-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Format: 1.7 Date: Sat, 2 Oct 2004 12:41:50 +0200 Source: snort Binary: snort-mysql snort-doc snort-rules-default snort-common snort-pgsql snort Architecture: source i386 all Version: 2.2.0-3 Distribution: unstable Urgency: high Maintainer: Javier Fernandez-Sanguino Pen~a <jfs@computer.org> Changed-By: Javier Fernandez-Sanguino Pen~a <jfs@computer.org> Description: snort - Flexible Network Intrusion Detection System snort-common - Flexible Network Intrusion Detection System [common files] snort-doc - Documentation for the Snort IDS [documentation] snort-mysql - Flexible Network Intrusion Detection System [MySQL] snort-pgsql - Flexible Network Intrusion Detection System [PostgreSQL] snort-rules-default - Flexible Network Intrusion Detection System ruleset Closes: 247665 268707 273138 274244 Changes: snort (2.2.0-3) unstable; urgency=high . * Added config-file discovery to ppp init.scripts so that Snort is started (-c) with the proper configuration file if available or snort.conf if not. Setting high severity so that users running Snort with PPP don't end up with a full /var filesystem (Closes: #268707) * Fixed bashism in /etc/ppp/if-up.d/snort * Modified the init.d an if-up.d scripts so that /etc/snort/snort.common.parameters is only used if it exists. * Snort-rules-default now Recommends: oinkmaster now that it is in the archive (accepted 01 Oct 2004), this does not close #191105 since IMHO a better signature update mechanism should be introduced. Also updated the related TODO item. * Added a FAQ Q&A regarding rule updates in README.Debian * Added code to detect for deprecated preprocessors and warn the user, curretnly the code will not touch the configuration files himself and will not detect if you are using the standard package configuration file. It will prevent users from having configuration issues, however (Closes: #247665) * Modified the init.d file so you can use 'status' to determine if the Snort sensors are up or not. * Updated the 2.2 rule set with the snapshot provided at snort.org, new rules include detection of the recent JPEG exploit (Closes: #274244) * Fixed typo in templates (unfuzzied modified entries) and updated JA translation provided by Hideki Yamane (Closes: #273138) Files: 4a92803a1ff8abea43e1d3d10c8fbd78 831 net optional snort_2.2.0-3.dsc 5b08c71a8cb432967af155077b0507f7 196690 net optional snort_2.2.0-3.diff.gz 69c98501682a507364325c14688b0c60 209294 doc optional snort-doc_2.2.0-3_all.deb 7ce6f9dea8ac1fc88028dd625a186abf 196942 net optional snort-rules-default_2.2.0-3_all.deb 5bc2f6c35f7ad6fddff12929171818a6 381726 net optional snort_2.2.0-3_i386.deb 128f6cc42052a70593c023c9516cc89c 79712 net optional snort-common_2.2.0-3_i386.deb 4f7f3e846931e3316dce6537a361c0a3 384208 net extra snort-mysql_2.2.0-3_i386.deb eaf7320d438c590b85b7c0a5c873b5ec 384178 net optional snort-pgsql_2.2.0-3_i386.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.5 (GNU/Linux) iD8DBQFBYRe6sandgtyBSwkRApsZAJ91PMNmlZhKWDgixvr5JBTbMoXhbgCfQ+LS FALA2+rUYzlhnlTslrZcAKU= =E7JL -----END PGP SIGNATURE----- Accepted: snort-common_2.2.0-3_i386.deb to pool/main/s/snort/snort-common_2.2.0-3_i386.deb snort-doc_2.2.0-3_all.deb to pool/main/s/snort/snort-doc_2.2.0-3_all.deb snort-mysql_2.2.0-3_i386.deb to pool/main/s/snort/snort-mysql_2.2.0-3_i386.deb snort-pgsql_2.2.0-3_i386.deb to pool/main/s/snort/snort-pgsql_2.2.0-3_i386.deb snort-rules-default_2.2.0-3_all.deb to pool/main/s/snort/snort-rules-default_2.2.0-3_all.deb snort_2.2.0-3.diff.gz to pool/main/s/snort/snort_2.2.0-3.diff.gz snort_2.2.0-3.dsc to pool/main/s/snort/snort_2.2.0-3.dsc snort_2.2.0-3_i386.deb to pool/main/s/snort/snort_2.2.0-3_i386.deb -- To UNSUBSCRIBE, email to debian-devel-changes-REQUEST@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org