2018-04-01 17:16:36 +02:00
|
|
|
config BR2_PACKAGE_SNORT
|
|
|
|
bool "snort"
|
|
|
|
depends on BR2_USE_WCHAR
|
|
|
|
depends on BR2_USE_MMU # fork()
|
|
|
|
depends on !BR2_STATIC_LIBS # daq
|
|
|
|
depends on BR2_TOOLCHAIN_HAS_NATIVE_RPC || BR2_TOOLCHAIN_HAS_THREADS # libtirpc
|
2018-04-01 19:27:39 +02:00
|
|
|
select BR2_PACKAGE_LIBDNET
|
2018-04-01 17:16:36 +02:00
|
|
|
select BR2_PACKAGE_LIBPCAP
|
|
|
|
select BR2_PACKAGE_DAQ
|
|
|
|
select BR2_PACKAGE_PCRE
|
|
|
|
select BR2_PACKAGE_LIBTIRPC if !BR2_TOOLCHAIN_HAS_NATIVE_RPC
|
2020-01-10 18:28:17 +01:00
|
|
|
select BR2_PACKAGE_ZLIB
|
2018-04-01 17:16:36 +02:00
|
|
|
help
|
|
|
|
Snort is a free and open source network intrusion
|
|
|
|
prevention system (IPS) and network intrusion detection
|
|
|
|
system (IDS). It can perform protocol analysis, content
|
|
|
|
searching/matching, and can be used to detect a variety
|
|
|
|
of attacks and probes, such as buffer overflows, stealth
|
|
|
|
port scans, CGI attacks, SMB probes, OS fingerprinting
|
|
|
|
attempts, and much more.
|
|
|
|
|
|
|
|
https://www.snort.org
|
|
|
|
|
|
|
|
comment "snort needs a toolchain w/ wchar, threads, dynamic library"
|
|
|
|
depends on BR2_USE_MMU
|
|
|
|
depends on !BR2_USE_WCHAR || BR2_STATIC_LIBS || \
|
|
|
|
!(BR2_TOOLCHAIN_HAS_THREADS || BR2_TOOLCHAIN_HAS_NATIVE_RPC)
|