[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Accepted snort 2.2.0-3 (i386 source all)



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Sat,  2 Oct 2004 12:41:50 +0200
Source: snort
Binary: snort-mysql snort-doc snort-rules-default snort-common snort-pgsql snort
Architecture: source i386 all
Version: 2.2.0-3
Distribution: unstable
Urgency: high
Maintainer: Javier Fernandez-Sanguino Pen~a <jfs@computer.org>
Changed-By: Javier Fernandez-Sanguino Pen~a <jfs@computer.org>
Description: 
 snort      - Flexible Network Intrusion Detection System
 snort-common - Flexible Network Intrusion Detection System [common files]
 snort-doc  - Documentation for the Snort IDS [documentation]
 snort-mysql - Flexible Network Intrusion Detection System [MySQL]
 snort-pgsql - Flexible Network Intrusion Detection System [PostgreSQL]
 snort-rules-default - Flexible Network Intrusion Detection System ruleset
Closes: 247665 268707 273138 274244
Changes: 
 snort (2.2.0-3) unstable; urgency=high
 .
   * Added config-file discovery to ppp init.scripts so that Snort is
     started (-c) with the proper configuration file if available or
     snort.conf if not. Setting high severity so that users running
     Snort with PPP don't end up with a full /var filesystem (Closes: #268707)
   * Fixed bashism in /etc/ppp/if-up.d/snort
   * Modified the init.d an if-up.d scripts so that
     /etc/snort/snort.common.parameters is only used if it exists.
   * Snort-rules-default now Recommends: oinkmaster
     now that it is in the archive (accepted 01 Oct 2004), this does not
     close #191105 since IMHO a better signature update mechanism should
     be introduced. Also updated the related TODO item.
   * Added a FAQ Q&A regarding rule updates in README.Debian
   * Added code to detect for deprecated preprocessors and warn the user,
     curretnly the code will not touch the configuration files himself and
     will not detect if you are using the standard package configuration file.
     It will prevent users from having configuration issues, however
     (Closes: #247665)
   * Modified the init.d file so you can use 'status' to determine if
     the Snort sensors are up or not.
   * Updated the 2.2 rule set with the snapshot provided at snort.org, new rules
     include detection of the recent JPEG exploit (Closes: #274244)
   * Fixed typo in templates (unfuzzied modified entries) and updated
     JA translation provided by Hideki Yamane (Closes: #273138)
Files: 
 4a92803a1ff8abea43e1d3d10c8fbd78 831 net optional snort_2.2.0-3.dsc
 5b08c71a8cb432967af155077b0507f7 196690 net optional snort_2.2.0-3.diff.gz
 69c98501682a507364325c14688b0c60 209294 doc optional snort-doc_2.2.0-3_all.deb
 7ce6f9dea8ac1fc88028dd625a186abf 196942 net optional snort-rules-default_2.2.0-3_all.deb
 5bc2f6c35f7ad6fddff12929171818a6 381726 net optional snort_2.2.0-3_i386.deb
 128f6cc42052a70593c023c9516cc89c 79712 net optional snort-common_2.2.0-3_i386.deb
 4f7f3e846931e3316dce6537a361c0a3 384208 net extra snort-mysql_2.2.0-3_i386.deb
 eaf7320d438c590b85b7c0a5c873b5ec 384178 net optional snort-pgsql_2.2.0-3_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.5 (GNU/Linux)

iD8DBQFBYRe6sandgtyBSwkRApsZAJ91PMNmlZhKWDgixvr5JBTbMoXhbgCfQ+LS
FALA2+rUYzlhnlTslrZcAKU=
=E7JL
-----END PGP SIGNATURE-----


Accepted:
snort-common_2.2.0-3_i386.deb
  to pool/main/s/snort/snort-common_2.2.0-3_i386.deb
snort-doc_2.2.0-3_all.deb
  to pool/main/s/snort/snort-doc_2.2.0-3_all.deb
snort-mysql_2.2.0-3_i386.deb
  to pool/main/s/snort/snort-mysql_2.2.0-3_i386.deb
snort-pgsql_2.2.0-3_i386.deb
  to pool/main/s/snort/snort-pgsql_2.2.0-3_i386.deb
snort-rules-default_2.2.0-3_all.deb
  to pool/main/s/snort/snort-rules-default_2.2.0-3_all.deb
snort_2.2.0-3.diff.gz
  to pool/main/s/snort/snort_2.2.0-3.diff.gz
snort_2.2.0-3.dsc
  to pool/main/s/snort/snort_2.2.0-3.dsc
snort_2.2.0-3_i386.deb
  to pool/main/s/snort/snort_2.2.0-3_i386.deb



Reply to: