head	1.3;
access;
symbols
	RELEASE_7_4_0:1.2
	RELEASE_8_2_0:1.2
	RELEASE_6_EOL:1.2
	RELEASE_8_1_0:1.2
	RELEASE_7_3_0:1.2
	RELEASE_8_0_0:1.2
	RELEASE_7_2_0:1.2
	RELEASE_7_1_0:1.2
	RELEASE_6_4_0:1.2
	RELEASE_5_EOL:1.2
	RELEASE_7_0_0:1.2
	RELEASE_6_3_0:1.2
	PRE_XORG_7:1.2
	RELEASE_4_EOL:1.2
	RELEASE_6_2_0:1.1
	RELEASE_6_1_0:1.1
	RELEASE_5_5_0:1.1
	RELEASE_6_0_0:1.1;
locks; strict;
comment	@# @;


1.3
date	2011.10.09.16.57.06;	author dougb;	state dead;
branches;
next	1.2;

1.2
date	2006.11.05.18.14.06;	author alepulver;	state Exp;
branches;
next	1.1;

1.1
date	2005.05.28.11.06.39;	author pav;	state Exp;
branches;
next	;


desc
@@


1.3
log
@Remove security/snort_inline:

Does not build properly, no longer supported upstream

PR:		ports/161410
Approved by:	maintainer
@
text
@bin/snort_inline
@@unexec if [ -f %D/etc/snort.conf ] && cmp -s %D/etc/snort.conf %D/etc/snort.conf-sample; then rm -f %D/etc/snort.conf; fi
etc/snort.conf-sample
@@exec [ -f %B/snort.conf ] || cp %B/%f %B/snort.conf
@@unexec if [ -f %D/etc/snort_inline.conf ] && cmp -s %D/etc/snort_inline.conf %D/etc/snort_inline.conf-sample; then rm -f %D/etc/snort_inline.conf; fi
etc/snort_inline.conf-sample
@@exec [ -f %B/snort_inline.conf ] || cp %B/%f %B/snort_inline.conf
@@unexec if [ -f %B/unicode.map ] && cmp -s %B/unicode.map %B/unicode.map-sample; then rm -f %B/etc/unicode.map; fi
%%DATADIR%%/unicode.map
@@exec [ -f %B/unicode.map ] || cp %B/%f %B/unicode.map
@@unexec if [ -f %B/threshold.conf ] && cmp -s %B/threshold.conf %B/threshold.conf-sample; then rm -f %B/threshold.conf; fi
%%DATADIR%%/threshold.conf-sample
@@exec [ -f %B/threshold.conf ] || cp %B/%f %B/threshold.conf
%%PORTDOCS%%%%DOCSDIR%%/AUTHORS
%%PORTDOCS%%%%DOCSDIR%%/BUGS
%%PORTDOCS%%%%DOCSDIR%%/CREDITS
%%PORTDOCS%%%%DOCSDIR%%/ChangeLog
%%PORTDOCS%%%%DOCSDIR%%/faq.pdf
%%PORTDOCS%%%%DOCSDIR%%/faq.tex
%%PORTDOCS%%%%DOCSDIR%%/NEWS
%%PORTDOCS%%%%DOCSDIR%%/README
%%PORTDOCS%%%%DOCSDIR%%/README.INLINE
%%PORTDOCS%%%%DOCSDIR%%/README.FLEXRESP
%%PORTDOCS%%%%DOCSDIR%%/README.PLUGINS
%%PORTDOCS%%%%DOCSDIR%%/README.UNSOCK
%%PORTDOCS%%%%DOCSDIR%%/README.WIN32
%%PORTDOCS%%%%DOCSDIR%%/README.alert_order
%%PORTDOCS%%%%DOCSDIR%%/README.csv
%%PORTDOCS%%%%DOCSDIR%%/README.database
%%PORTDOCS%%%%DOCSDIR%%/README.event_queue
%%PORTDOCS%%%%DOCSDIR%%/README.flow
%%PORTDOCS%%%%DOCSDIR%%/README.flowbits
%%PORTDOCS%%%%DOCSDIR%%/README.flow-portscan
%%PORTDOCS%%%%DOCSDIR%%/README.sfportscan
%%PORTDOCS%%%%DOCSDIR%%/README.asn1
%%PORTDOCS%%%%DOCSDIR%%/README.http_inspect
%%PORTDOCS%%%%DOCSDIR%%/README.thresholding
%%PORTDOCS%%%%DOCSDIR%%/README.wireless
%%PORTDOCS%%%%DOCSDIR%%/README.NFQUEUE
%%PORTDOCS%%%%DOCSDIR%%/README.clamav
%%PORTDOCS%%%%DOCSDIR%%/README.frag3
%%PORTDOCS%%%%DOCSDIR%%/TODO
%%PORTDOCS%%%%DOCSDIR%%/USAGE
%%PORTDOCS%%%%DOCSDIR%%/snort_manual.pdf
%%PORTDOCS%%%%DOCSDIR%%/snort_schema_v106.pdf
%%PORTDOCS%%@@dirrm %%DOCSDIR%%
@@unexec if [ -f %B/classification.config ] && cmp -s %B/classification.config %B/classification.config-sample; then rm -f %B/classification.config; fi
%%DATADIR%%/classification.config-sample
@@exec [ -f %B/classification.config ] || cp %B/%f %B/classification.config
%%DATADIR%%/classification.config
@@unexec if [ -f %B/reference.config ] && cmp -s %B/reference.config %B/reference.config-sample; then rm -f %B/reference.config; fi
%%DATADIR%%/reference.config-sample
@@exec [ -f %B/reference.config ] || cp %B/%f %B/reference.config
@@dirrmtry %%DATADIR%%/rules
@@dirrm %%DATADIR%%
@


1.2
log
@- Update to version 2.4.5.

PR:		ports/104730
Submitted by:	Nick Rogness <nick@@rogness.net> (maintainer)
@
text
@@


1.1
log
@An inline IPS system based on snort using ipfw.

PR:		ports/81378
Submitted by:	Nick Rogness <nick@@rogness.net>
@
text
@d8 2
a9 2
@@unexec if [ -f %D/etc/unicode.map ] && cmp -s %D/etc/unicode.map %D/etc/unicode.map-sample; then rm -f %D/etc/unicode.map; fi
etc/unicode.map-sample
d11 2
a12 2
@@unexec if [ -f %D/etc/threshold.conf ] && cmp -s %D/etc/threshold.conf %D/etc/threshold.conf-sample; then rm -f %D/etc/threshold.conf; fi
etc/threshold.conf-sample
d39 3
a46 4
%%DATADIR%%/attack-responses.rules
%%DATADIR%%/backdoor.rules
%%DATADIR%%/bad-traffic.rules
%%DATADIR%%/chat.rules
d50 1
a50 25
%%DATADIR%%/ddos.rules
%%DATADIR%%/deleted.rules
%%DATADIR%%/dns.rules
%%DATADIR%%/dos.rules
%%DATADIR%%/experimental.rules
%%DATADIR%%/exploit.rules
%%DATADIR%%/finger.rules
%%DATADIR%%/ftp.rules
%%DATADIR%%/icmp-info.rules
%%DATADIR%%/icmp.rules
%%DATADIR%%/imap.rules
%%DATADIR%%/info.rules
%%DATADIR%%/local.rules
%%DATADIR%%/misc.rules
%%DATADIR%%/multimedia.rules
%%DATADIR%%/mysql.rules
%%DATADIR%%/netbios.rules
%%DATADIR%%/nntp.rules
%%DATADIR%%/oracle.rules
%%DATADIR%%/other-ids.rules
%%DATADIR%%/p2p.rules
%%DATADIR%%/policy.rules
%%DATADIR%%/pop2.rules
%%DATADIR%%/pop3.rules
%%DATADIR%%/porn.rules
d54 1
a54 19
%%DATADIR%%/rpc.rules
%%DATADIR%%/rservices.rules
%%DATADIR%%/scan.rules
%%DATADIR%%/shellcode.rules
%%DATADIR%%/smtp.rules
%%DATADIR%%/snmp.rules
%%DATADIR%%/sql.rules
%%DATADIR%%/telnet.rules
%%DATADIR%%/tftp.rules
%%DATADIR%%/virus.rules
%%DATADIR%%/web-attacks.rules
%%DATADIR%%/web-cgi.rules
%%DATADIR%%/web-client.rules
%%DATADIR%%/web-coldfusion.rules
%%DATADIR%%/web-frontpage.rules
%%DATADIR%%/web-iis.rules
%%DATADIR%%/web-misc.rules
%%DATADIR%%/web-php.rules
%%DATADIR%%/x11.rules
@

