SEARCH
NEW RPMS
DIRECTORIES
ABOUT
FAQ
VARIOUS
BLOG

 
 

psad rpm build for : Other. For other distributions click psad.

Name : psad
Version : 2.0.2 Vendor : (none)
Release : 1 Date : 2007-01-22 20:10:53
Group : System/Servers Source RPM : psad-2.0.2-1.src.rpm
Size : 2.35 MB
Packager : (none)
Summary : Psad analyzes iptables log messages for suspect traffic
Description :
Port Scan Attack Detector (psad) is a collection of three lightweight
system daemons written in Perl and in C that are designed to work with Linux
iptables firewalling code to detect port scans and other suspect traffic. It
features a set of highly configurable danger thresholds (with sensible
defaults provided), verbose alert messages that include the source,
destination, scanned port range, begin and end times, tcp flags and
corresponding nmap options, reverse DNS info, email and syslog alerting,
automatic blocking of offending ip addresses via dynamic configuration of
iptables rulesets, and passive operating system fingerprinting. In addition,
psad incorporates many of the tcp, udp, and icmp signatures included in the
snort intrusion detection system (http://www.snort.org) to detect highly
suspect scans for various backdoor programs (e.g. EvilFTP, GirlFriend,
SubSeven), DDoS tools (mstream, shaft), and advanced port scans (syn, fin,
xmas) which are easily leveraged against a machine via nmap. psad can also
alert on snort signatures that are logged via fwsnort
(http://www.cipherdyne.org/fwsnort/), which makes use of the
iptables string match module to detect application layer signatures.

RPM found in directory: /packages/linux-pbone/archive/www.cipherdyne.com/psad/download

Content of RPM  Changelog  Provides Requires

Download
ftp.icm.edu.pl  psad-2.0.2-1.x86_64.rpm
     

Provides :
Calc.so()(64bit)
Syslog.so()(64bit)
Vector.so()(64bit)
config(psad)
perl(Bit::Vector)
perl(Carp::Clan)
perl(Date::Calc)
perl(Date::Calc)
perl(Date::Calc::Object)
perl(Date::Calendar)
perl(Date::Calendar::Profiles)
perl(Date::Calendar::Year)
perl(IPTables::ChainMgr)
perl(IPTables::Parse)
perl(Net::IPv4Addr)
perl(Psad)
perl(Unix::Syslog)
psad

Requires :
perl(Getopt::Long)
libc.so.6()(64bit)
perl(Date::Calendar::Year)
perl(POSIX)
perl(vars)
perl(Exporter)
perl(AutoLoader)
perl(Unix::Syslog)
perl(Socket)
iptables
/usr/bin/perl
perl(warnings)
perl(IO::Handle)
perl(Carp)
perl(Date::Calc::Object)
perl(Data::Dumper)
libc.so.6(GLIBC_2.2.5)(64bit)
libc.so.6(GLIBC_2.3.4)(64bit)
perl(Date::Calc)
perl(Net::IPv4Addr)
/bin/sh
rpmlib(PayloadFilesHavePrefix) <= 4.0-1
perl(File::Path)
perl(IPTables::Parse)
rpmlib(CompressedFileNames) <= 3.0.4-1
perl(Carp::Clan)
rpmlib(VersionedDependencies) <= 3.0.3-1
libc.so.6(GLIBC_2.4)(64bit)
perl(Bit::Vector)
perl => 0:5.006
perl(DynaLoader)
perl(File::Copy)
libc.so.6(GLIBC_2.3)(64bit)
perl(IO::Socket)
config(psad) = 2.0.2-1
perl(strict)


Content of RPM :
/etc/psad
/etc/psad/alert.conf
/etc/psad/auto_dl
/etc/psad/fw_search.conf
/etc/psad/icmp_types
/etc/psad/ip_options
/etc/psad/kmsgsd.conf
/etc/psad/pf.os
/etc/psad/posf
/etc/psad/psad.conf
/etc/psad/psadwatchd.conf
/etc/psad/signatures
/etc/psad/snort_rule_dl
/etc/psad/snort_rules
/etc/psad/snort_rules/VERSION
/etc/psad/snort_rules/attack-responses.rules
/etc/psad/snort_rules/backdoor.rules
/etc/psad/snort_rules/bad-traffic.rules
/etc/psad/snort_rules/chat.rules
/etc/psad/snort_rules/classification.config
/etc/psad/snort_rules/ddos.rules
/etc/psad/snort_rules/deleted.rules
/etc/psad/snort_rules/dns.rules
/etc/psad/snort_rules/dos.rules
/etc/psad/snort_rules/experimental.rules
/etc/psad/snort_rules/exploit.rules
/etc/psad/snort_rules/finger.rules
/etc/psad/snort_rules/ftp.rules
/etc/psad/snort_rules/icmp-info.rules
/etc/psad/snort_rules/icmp.rules
There is 101 files more in these RPM.

 
ICM