ports/120193: new port, security/p5-Snort-Rule
Paul Schmehl
pauls at utdallas.edu
Thu Jan 31 22:30:02 UTC 2008
>Number: 120193
>Category: ports
>Synopsis: new port, security/p5-Snort-Rule
>Confidential: no
>Severity: non-critical
>Priority: low
>Responsible: freebsd-ports-bugs
>State: open
>Quarter:
>Keywords:
>Date-Required:
>Class: maintainer-update
>Submitter-Id: current-users
>Arrival-Date: Thu Jan 31 22:30:01 UTC 2008
>Closed-Date:
>Last-Modified:
>Originator: Paul Schmehl
>Release: FreeBSD 6.2-RELEASE-p9 i386
>Organization:
The University of Texas at Dallas
>Environment:
System: FreeBSD hostname.utdallas.edu 6.2-RELEASE-p9 FreeBSD 6.2-RELEASE-p9 #2: Wed Dec 5 16:16:36 CST 2007 root at hostname.utdallas.edu:/usr/obj/usr/src/sys/GENERIC i386
>Description:
new port submission, security/p5-Snort-Rule, this is a CPAN module
that facilitates the dynamic creation of rules for snort
>How-To-Repeat:
>Fix:
--- Makefile begins here ---
# ports collection makefile for: perl extension for dynamically building snort rules
# Date created: 30 January 2008
# Whom: Paul Schmehl <pauls at utdallas.edu>
#
# $FreeBSD$
#
PORTNAME= Snort-Rule
PORTVERSION= 1.06
CATEGORIES= security perl5
MASTER_SITES= ${MASTER_SITE_PERL_CPAN}
MASTER_SITE_SUBDIR= ../by-authors/id/S/SA/SAXJAZMAN/Snort/
PKGNAMEPREFIX= p5-
MAINTAINER= pauls at utdallas.edu
COMMENT= Perl5 extension for dynamically building snort rules
PERL_CONFIGURE= yes
PLIST_FILES= %%SITE_PERL%%/Snort/Rule.pm \
%%SITE_PERL%%/mach/auto/Snort/Rule/.packlist
PLIST_DIRS= %%SITE_PERL%%/mach/auto/Snort/Rule \
%%SITE_PERL%%/mach/auto/Snort \
%%SITE_PERL%%/Snort
MAN3= Snort::Rule.3
.include <bsd.port.mk>
--- Makefile ends here ---
--- distinfo begins here ---
MD5 (Snort-Rule-1.06.tar.gz) = 2f05b6017ffbee36518e7ef9ed079e3c
SHA256 (Snort-Rule-1.06.tar.gz) = 582ec734ec86786e28218558747684b256ee9c6ac3e7d37e471baf09b371ecc5
SIZE (Snort-Rule-1.06.tar.gz) = 5176
--- distinfo ends here ---
--- pkg-descr begins here ---
This is a very simple snort rule object. It was developed to allow for
scripted dynamic rule creation. Ideally you could dynamically take a
list of bad hosts and build an array of snort rule objects from that
list. Then write that list using the string() method to a snort rules
file.
WWW: http://www.cpan.org/modules/by-authors/id/S/SA/SAXJAZMAN/Snort/
--- pkg-descr ends here ---
>Release-Note:
>Audit-Trail:
>Unformatted:
More information about the freebsd-ports-bugs
mailing list