libhtp 0.5.45
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue Jun 20 07:16:17 UTC 2023 - Otto Hollmann <otto.hollmann@suse.com>
|
||||
|
||||
- Update to version 6.0.13
|
||||
* LibHTP has been updated to 0.5.44. This is a required version that is
|
||||
bundled with the release.
|
||||
* Security #6119: datasets: absolute path in rules can overwrite arbitrary
|
||||
files (6.0.x backport)
|
||||
* Bug #6138: Decode-events of IPv6 packets are not triggered
|
||||
(6.0.x backport)
|
||||
* Bug #6136: suricata-update: dump-sample-configs: configuration files not
|
||||
found (6.0.x backport)
|
||||
* Bug #6125: http2: cpu overconsumption in rust moving/memcpy in
|
||||
http2_parse_headers_blocks (6.0.x backport)
|
||||
* Bug #6113: ips: txs still logged for dropped flow (6.0.x backport)
|
||||
* Bug #6056: smtp: long line discard logic should be separate for server and
|
||||
client (6.0.x backport)
|
||||
* Bug #6055: ftp: long line discard logic should be separate for server and
|
||||
client (6.0.x backport)
|
||||
* Bug #5990: smtp: any command post a long command gets skipped
|
||||
(6.0.x backport)
|
||||
* Bug #5982: smtp: Long DATA line post boundary is capped at 4k Bytes
|
||||
(6.0.x backport)
|
||||
* Bug #5809: smb: convert transaction list to vecdeque (6.0.x backport)
|
||||
* Bug #5604: counters: tcp.syn, tcp.synack, tcp.rst depend on flow
|
||||
(6.0.x backport)
|
||||
* Bug #5550: dns: allow dns messages with invalid opcodes (6.0.x backport)
|
||||
* Task #5984: libhtp 0.5.44 (6.0.x backport)
|
||||
* Documentation #6134: userguide: add instructions/explanation for
|
||||
(not) running suricata with root (6.0.x backport)
|
||||
* Documentation #6121: datasets: 6.0.x work-arounds for dataset supply chain
|
||||
attacks
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed May 10 07:15:41 UTC 2023 - Otto Hollmann <otto.hollmann@suse.com>
|
||||
|
||||
- Update to version 6.0.12
|
||||
* Various performance, accuracy, and stability issues have been fixed.
|
||||
* Remove legacy pfring install guide
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Fri Apr 21 12:28:37 UTC 2023 - Otto Hollmann <otto.hollmann@suse.com>
|
||||
|
||||
- Update to version 6.0.11
|
||||
* LibHTP has been updated to 0.5.43. This is a required version that is
|
||||
bundled with the release.
|
||||
* Various security, performance, accuracy, and stability issues have been
|
||||
fixed.
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Thu Feb 9 21:50:04 UTC 2023 - Otto Hollmann <otto.hollmann@suse.com>
|
||||
|
||||
- Update to version 6.0.10
|
||||
Various security, performance, accuracy, and stability issues have been fixed
|
||||
https://forum.suricata.io/t/suricata-6-0-10-released/3175/2
|
||||
* Security #5804: Suricata crashes while processing FTP (6.0.x backport)
|
||||
* Bug #5815: detect: config keyword prevents tx cleanup (6.0.x backport)
|
||||
* Bug #5812: nfs: debug validation triggered on nfs2 read
|
||||
* Bug #5810: smb/ntlmssp: parser incorrectly assumes fixed field order
|
||||
(6.0.x backport)
|
||||
* Bug #5806: exceptions: midstream flows are dropped if
|
||||
midstream=true && stream.midstream-policy=drop-flow (6.0.x backport)
|
||||
* Bug #5796: TLS Handshake Fragments not Reassembled (6.0.x backport)
|
||||
* Bug #5795: detect/udp: different detection from rules when UDP/TCP header is
|
||||
broken (6.0.x backport)
|
||||
* Bug #5793: decode: Padded packet to minimal Ethernet length marked with
|
||||
invalid length event (6.0.x backport)
|
||||
* Bug #5791: smb: unbounded file chunk queuing after gap (6.0.x backport)
|
||||
* Bug #5763: libbpf: Use of legacy code in eBPF/XDP programs (6.0.x backport)
|
||||
* Bug #5762: detect/pcre: JIT not disabled when OS doesn't allow RWX pages
|
||||
* Bug #5760: nfs: ASSERT: attempt to subtract with overflow (compound)
|
||||
(6.0.x backport)
|
||||
* Bug #5749: iprep/ipv6: warning issued on valid reputation input
|
||||
(6.0.x backport)
|
||||
* Bug #5744: netmap: 6.0.9 v14 backport causes known packet stalls from v14
|
||||
implementation in "legacy" mode too
|
||||
* Bug #5738: smb: failed assertion
|
||||
(!((f->alproto == ALPROTO_SMB && txd->files_logged != 0))),
|
||||
function CloseFile, file output-file.c (6.0.x backport)
|
||||
* Bug #5735: smtp: quoted-printable encoding skips empty lines in files
|
||||
(6.0.x backport)
|
||||
* Bug #5723: eve: missing common fields like community id for some event types
|
||||
like RFB
|
||||
* Bug #5601: detect: invalid hex character in content leads to bad debug
|
||||
message (6.0.x backport)
|
||||
* Bug #5565: Excessive qsort/msort time when large number of rules using
|
||||
tls.fingerprint (6.0.x backport)
|
||||
* Bug #5299: YAML warning from default config on 6.0.5
|
||||
* Optimization #5797: tls: support incomplete API to replace internal buffering
|
||||
* Optimization #5790: smb: set defaults for file chunk limits (6.0.x backport)
|
||||
- add dependency libhtp >= 0.5.42
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue Nov 29 18:46:25 UTC 2022 - Michael Ströder <michael@stroeder.com>
|
||||
|
||||
- Update to version 6.0.9
|
||||
Various security, performance, accuracy and stability issues have been fixed
|
||||
https://forum.suricata.io/t/suricata-6-0-9-released/3012
|
||||
- build now requires libhtp >= 0.5.42
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Mon Oct 3 11:41:34 UTC 2022 - Martin Hauke <mardnh@gmx.de>
|
||||
|
||||
- Use hyperscan-devel instead of 'pkgconfig(libhs)' to prevent:
|
||||
"unresolvable: have choice for pkgconfig(libhs): hyperscan-devel
|
||||
vectorscan-devel"
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Sep 28 08:06:06 UTC 2022 - Michael Ströder <michael@stroeder.com>
|
||||
|
||||
- Update to version 6.0.8
|
||||
https://forum.suricata.io/t/suricata-6-0-8-released/2808
|
||||
https://forum.suricata.io/t/suricata-6-0-7-released/2807
|
||||
https://forum.suricata.io/t/suricata-6-0-6-and-5-0-10-released/2637
|
||||
- build now requires libhtp >= 0.5.41
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue Jun 28 12:13:10 UTC 2022 - Otto Hollmann <otto.hollmann@suse.com>
|
||||
|
||||
- Copy config files and update rules
|
||||
- Add python3-PyYAML as dependency for suricata-update
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue Jun 28 11:58:29 UTC 2022 - Otto Hollmann <otto.hollmann@suse.com>
|
||||
|
||||
- Update to version 6.0.5
|
||||
https://forum.suricata.io/t/suricata-6-0-5-and-5-0-9-released/2415
|
||||
- LibHTP has been updated to 0.5.40. This is a required version that
|
||||
is bundled with both releases.
|
||||
- Suricata-Update, as bundled with 6.0.5, was updated to 1.2.4.
|
||||
- Various security, performance, accuracy and stability issues have
|
||||
been fixed.
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue Jan 25 15:09:22 UTC 2022 - Hans-Peter Jansen <hpj@urpla.net>
|
||||
|
||||
- Update to version 6.0.4:
|
||||
https://forum.suricata.io/t/suricata-6-0-4-and-5-0-8-released/1942
|
||||
- Add luajit build conditional
|
||||
- More man pages
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Mon Nov 9 11:56:06 UTC 2020 - Hans-Peter Jansen <hpj@urpla.net>
|
||||
|
||||
- Update to version 6.0.0:
|
||||
https://suricata-ids.org/2020/10/08/suricata-6-0-0-released/
|
||||
Upgrade notes:
|
||||
https://suricata.readthedocs.io/en/latest/upgrade.html
|
||||
- Add new dependencies, most notably: rust, cargo
|
||||
- Change geoip to maxminddb:
|
||||
https://build.opensuse.org/package/view_file/openSUSE:Leap:15.2/GeoIP/README.SUSE
|
||||
- Disable prelude support: currently broken
|
||||
https://redmine.openinfosecfoundation.org/issues/4065
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue Apr 28 17:51:33 UTC 2020 - Martin Hauke <mardnh@gmx.de>
|
||||
|
||||
- Switch to python3
|
||||
- Update to version 4.1.8
|
||||
* Bug #3492: Backport 4 BUG_ON(strcasecmp(str, “any”) in
|
||||
DetectAddressParseString
|
||||
* Bug #3508: rule parsing: memory leaks
|
||||
* Bug #3527: 4.1.x Kerberos vulnerable to TCP splitting evasion
|
||||
* Bug #3533: Skip over ERF_TYPE_META records
|
||||
* Bug #3551: file logging: complete files sometimes marked
|
||||
‘TRUNCATED’
|
||||
* Bug #3572: rust: smb compile warnings
|
||||
* Bug #3579: Faulty signature with two threshold keywords does
|
||||
not generate an error and never match
|
||||
* Bug #3581: random failures on sip and http-evader
|
||||
suricata-verify tests
|
||||
* Bug #3596: ftp: asan detects leaks of expectations
|
||||
* Bug #3599: rules: memory leaks in pktvar keyword
|
||||
* Bug #3601: rules: bad address block leads to stack exhaustion
|
||||
* Bug #3603: rules: crash on ‘internal’-only keywords
|
||||
* Bug #3605: rules: missing ‘consumption’ of transforms
|
||||
before pkt_data would lead to crash
|
||||
* Bug #3607: rules: minor memory leak involving
|
||||
pcre_get_substring
|
||||
* Bug #3608: ssl/tls: ASAN issue in SSLv3ParseHandshakeType
|
||||
* Bug #3611: defrag: asan issue
|
||||
* Bug #3633: file-store.stream-depth not working as expected
|
||||
when configured to a specfic value (4.1.x)
|
||||
* Bug #3645: Invalid memory read on malformed rule with Lua
|
||||
script
|
||||
* Bug #3647: rules: memory leaks on failed rules
|
||||
* Bug #3648: CIDR Parsing Issue
|
||||
* Bug #3650: FTP response buffering against TCP stream
|
||||
* Bug #3652: Recursion stack-overflow in parsing YAML
|
||||
configuration
|
||||
* Bug #3659: Multiple DetectEngineReload and bad insertion
|
||||
into linked list lead to buffer overflow
|
||||
* Bug #3666: FTP: Incorrect ftp_memuse calculation.
|
||||
* Bug #3668: Signature with an IP range creates one
|
||||
IPOnlyCIDRItem by signe IP address
|
||||
* Bug #3671: Protocol detection evasion by packet splitting
|
||||
* Bug #3676: Segfault on SMTP TLS
|
||||
* Feature #3482: GRE ERSPAN Type 1 Support
|
||||
* Task #3479: libhtp 0.5.33 (4.1.x)
|
||||
* Task #3513: SMTP should place restraints on variable length
|
||||
items (e.g., filenames)
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Feb 19 20:27:13 UTC 2020 - Martin Hauke <mardnh@gmx.de>
|
||||
|
||||
- Update to 4.1.7
|
||||
* Bug #3417: –disable-geoip does not work
|
||||
* Bug #3448: Suricata 4.1 Seg Fault: Socket Control pcap-file
|
||||
and corrupt pcap
|
||||
* Bug #3452: smb: post-GAP file tx handling
|
||||
* Bug #3453: coverity: CID 1456680: Incorrect expression
|
||||
(IDENTICAL_BRANCHES)
|
||||
* Bug #3470: gcc10: compilation failure unless -fcommon is
|
||||
supplied
|
||||
* Bug #3471: nfs: post-GAP some transactions never close
|
||||
* Bug #3472: nfs: post-GAP file tx handling
|
||||
* Bug #3474: Dropping privileges does not work with NFLOG
|
||||
- Update to 4.1.6
|
||||
* Bug #3276: address parsing: memory leak in error path
|
||||
* Bug #3278: segfault when test a nfs pcap file
|
||||
* Bug #3279: ikev2 enabled in config even if Rust is disabled
|
||||
* Bug #3325: lua issues on arm (fedora:29)
|
||||
* Bug #3326: Static build with pcap fails
|
||||
* Bug #3327: tcp: empty SACK option leads to decoder event
|
||||
* Bug #3347: BPF filter on command line not honored for pcap
|
||||
file
|
||||
* Bug #3355: DNS: DNS over TCP transactions logged with wrong
|
||||
direction.
|
||||
* Bug #3356: DHCP: Slow down over time due to lack of detect
|
||||
flags
|
||||
* Bug #3369: byte_extract does not work in some situations
|
||||
* Bug #3385: fast-log: icmp type prints wrong value
|
||||
* Bug #3387: suricata is logging tls log repeatedly if custom
|
||||
mode is enabled
|
||||
* Bug #3388: TLS Lua output does not work without TLS log
|
||||
* Bug #3391: Suricata is unable to get MTU from NIC after
|
||||
* Bug #3393: http: pipelining tx id handling broken
|
||||
* Bug #3394: TCP evasion technique by overlapping a TCP segment
|
||||
with a fake packet
|
||||
* Bug #3395: TCP evasion technique by faking a closed TCP sessionl
|
||||
* Bug #3402: smb: post-GAP some transactions never close
|
||||
* Bug #3403: smb1: ‘event only’ transactions for bad requests
|
||||
never close
|
||||
* Bug #3404: smtp: file tracking issues when more than one
|
||||
attachment in a tx
|
||||
* Bug #3405: Filehash rule does not fire without filestore
|
||||
keyword
|
||||
* Bug #3410: intermittent abort()s at shutdown and in unix-socket
|
||||
* Bug #3412: detect/asn1: crashes on packets smaller than offset
|
||||
setting
|
||||
* Task #3367: configure: Rust 1.37+ has cargo-vendor support
|
||||
bundled into cargo
|
||||
* Bundle Suricata-Update 1.0.6
|
||||
* Bundle Libhtp 0.5.32
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue Oct 22 09:24:31 UTC 2019 - Lars Vogdt <lars@linux-schulserver.de>
|
||||
|
||||
- Update to 4.1.5
|
||||
* Feature #3068: protocol parser: vxlan (4.1.x)
|
||||
* Bug #2841: False positive alerts firing after upgrade suricata 3.0 -> 4.1.0 (4.1.x)
|
||||
* Bug #2966: filestore (v1 and v2): dropping of “unwanted” files (4.1.x)
|
||||
* Bug #3008: rust: updated libc crate causes depration warnings (4.1.x)
|
||||
* Bug #3044: tftp: missing logs because of broken tx handling (4.1.x)
|
||||
* Bug #3067: GeoIP keyword depends on now discontinued legacy GeoIP database (4.1.x)
|
||||
* Bug #3094: Fedora rawhide af-packet compilation err (4.1.x)
|
||||
* Bug #3123: bypass keyword: Suricata 4.1.x Segmentation Faults (4.1.x)
|
||||
* Bug #3129: Fixes warning about size of integers in string formats (4.1.x)
|
||||
* Bug #3159: SC_ERR_PCAP_DISPATCH with message “error code -2” upon rule reload completion (4.1.x)
|
||||
* Bug #3164: Suricata 4.1.4: NSS Shutdown triggers crashes in test mode
|
||||
* Bug #3168: tls: out of bounds read
|
||||
* Bug #3170: defrag: out of bounds read
|
||||
* Bug #3173: ipv4: ts field decoding oob read
|
||||
* Bug #3175: File_data inspection depth while inspecting base64 decoded data (4.1.x)
|
||||
* Bug #3184: decode/der: crafted input can lead to resource starvation
|
||||
* Bug #3186: Multiple Content-Length headers causes HTP_STREAM_ERROR (4.1.x)
|
||||
* Bug #3187: GET/POST HTTP-request with no Content-Length, http_client_body miss (4.1.x)
|
||||
- build with lz4 and lzma support, especially to enable compression
|
||||
- require python-yaml during build, which results in suricate-update
|
||||
get's build and installed. This allows to update local
|
||||
Suricata rules
|
||||
- package /var/log/suricata directory instead of creating it during
|
||||
post-installation of the package
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue May 14 09:35:39 UTC 2019 - Robert Frohl <rfrohl@suse.com>
|
||||
|
||||
- Update to version 4.1.4
|
||||
* CVE-2019-10053: ssh: heap buffer overflow (boo#1134993)
|
||||
* CVE-2019-10050: mpls: heapbuffer overflow in file decode-mpls.c (boo#1134991)
|
||||
* decode-ethernet: heapbuffer overflow in file decode-ethernet.c
|
||||
* smb 1 create andx request does not parse the filename correctly
|
||||
* rust/dhcp: panic in dhcp parser
|
||||
* mpls: cast of misaligned data leads to undefined behavior
|
||||
* rust/ftp: panic in ftp parser
|
||||
* rust/nfs: integer underflow
|
||||
* This release includes Suricata-Update 1.0.5
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Thu Mar 7 21:31:14 UTC 2019 - Martin Hauke <mardnh@gmx.de>
|
||||
|
||||
- Update to version 4.0.7
|
||||
* Failed Assertion, Suricata Abort - util-mpm-hs.c line 163
|
||||
* unix runmode deadlock when using too many threads
|
||||
* rule reload with workers mode and NFQUEUE not working stable
|
||||
* TCP FIN/ACK, RST/ACK in HTTP - detection bypass
|
||||
* afpacket doesn't wait for all capture threads to start
|
||||
* DNS Golden Transaction ID - detection bypass
|
||||
* Invalid detect-engine config could lead to segfault
|
||||
* suricata.c ConfigGetCaptureValue - PCAP/AFP fallthrough to
|
||||
strip_trailing_plus
|
||||
* Stats interval are 1 second too early each tick
|
||||
* rust/dns/lua - The Lua calls for DNS values when using Rust
|
||||
don't behave the same as the C implementation.
|
||||
* out of bounds read in detection
|
||||
* smtp: improve pipelining support
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Sun Dec 16 19:44:13 UTC 2018 - mardnh@gmx.de
|
||||
|
||||
- Use pkg-config style build dependencies
|
||||
- Build with support for Hyperscan
|
||||
- Add systemd service file
|
||||
- Add logrotate configuration file
|
||||
- Update to version 4.0.6
|
||||
* smtp segmentation fault (4.0.x)
|
||||
* negated fileext and filename do not work as expected (4.0.x)
|
||||
* filemd5 is not fired in some cases when there are invalid packets
|
||||
* File descriptor leak in af-packet mode (4.0.x)
|
||||
* Improve errors handling in AF_PACKET (4.0.x)
|
||||
* Support http events - Weird unicode characters and truncation in
|
||||
some of http_method/http_user_agent fields.
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue Jul 24 11:52:06 UTC 2018 - kbabioch@suse.com
|
||||
|
||||
- Applied spec-cleaner
|
||||
- Removed gpg-offline, since we have GPG source validation by default now
|
||||
- Update to 4.0.5
|
||||
- Bug fixes
|
||||
- Private Suricata stops inspecting TCP stream if a TCP RST was met (4.0.x)
|
||||
(CVE-2018-14568 bsc#1102334)
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue Oct 4 23:06:57 UTC 2016 - Greg.Freemyer@gmail.com
|
||||
|
||||
- update to v3.1.2
|
||||
- Fixed an issue with the handling of ICMPv4 error packets (CVE-2016-10728 bsc#1102402)
|
||||
- build with libprelude suppport
|
||||
- use libnetfilter_queue, libnfnetlink from the Factory repo instead of 5 year old versions
|
||||
- use libhtp from server:monitoring
|
||||
- run through spec-cleaner
|
||||
- Still don't have man pages or user manual in the RPM
|
||||
- http://redmine.openinfosecfoundation.org/projects/suricata/wiki/Suricata_User_Guide
|
||||
- change license to GPL-2.0
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Fri Feb 12 08:28:27 UTC 2016 - christoph@stop.pe
|
||||
|
||||
- Initial release
|
66
suricata.keyring
Normal file
66
suricata.keyring
Normal file
@@ -0,0 +1,66 @@
|
||||
-----BEGIN PGP PUBLIC KEY BLOCK-----
|
||||
Version: GnuPG v1
|
||||
|
||||
mQENBEuZEHsBCADO5F3HXKc0hEj71eH6yQZcRLawgQRKVfcEt3o7/tQG6aQBb2uH
|
||||
7Eb8IhepHVYTVpd0OCMP1VsAsVk+9BEd4d8Jkxhw7I+MycOoUnwLV1QSlfrDcG88
|
||||
K+1reGWYHuF+vPyAnnu49sBuSiUI/XWl2CsL/grFhpZ3IJ59PxIuua2j5r+FavZJ
|
||||
A2E3+Grig5oJ3NZL1UZBweWsXD3H/lg+/Uistdw21Vfr+qt0pUxTqtCuGEF2/xqO
|
||||
lRqYYlXyUr+cGkMwXJNMFeqNM19dtTKXaN0lhCUYkp2QfOLuCTS1prQvtZwoonkt
|
||||
VoYC6rtY78/bwBjmPo3UYQ2T/NQMWvvmQ9zfABEBAAG0KU9JU0YgPHJlbGVhc2Vz
|
||||
QG9wZW5pbmZvc2VjZm91bmRhdGlvbi5vcmc+iQE8BBMBAgAmBQJLmRB7AhsDBQkJ
|
||||
Zq1FBgsJCAcDAgQVAggDBBYCAwECHgECF4AACgkQowxDHQUcwmHyswf+MrpAbbkl
|
||||
i5A1tZMKl+OPsnlDIDjr7dcfJgnjLvlfpzLX0z6wgDQxzGrx/71ERhrYoGYQpdot
|
||||
wLOWnqI5alkMrRx7M/13mUVrNtq6RRFvJw//57PGD8KwT8dmHcp2hXg9THidJN8k
|
||||
bLTHx9uKAnIrvEi5CH7twMkrZrDl2QLqOS0091SwPFNvxd67Y4yDI0LFWdE1WYfi
|
||||
ufY5iOn+r9cDWqV4Djq4yc9q0TIgI28axuZG/RrzUnHuYTIk6xGxlvoX7uY6rUxK
|
||||
bz3gE5zhxfOKc7r4vRFG+rSwl7oETzVSJuriCGocQvmf53SS/J7VKt36awr0yTWc
|
||||
FbKVXpVMI/n6qZkCDQRVShboARAArmKAMDQG6ow9TH+cn9PACQ28IX4LB+rDLM9Z
|
||||
57iZ+qumU+pNaKNyqFCp7BMbzYgPHc42CpCm4nuezf/N597OX9d2qyUBZ7XjZHjW
|
||||
Fy9Qto/IKxk630mjYSOtkJRpMi4+rGgtEfLdkoOIppMDbqYiVLdoxvBE7o1txs4d
|
||||
WkdvNex2Yn6enmCe2O384EtpwTgGraNNd275tEdRxO+V+bfuLLXzAfDgwDCOr2WL
|
||||
gwqobm+6hirXSSd4KX+Oec1oW/w+/D20eSRxDmWcxfRqRD9Ymi6UkvHk2joV+91D
|
||||
iEgPcw2gURBqgPOajK+ePmXorPmks0ONZ8F45zObmX1Vd+Brhir30zLk9iVF8aCo
|
||||
Emi71GIf038pUi0C9mSPfq6oC9g9uXaNkYxKISOThEhJL/EY7lOVjruj5aLxCIfW
|
||||
fBkHDnFfHCEym3XnWhHD2ODjee/dB95JwRbycK3ot8ayOKG7h7ha8XLONNnQIOhL
|
||||
sme7jFWx9BV6+SbeuOsorYB14QNlb3Huce0BxFCtBSvEcgDC4S370jEjNdZwFTBK
|
||||
g0sYpgMUnry1xZWu/jpyRQUmBHHPmmKFk1rNPP3iWmQVyWPguIFIq878bDnp6oVB
|
||||
CciISzhVjh46W73U/EsKW6EFUslntePcLpOhZXQnkFRbbZFHBbH8w5+vZo6u94v3
|
||||
Ok+W740AEQEAAbRQT3BlbiBJbmZvcm1hdGlvbiBTZWN1cml0eSBGb3VuZGF0aW9u
|
||||
IChPSVNGKSA8cmVsZWFzZXNAb3BlbmluZm9zZWNmb3VuZGF0aW9uLm9yZz6JAj4E
|
||||
EwECACgFAlVKFugCGwMFCQlmAYAGCwkIBwMCBhUIAgkKCwQWAgMBAh4BAheAAAoJ
|
||||
EPf5sKMAwbcNm1gP/Ag+/fN2g+A8aNGNa4BzV++VkK4J+xfFGZU5r1b8HA7nqqFW
|
||||
AKbzsneq8WN6CpnKOe6ViACs887yyy1blM/EJSqAIOiCk0j62fmI438n2CpzqvoA
|
||||
0KCcqW4Z+Pk2a+TqDKkzeIrNueAif1ulVm2IYj5nP663iFNSgmm0G39Cwf6UkIlj
|
||||
FkSBAZ1/ZQU5hKKzXueZ1C+KotSsUBuQi4Kqm6lOoATeRmogLOyj2b5SwHQ7UlP7
|
||||
xtCJ74ZmmElwDeEEUMypTPZWWJGdg4hfcSZIzu6guSchz2KtDsUwHSOLF2Tqk6sa
|
||||
ATTb+CI9DUvIRvZSr1mBUK/5tqLXUsev2kJRFuHq5podUccV2fBQfumOlrW1aDtW
|
||||
7gV1njoBq2eUFXy2P2CmX23IZIBKL3vhPqtCk+cjt0tIPmf04TyCpKnCJXcl0eQv
|
||||
AsjgII8o5xsQuIEXSz4h0cJEcG6/bOfel2YOFPyaxo6epTIMROgMgxNLaHovOJ67
|
||||
w2DEpHLdjKTkfcs/luMG0HLzsXkZkOLfjsMcNQd7YDQrFWgXO8sdsTgfapQN53mX
|
||||
oHvpv9oh1qz++UHY40sri2/qAdYkEkFIqiLkCyIxvAzfbV2c0ATD/iZn8CWvaGQ3
|
||||
tRsu4CqKe1RGjyBxCL9/6F8NtJMP17onuZaonegcLyZOXNWQ1xuqPrjdIao2uQIN
|
||||
BFVKFugBEADUWxulJqxv24DG6MyfwgIuNkBWAm57qzeihmnk6ciVaVqejfCs3tOK
|
||||
Tw+NT7gQUGwxmQL5A12MVbkxF34NE+i+wY835mBE2bkJWh1vKhQ2/XcoHG59ypvq
|
||||
hHUi5Ay+yhe0xbflWNqWJ0dXAFywKqikqklKBQKPG6eSP6EH0GUBGKZoDSQ0hvJa
|
||||
FiOooExrd4XUClDG4pKQiF/qTK4x76a2LEXAehDUTvBYkDTvXm7Dsve+jr+gf9qq
|
||||
4fx00vtdER2Sat9elTQA22Vp8aniK7ZGuP1spFQ7UFRLlr/jEemUxYB+heQx70EE
|
||||
C9Ci8PNTT1Cl+6tvCY8JzHFMw0465VJERpDeWtJxzDkMGcmWAUe0DGgwtF22BKaa
|
||||
zuPamHEOOz5Rfi9eWGFresf53+mbOW57kYRE5u81cU1/9g/9fr/xAMNoofJYv3xa
|
||||
NOXEbM5KOwqHkCSVAKJnYXgb1jcI9k7U+xeYYFHbZvC9cQi0Ueb6Po4lZZWplYr/
|
||||
u9Ud1igs8vNDeEczv6pgKNk2OA5pluBlSJpC7gDl1sKrOeiUqO0jGtq3KdtgYL3e
|
||||
A/Dq3kRrweFaFyDn3itJkkQ9yD4u6vHtxg86NSv0ehdrmzuQuOZXduD+IkhBYytB
|
||||
idmXje1v1DHyQdXujDnBbyV5wpYApPqSFClkL+HtcY0vuXkLPvVauQARAQABiQIl
|
||||
BBgBAgAPBQJVShboAhsMBQkJZgGAAAoJEPf5sKMAwbcNluoQAKczHnLkyxxbg22D
|
||||
Ig/Y4pTBmGGpsMbpzxdZVMHoUBpitg0Kr9yBSwv8gp0QnjGCMboe4gBwl6U3TQVr
|
||||
enMqtugI2FlN1qlvFCRCn8B17O1PnVI6nAQpnmDARxXNqOSXQFVKSd+xa+HMepWU
|
||||
k/gS7Vc1P72735ZL3CoUPowPV6zFA30ge4gjZ7YEZdRuUQGYpakYP+CS0/5X6H9d
|
||||
chM4K1vSsI41/65rSAwGRipyNxHvKjgOY3z6ToZdJ9TarhNSo2frrRoDcxcKec0n
|
||||
hdNg6bfSR4i3vdLkjZOpyA6VUshb+pGeeEHcK9W3MS545T/upUv5+CbewkKdeZ/R
|
||||
8ZhHpwT3nXWr/u4e/+K2oSPZSqxh2U1T1Ev//PGUlYzFMDLz7f9dGN6zoxkMyjk9
|
||||
uSpUPKizgktypbhJN7fcxn9I642KaEU11WlK3KhPScSERNGeyXwEcomHwHeTdVUJ
|
||||
BReuQumgcsIteZi+ZZn5HucdrMjeHR6oK6ZPitfDxKhw0uOncLWhQlPzYiN0qTGU
|
||||
P+lf2M2TvEABMCDCusKXTbTmNqzPwnCTpu/EDtR2wCLhscVZEcMmKTV5NztKOwng
|
||||
AotAq1bna49yQ6AwjeCcXwLOC4gAWdAK/NSgJTeHlTBijWZExGEQ7xM3veauWBu+
|
||||
AKIh+yqMDlNK+8k1+LmLy2hdF4Tx
|
||||
=2RRz
|
||||
-----END PGP PUBLIC KEY BLOCK-----
|
13
suricata.logrotate
Normal file
13
suricata.logrotate
Normal file
@@ -0,0 +1,13 @@
|
||||
/var/log/suricata/*.log /var/log/suricata/*.json
|
||||
{
|
||||
nocompress
|
||||
maxage 30
|
||||
rotate 99
|
||||
dateext
|
||||
missingok
|
||||
create
|
||||
sharedscripts
|
||||
postrotate
|
||||
systemctl reload suricata.service
|
||||
endscript
|
||||
}
|
20
suricata.service
Normal file
20
suricata.service
Normal file
@@ -0,0 +1,20 @@
|
||||
[Unit]
|
||||
Description=Suricata Intrusion Detection and Prevention Tool
|
||||
Documentation=man:suricata(1)
|
||||
After=network.target
|
||||
|
||||
[Service]
|
||||
EnvironmentFile=-/etc/sysconfig/suricata
|
||||
ExecStart=/usr/bin/suricata -c /etc/suricata/suricata.yaml $SURICATA_OPTIONS
|
||||
ExecReload=/bin/kill -HUP $MAINPID
|
||||
Restart=on-failure
|
||||
PrivateTmp=yes
|
||||
ProtectHome=yes
|
||||
ProtectSystem=yes
|
||||
ProtectSystem=full
|
||||
ProtectKernelTunables=yes
|
||||
ProtectControlGroups=yes
|
||||
ProtectKernelModules=yes
|
||||
|
||||
[Install]
|
||||
WantedBy=multi-user.target
|
263
suricata.spec
Normal file
263
suricata.spec
Normal file
@@ -0,0 +1,263 @@
|
||||
#
|
||||
# spec file for package suricata
|
||||
#
|
||||
# Copyright (c) 2025 SUSE LLC
|
||||
#
|
||||
# All modifications and additions to the file contributed by third parties
|
||||
# remain the property of their copyright owners, unless otherwise agreed
|
||||
# upon. The license for this file, and modifications and additions to the
|
||||
# file, is the same license as for the pristine package itself (unless the
|
||||
# license for the pristine package is not an Open Source License, in which
|
||||
# case the license is the MIT License). An "Open Source License" is a
|
||||
# license that conforms to the Open Source Definition (Version 1.9)
|
||||
# published by the Open Source Initiative.
|
||||
|
||||
# Please submit bugfixes or comments via https://bugs.opensuse.org/
|
||||
#
|
||||
|
||||
|
||||
%define soname 7_0_8
|
||||
|
||||
# Handling libxdp support
|
||||
%if (0%{?suse_version} <= 1500) && (0%{?sle_version} <= 150500) && (0%{?is_opensuse})
|
||||
%bcond_with xdp_bpf
|
||||
%else
|
||||
%bcond_without xdp_bpf
|
||||
%endif
|
||||
|
||||
# Handling libmagic and libnet support
|
||||
%if (0%{?suse_version} <= 1500) && (0%{?sle_version} <= 150600) && (0%{?is_opensuse})
|
||||
%ifarch aarch64
|
||||
%bcond_with libmagic
|
||||
%bcond_with libnet
|
||||
%else
|
||||
%bcond_without libmagic
|
||||
%bcond_without libnet
|
||||
%endif
|
||||
%else
|
||||
%bcond_without libmagic
|
||||
%bcond_without libnet
|
||||
%endif
|
||||
|
||||
# vectorscan (libhs) doesn't support 32-bit ARM or x86
|
||||
%ifnarch %{ix86} %{arm}
|
||||
%bcond_without libhs
|
||||
%else
|
||||
%bcond_with libhs
|
||||
%endif
|
||||
|
||||
# Disable luajit by default
|
||||
%bcond_without luajit
|
||||
Name: suricata
|
||||
Version: 7.0.8
|
||||
Release: 0
|
||||
Summary: Open Source Next Generation Intrusion Detection and Prevention Engine
|
||||
License: GPL-2.0-only
|
||||
URL: https://www.openinfosecfoundation.org/
|
||||
Source0: https://www.openinfosecfoundation.org/download/suricata-%{version}.tar.gz
|
||||
Source1: https://www.openinfosecfoundation.org/download/suricata-%{version}.tar.gz.sig
|
||||
Source2: suricata.service
|
||||
Source3: suricata.sysconfig
|
||||
Source4: suricata.logrotate
|
||||
BuildRequires: cargo
|
||||
BuildRequires: chrpath
|
||||
BuildRequires: pkgconfig
|
||||
BuildRequires: python3
|
||||
BuildRequires: python3-PyYAML
|
||||
BuildRequires: python3-setuptools
|
||||
BuildRequires: rust >= 1.63.0
|
||||
BuildRequires: systemd-rpm-macros
|
||||
BuildRequires: pkgconfig(hiredis)
|
||||
BuildRequires: pkgconfig(htp) >= 0.5.46
|
||||
BuildRequires: pkgconfig(jansson)
|
||||
BuildRequires: pkgconfig(libcap-ng)
|
||||
BuildRequires: pkgconfig(libevent)
|
||||
BuildRequires: pkgconfig(liblz4)
|
||||
BuildRequires: pkgconfig(liblzma)
|
||||
BuildRequires: pkgconfig(libmaxminddb)
|
||||
BuildRequires: pkgconfig(libnetfilter_log)
|
||||
BuildRequires: pkgconfig(libnetfilter_queue)
|
||||
BuildRequires: pkgconfig(libnfnetlink)
|
||||
BuildRequires: pkgconfig(libpcap)
|
||||
BuildRequires: pkgconfig(libpcre2-8)
|
||||
BuildRequires: pkgconfig(nspr)
|
||||
BuildRequires: pkgconfig(nss)
|
||||
BuildRequires: pkgconfig(yaml-0.1)
|
||||
BuildRequires: pkgconfig(zlib)
|
||||
Requires: python3-PyYAML
|
||||
Requires: pkgconfig(htp) >= 0.5.46
|
||||
Requires(pre): %fillup_prereq
|
||||
Recommends: jq
|
||||
Recommends: logrotate
|
||||
%{?systemd_requires}
|
||||
%if %{with libmagic}
|
||||
%if 0%{?suse_version} >= 1600
|
||||
BuildRequires: pkgconfig(libmagic)
|
||||
%else
|
||||
BuildRequires: file-devel
|
||||
%endif
|
||||
%endif
|
||||
%if 0%{with libnet}
|
||||
%if 0%{?suse_version} >= 1600
|
||||
BuildRequires: pkgconfig(libnet)
|
||||
%else
|
||||
BuildRequires: libnet-devel
|
||||
%endif
|
||||
%endif
|
||||
%if 0%{with xdp_bpf}
|
||||
BuildRequires: pkgconfig(libbpf)
|
||||
BuildRequires: pkgconfig(libxdp)
|
||||
%endif
|
||||
%if 0%{with luajit}
|
||||
BuildRequires: pkgconfig(luajit)
|
||||
%else
|
||||
BuildRequires: pkgconfig(lua)
|
||||
%endif
|
||||
%if 0%{with libhs}
|
||||
BuildRequires: pkgconfig(libhs)
|
||||
%endif
|
||||
|
||||
%description
|
||||
The Suricata Engine is an Open Source Next Generation Intrusion Detection and
|
||||
Prevention Engine. This engine is not intended to just replace or emulate the
|
||||
existing tools in the industry, but will bring new ideas and technologies to
|
||||
the field.
|
||||
|
||||
OISF is part of and funded by the Department of Homeland Security's Directorate
|
||||
for Science and Technology HOST program (Homeland Open Security Technology), by
|
||||
the the Navy's Space and Naval Warfare Systems Command (SPAWAR), as well as
|
||||
through the very generous support of the members of the OISF Consortium. More
|
||||
information about the Consortium is available, as well as a list of our current
|
||||
Consortium Members.
|
||||
|
||||
%package -n libsuricata%{soname}
|
||||
Summary: Open Source Next Generation Intrusion Detection and Prevention Engine Library
|
||||
Group: Development/Libraries/C and C++
|
||||
|
||||
%description -n libsuricata%{soname}
|
||||
The Suricata Engine is an Open Source Next Generation Intrusion Detection and
|
||||
Prevention Engine.
|
||||
|
||||
This package contains the shared library.
|
||||
|
||||
%package devel
|
||||
Summary: Development files for the Suricata engine library
|
||||
Requires: libsuricata%{soname} = %{version}
|
||||
Requires: pkgconfig(jansson)
|
||||
Requires: pkgconfig(libmagic)
|
||||
|
||||
%description devel
|
||||
The Suricata Engine is an Open Source Next Generation Intrusion Detection and
|
||||
Prevention Engine.
|
||||
|
||||
This package contains the development files for the Suricata engine library.
|
||||
|
||||
%prep
|
||||
%setup -q
|
||||
# Fix path in manpage
|
||||
sed -i 's|%{_prefix}/local||g' doc/userguide/suricata.1
|
||||
sed -i '/^#!\//, 1d' python/suricata/sc/suricatasc.py
|
||||
|
||||
%build
|
||||
export HAVE_PYTHON=%{_bindir}/python3
|
||||
|
||||
%configure \
|
||||
--enable-gccmarch-native=no \
|
||||
--enable-shared \
|
||||
--enable-nflog \
|
||||
--with-libnetfilter_log-includes=`pkg-config libnetfilter_log --variable=includedir` \
|
||||
--enable-nfqueue \
|
||||
--enable-gccprotect \
|
||||
--enable-old-barnyard2 \
|
||||
--enable-non-bundled-htp \
|
||||
--enable-geoip \
|
||||
%if 0%{with luajit}
|
||||
--enable-luajit \
|
||||
%else
|
||||
--enable-lua \
|
||||
%endif
|
||||
%if 0%{with libhs}
|
||||
--enable-hyperscan \
|
||||
%endif
|
||||
--enable-hiredis
|
||||
|
||||
%make_build
|
||||
%make_build -C src libsuricata.so
|
||||
|
||||
%install
|
||||
%make_install install-library install-headers
|
||||
|
||||
mkdir -p %{buildroot}%{_localstatedir}/log/suricata
|
||||
mkdir -p %{buildroot}%{_localstatedir}/lib/suricata
|
||||
|
||||
mkdir -p %{buildroot}%{_sysconfdir}/suricata
|
||||
cp *.config %{buildroot}%{_sysconfdir}/suricata/
|
||||
cp etc/*.config %{buildroot}%{_sysconfdir}/suricata/
|
||||
cp suricata.yaml %{buildroot}%{_sysconfdir}/suricata/
|
||||
cp -R rules %{buildroot}%{_sysconfdir}/suricata/
|
||||
|
||||
rm -rf %{buildroot}/%{_datadir}/doc/suricata
|
||||
rm -rf %{buildroot}%{python3_sitelib}/suricata/__pycache__
|
||||
|
||||
rm -rf %{buildroot}%{_libdir}/libsuricata*.a
|
||||
|
||||
install -Dpm 0644 %{SOURCE2} %{buildroot}%{_unitdir}/%{name}.service
|
||||
install -Dpm 0644 %{SOURCE3} %{buildroot}%{_fillupdir}/sysconfig.%{name}
|
||||
install -Dpm 0644 %{SOURCE4} %{buildroot}%{_sysconfdir}/logrotate.d/%{name}
|
||||
|
||||
mkdir -p %{buildroot}%{_sbindir}
|
||||
ln -s %{_sbindir}/service %{buildroot}%{_sbindir}/rcsuricata
|
||||
mkdir -p %{buildroot}%{_localstatedir}/log/suricata
|
||||
|
||||
chrpath --delete %{buildroot}%{_bindir}/suricata
|
||||
|
||||
%pre
|
||||
%service_add_pre %{name}.service
|
||||
|
||||
%post
|
||||
%service_add_post %{name}.service
|
||||
%fillup_only
|
||||
suricata-update
|
||||
|
||||
%preun
|
||||
%service_del_preun %{name}.service
|
||||
|
||||
%postun
|
||||
%service_del_postun %{name}.service
|
||||
|
||||
%ldconfig_scriptlets -n libsuricata%{soname}
|
||||
|
||||
%files
|
||||
%license COPYING
|
||||
%doc doc/AUTHORS doc/Basic_Setup.txt doc/GITGUIDE doc/Setting_up_IPSinline_for_Linux.txt doc/Third_Party_Installation_Guides.txt doc/TODO
|
||||
%config(noreplace)%{_sysconfdir}/suricata
|
||||
%{_bindir}/suricata
|
||||
%{_bindir}/suricatasc
|
||||
%{_bindir}/suricatactl
|
||||
%{_bindir}/suricata-update
|
||||
%{_sbindir}/rcsuricata
|
||||
%dir %{_prefix}/lib/suricata
|
||||
%dir %{_prefix}/lib/suricata/python
|
||||
%{_prefix}/lib/suricata/python/suricata/
|
||||
%{_prefix}/lib/suricata/python/suricatasc/
|
||||
%{_datadir}/suricata*
|
||||
%dir %{_localstatedir}/log/suricata
|
||||
%{_mandir}/man1/suricata.1%{?ext_man}
|
||||
%{_mandir}/man1/suricatasc.1%{?ext_man}
|
||||
%{_mandir}/man1/suricatactl.1%{?ext_man}
|
||||
%{_mandir}/man1/suricatactl-filestore.1%{?ext_man}
|
||||
|
||||
%dir %{_localstatedir}/lib/suricata
|
||||
%{_unitdir}/%{name}.service
|
||||
%config(noreplace) %{_sysconfdir}/logrotate.d/%{name}
|
||||
%{_fillupdir}/sysconfig.%{name}
|
||||
|
||||
%files -n libsuricata%{soname}
|
||||
%{_libdir}/libsuricata.so.*
|
||||
|
||||
%files devel
|
||||
%{_bindir}/libsuricata-config
|
||||
%{_includedir}/suricata
|
||||
%{_libdir}/libsuricata.so
|
||||
|
||||
%changelog
|
9
suricata.sysconfig
Normal file
9
suricata.sysconfig
Normal file
@@ -0,0 +1,9 @@
|
||||
## Path: Network/Security
|
||||
## Description: suricata configuration
|
||||
## Type: string(-i,-q,-l)
|
||||
## Default: ""
|
||||
## ServiceRestart: suricata
|
||||
# Parameters for suricata. See the manual page for the
|
||||
# accepted parameters.
|
||||
SURICATA_OPTIONS=""
|
||||
|
Reference in New Issue
Block a user