[suricata/f17] Add more documentation

Steve Grubb sgrubb at fedoraproject.org
Sat Aug 25 20:13:54 UTC 2012


commit ede23e626a8de04b23041bf0d84ff38bcb9fa5a4
Author: Steve <sgrubb at redhat.com>
Date:   Sat Aug 25 16:13:48 2012 -0400

    Add more documentation

 fedora.notes       |   12 ++++++++++++
 suricata.spec      |   16 +++++++++++++---
 suricata.sysconfig |    5 ++++-
 3 files changed, 29 insertions(+), 4 deletions(-)
---
diff --git a/fedora.notes b/fedora.notes
new file mode 100644
index 0000000..7f6421e
--- /dev/null
+++ b/fedora.notes
@@ -0,0 +1,12 @@
+This package does not ship with rules. For it to do its job, it must have
+rules. Rules can be used from a couple places. It knows how to use
+snort rules if you have those. But if you don't another place to get
+rules is the emerging threats web site. To install, you might do 
+something like:
+
+mkdir /etc/suricata/rules/emerging
+wget http://rules.emergingthreats.net/open/suricata/emerging.rules.tar.gz
+tar -xz -C /etc/suricata/rules/emerging --strip-components=1 -f emerging.rules.targ.gz
+
+Then enable the rules in /etc/suricata/suricata.yaml
+
diff --git a/suricata.spec b/suricata.spec
index e196afe..0da0f1f 100644
--- a/suricata.spec
+++ b/suricata.spec
@@ -2,7 +2,7 @@
 Summary: Intrusion Detection System
 Name: suricata
 Version: 1.3
-Release: 1%{?dist}
+Release: 2%{?dist}
 License: GPLv2
 Group: Applications/Internet
 URL: http://www.openinfosecfoundation.org
@@ -10,6 +10,7 @@ Source0: http://www.openinfosecfoundation.org/download/%{name}-%{version}.tar.gz
 Source1: suricata.init
 Source2: suricata.sysconfig
 Source3: suricata.logrotate
+Source4: fedora.notes
 Patch1:  suricata-1.1.1-flags.patch
 BuildRoot: %{_tmppath}/%{name}-%{version}-%{release}-root-%(%{__id_u} -n)
 BuildRequires: libyaml-devel libprelude-devel
@@ -32,6 +33,7 @@ GPU cards.
 
 %prep
 %setup -q
+install -m 644 %{SOURCE4} doc/
 %patch1 -p1
 # This is to fix rpaths created by bad Makefile.in
 autoreconf -fv --install
@@ -47,6 +49,8 @@ make DESTDIR="${RPM_BUILD_ROOT}" "bindir=%{_sbindir}" install
 # Setup etc directory
 mkdir -p $RPM_BUILD_ROOT%{_sysconfdir}/suricata/rules
 install -m 600 suricata.yaml $RPM_BUILD_ROOT%{_sysconfdir}/suricata
+install -m 600 classification.config $RPM_BUILD_ROOT%{_sysconfdir}/suricata
+install -m 600 reference.config $RPM_BUILD_ROOT%{_sysconfdir}/suricata
 mkdir -p $RPM_BUILD_ROOT%{_sysconfdir}/rc.d/init.d
 install -m 0755 %{SOURCE1} $RPM_BUILD_ROOT%{_sysconfdir}/rc.d/init.d/suricata
 mkdir -p $RPM_BUILD_ROOT%{_sysconfdir}/sysconfig
@@ -84,11 +88,14 @@ fi
 
 %files
 %defattr(-,root,root,-)
-%doc COPYING doc/INSTALL
+%doc COPYING doc/INSTALL doc/Basic_Setup.txt
+%doc doc/Setting_up_IPSinline_for_Linux.txt doc/fedora.notes
 %{_sbindir}/suricata
 %{_libdir}/libhtp-*
 %attr(750,root,root) %dir %{_var}/log/suricata
-%config(noreplace) %attr(0600,root,root) %{_sysconfdir}/suricata/suricata.yaml
+%config(noreplace) %{_sysconfdir}/suricata/suricata.yaml
+%config(noreplace) %{_sysconfdir}/suricata/classification.config
+%config(noreplace) %{_sysconfdir}/suricata/reference.config
 %dir %attr(750,root,root) %{_sysconfdir}/suricata
 %dir %attr(750,root,root) %{_sysconfdir}/suricata/rules
 %config(noreplace) %attr(0600,root,root) %{_sysconfdir}/sysconfig/suricata
@@ -96,6 +103,9 @@ fi
 %config(noreplace) %attr(644,root,root) %{_sysconfdir}/logrotate.d/suricata
 
 %changelog
+* Sat Aug 25 2012 Steve Grubb <sgrubb at redhat.com> 1.3-2
+- Add more documentation
+
 * Fri Jul 06 2012 Steve Grubb <sgrubb at redhat.com> 1.3-1
 - New upstream release
 
diff --git a/suricata.sysconfig b/suricata.sysconfig
index 9c38335..c12943f 100644
--- a/suricata.sysconfig
+++ b/suricata.sysconfig
@@ -4,5 +4,8 @@ USER="snortd"
 # What group account should we run under. 
 GROUP="snortd"
 
+# What interface do you want to listen on?
+INTERFACE="eth0"
+
 # Add options to be passed to the daemon
-OPTIONS=" "
+OPTIONS="-D -i $INTERFACE"


More information about the scm-commits mailing list