26 lines
969 B
Plaintext
26 lines
969 B
Plaintext
|
config BR2_PACKAGE_SNORT
|
||
|
bool "snort"
|
||
|
depends on BR2_USE_WCHAR
|
||
|
depends on BR2_USE_MMU # fork()
|
||
|
depends on !BR2_STATIC_LIBS # daq
|
||
|
depends on BR2_TOOLCHAIN_HAS_NATIVE_RPC || BR2_TOOLCHAIN_HAS_THREADS # libtirpc
|
||
|
select BR2_PACKAGE_LIBPCAP
|
||
|
select BR2_PACKAGE_DAQ
|
||
|
select BR2_PACKAGE_PCRE
|
||
|
select BR2_PACKAGE_LIBTIRPC if !BR2_TOOLCHAIN_HAS_NATIVE_RPC
|
||
|
help
|
||
|
Snort is a free and open source network intrusion
|
||
|
prevention system (IPS) and network intrusion detection
|
||
|
system (IDS). It can perform protocol analysis, content
|
||
|
searching/matching, and can be used to detect a variety
|
||
|
of attacks and probes, such as buffer overflows, stealth
|
||
|
port scans, CGI attacks, SMB probes, OS fingerprinting
|
||
|
attempts, and much more.
|
||
|
|
||
|
https://www.snort.org
|
||
|
|
||
|
comment "snort needs a toolchain w/ wchar, threads, dynamic library"
|
||
|
depends on BR2_USE_MMU
|
||
|
depends on !BR2_USE_WCHAR || BR2_STATIC_LIBS || \
|
||
|
!(BR2_TOOLCHAIN_HAS_THREADS || BR2_TOOLCHAIN_HAS_NATIVE_RPC)
|