[suricata/f17] Add more documentation
Steve Grubb
sgrubb at fedoraproject.org
Sat Aug 25 20:13:54 UTC 2012
commit ede23e626a8de04b23041bf0d84ff38bcb9fa5a4
Author: Steve <sgrubb at redhat.com>
Date: Sat Aug 25 16:13:48 2012 -0400
Add more documentation
fedora.notes | 12 ++++++++++++
suricata.spec | 16 +++++++++++++---
suricata.sysconfig | 5 ++++-
3 files changed, 29 insertions(+), 4 deletions(-)
---
diff --git a/fedora.notes b/fedora.notes
new file mode 100644
index 0000000..7f6421e
--- /dev/null
+++ b/fedora.notes
@@ -0,0 +1,12 @@
+This package does not ship with rules. For it to do its job, it must have
+rules. Rules can be used from a couple places. It knows how to use
+snort rules if you have those. But if you don't another place to get
+rules is the emerging threats web site. To install, you might do
+something like:
+
+mkdir /etc/suricata/rules/emerging
+wget http://rules.emergingthreats.net/open/suricata/emerging.rules.tar.gz
+tar -xz -C /etc/suricata/rules/emerging --strip-components=1 -f emerging.rules.targ.gz
+
+Then enable the rules in /etc/suricata/suricata.yaml
+
diff --git a/suricata.spec b/suricata.spec
index e196afe..0da0f1f 100644
--- a/suricata.spec
+++ b/suricata.spec
@@ -2,7 +2,7 @@
Summary: Intrusion Detection System
Name: suricata
Version: 1.3
-Release: 1%{?dist}
+Release: 2%{?dist}
License: GPLv2
Group: Applications/Internet
URL: http://www.openinfosecfoundation.org
@@ -10,6 +10,7 @@ Source0: http://www.openinfosecfoundation.org/download/%{name}-%{version}.tar.gz
Source1: suricata.init
Source2: suricata.sysconfig
Source3: suricata.logrotate
+Source4: fedora.notes
Patch1: suricata-1.1.1-flags.patch
BuildRoot: %{_tmppath}/%{name}-%{version}-%{release}-root-%(%{__id_u} -n)
BuildRequires: libyaml-devel libprelude-devel
@@ -32,6 +33,7 @@ GPU cards.
%prep
%setup -q
+install -m 644 %{SOURCE4} doc/
%patch1 -p1
# This is to fix rpaths created by bad Makefile.in
autoreconf -fv --install
@@ -47,6 +49,8 @@ make DESTDIR="${RPM_BUILD_ROOT}" "bindir=%{_sbindir}" install
# Setup etc directory
mkdir -p $RPM_BUILD_ROOT%{_sysconfdir}/suricata/rules
install -m 600 suricata.yaml $RPM_BUILD_ROOT%{_sysconfdir}/suricata
+install -m 600 classification.config $RPM_BUILD_ROOT%{_sysconfdir}/suricata
+install -m 600 reference.config $RPM_BUILD_ROOT%{_sysconfdir}/suricata
mkdir -p $RPM_BUILD_ROOT%{_sysconfdir}/rc.d/init.d
install -m 0755 %{SOURCE1} $RPM_BUILD_ROOT%{_sysconfdir}/rc.d/init.d/suricata
mkdir -p $RPM_BUILD_ROOT%{_sysconfdir}/sysconfig
@@ -84,11 +88,14 @@ fi
%files
%defattr(-,root,root,-)
-%doc COPYING doc/INSTALL
+%doc COPYING doc/INSTALL doc/Basic_Setup.txt
+%doc doc/Setting_up_IPSinline_for_Linux.txt doc/fedora.notes
%{_sbindir}/suricata
%{_libdir}/libhtp-*
%attr(750,root,root) %dir %{_var}/log/suricata
-%config(noreplace) %attr(0600,root,root) %{_sysconfdir}/suricata/suricata.yaml
+%config(noreplace) %{_sysconfdir}/suricata/suricata.yaml
+%config(noreplace) %{_sysconfdir}/suricata/classification.config
+%config(noreplace) %{_sysconfdir}/suricata/reference.config
%dir %attr(750,root,root) %{_sysconfdir}/suricata
%dir %attr(750,root,root) %{_sysconfdir}/suricata/rules
%config(noreplace) %attr(0600,root,root) %{_sysconfdir}/sysconfig/suricata
@@ -96,6 +103,9 @@ fi
%config(noreplace) %attr(644,root,root) %{_sysconfdir}/logrotate.d/suricata
%changelog
+* Sat Aug 25 2012 Steve Grubb <sgrubb at redhat.com> 1.3-2
+- Add more documentation
+
* Fri Jul 06 2012 Steve Grubb <sgrubb at redhat.com> 1.3-1
- New upstream release
diff --git a/suricata.sysconfig b/suricata.sysconfig
index 9c38335..c12943f 100644
--- a/suricata.sysconfig
+++ b/suricata.sysconfig
@@ -4,5 +4,8 @@ USER="snortd"
# What group account should we run under.
GROUP="snortd"
+# What interface do you want to listen on?
+INTERFACE="eth0"
+
# Add options to be passed to the daemon
-OPTIONS=" "
+OPTIONS="-D -i $INTERFACE"
More information about the scm-commits
mailing list