FreeBSD Bugzilla – Attachment 204379 Details for
Bug 237900
[NEW PORT] security/wazuh-agent: Security tool to monitor and check logs and intrusions
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Help
|
New Account
|
Log In
Remember
[x]
|
Forgot Password
Login:
[x]
shar
wazuh-agent.shar (text/plain), 7.79 KB, created by
Michael Muenz
on 2019-05-14 19:56:50 UTC
(
hide
)
Description:
shar
Filename:
MIME Type:
Creator:
Michael Muenz
Created:
2019-05-14 19:56:50 UTC
Size:
7.79 KB
patch
obsolete
># This is a shell archive. Save it in a file, remove anything before ># this line, and then unpack it by entering "sh file". Note, it may ># create directories; files and directories will be owned by you and ># have default permissions. ># ># This archive contains: ># ># wazuh-agent ># wazuh-agent/Makefile ># wazuh-agent/distinfo ># wazuh-agent/pkg-descr ># wazuh-agent/files ># wazuh-agent/files/patch1 ># wazuh-agent/files/patch-src_init_init.sh ># wazuh-agent/files/patch-etc_preloaded-vars.conf ># >echo c - wazuh-agent >mkdir -p wazuh-agent > /dev/null 2>&1 >echo x - wazuh-agent/Makefile >sed 's/^X//' >wazuh-agent/Makefile << '0b7710b42ec63aaad4f97d788c5dbeed' >X# $FreeBSD$ >X >XPORTNAME= wazuh >XPORTVERSION= 3.9.0 >XDISTVERSIONPREFIX= v >XCATEGORIES= security >XPKGNAMESUFFIX= -agent >X >XMAINTAINER= m.muenz@gmail.com >XCOMMENT= Security tool to monitor and check logs and intrusions >X >XLICENSE= GPLv2 >XLICENSE_FILE= ${WRKSRC}/LICENSE >X >XUSES= gmake perl5 readline >X >XUSE_GITHUB= yes >XGH_ACCOUNT= wazuh >XGH_TAGNAME= v3.9.0 >X >XUSE_OPENSSL= yes >XUSE_GMAKE= yes >X >XUSERS= ossec ossecm ossecr >XGROUPS= ossec >X >X.include <bsd.port.pre.mk> >Xdo-build: >X @cd ${WRKSRC}/src && ${GMAKE} deps && ${GMAKE} >Xdo-install: >X @cd ${WRKSRC} && ${SH} install.sh >X.include <bsd.port.mk> >0b7710b42ec63aaad4f97d788c5dbeed >echo x - wazuh-agent/distinfo >sed 's/^X//' >wazuh-agent/distinfo << '0f051aa68c30350db60aebbbe4aefb63' >XTIMESTAMP = 1557487679 >XSHA256 (wazuh-wazuh-v3.9.0_GH0.tar.gz) = 1ae46fefa2f2910b150c6b502c36a7e4a8488ddede2e44f33506a9b0d8d1741c >XSIZE (wazuh-wazuh-v3.9.0_GH0.tar.gz) = 14788827 >0f051aa68c30350db60aebbbe4aefb63 >echo x - wazuh-agent/pkg-descr >sed 's/^X//' >wazuh-agent/pkg-descr << '72dfc1290a3d32bac7e221ca468631dc' >XThe Wazuh agent runs on the hosts that you want to monitor. >XIt is multi-platform and provides the following capabilities: >X >X- Log and data collection >X- File integrity monitoring >X- Rootkit and malware detection >X- Security policy monitoring. >X- Configuration assessments >X- Software inventory >X >XIn addition, it communicates with the Wazuh manager, sending data in near >Xreal-time through an encrypted and authenticated channel. >X >XWWW: https://github.com/wazuh/wazuh >72dfc1290a3d32bac7e221ca468631dc >echo c - wazuh-agent/files >mkdir -p wazuh-agent/files > /dev/null 2>&1 >echo x - wazuh-agent/files/patch1 >sed 's/^X//' >wazuh-agent/files/patch1 << '96a8fafa1db6818e35a3ea7d623263be' >X--- src/init/init.sh.orig 2019-05-14 14:36:08.772924000 +0200 >X+++ src/init/init.sh >X@@ -164,7 +164,7 @@ >X return 0; >X fi >X >X- if [ "X${UN}" = "XOpenBSD" -o "X${UN}" = "XNetBSD" -o "X${UN}" = "XFreeBSD" -o "X${UN}" = "XDragonFly" ]; then >X+ if [ "X${UN}" = "XOpenBSD" -o "X${UN}" = "XNetBSD" -o "X${UN}" = "XDragonFly" ]; then >X # Checking for the presence of ossec-control on rc.local >X grep ossec-control /etc/rc.local > /dev/null 2>&1 >X if [ $? != 0 ]; then >96a8fafa1db6818e35a3ea7d623263be >echo x - wazuh-agent/files/patch-src_init_init.sh >sed 's/^X//' >wazuh-agent/files/patch-src_init_init.sh << '91f2878dd1eaf0430e2365969949ab25' >X--- src/init/init.sh.orig 2019-05-14 21:25:40 UTC >X+++ src/init/init.sh >X@@ -164,7 +164,7 @@ runInit() >X return 0; >X fi >X >X- if [ "X${UN}" = "XOpenBSD" -o "X${UN}" = "XNetBSD" -o "X${UN}" = "XFreeBSD" -o "X${UN}" = "XDragonFly" ]; then >X+ if [ "X${UN}" = "XOpenBSD" -o "X${UN}" = "XNetBSD" -o "X${UN}" = "XDragonFly" ]; then >X # Checking for the presence of ossec-control on rc.local >X grep ossec-control /etc/rc.local > /dev/null 2>&1 >X if [ $? != 0 ]; then >91f2878dd1eaf0430e2365969949ab25 >echo x - wazuh-agent/files/patch-etc_preloaded-vars.conf >sed 's/^X//' >wazuh-agent/files/patch-etc_preloaded-vars.conf << '1bd991792f4254b3e4bed4aaa49d9fae' >X--- etc/preloaded-vars.conf.orig 2019-04-30 19:12:01 UTC >X+++ etc/preloaded-vars.conf >X@@ -23,57 +23,57 @@ >X # It can be "en", "br", "tr", "it", "de" or "pl". >X # In case of an invalid language, it will default >X # to English "en" >X-# USER_LANGUAGE="en" # For english >X+USER_LANGUAGE="en" # For english >X # USER_LANGUAGE="br" # For portuguese >X >X >X # If USER_NO_STOP is set to anything, the confirmation >X # messages are not going to be asked. >X-# USER_NO_STOP="y" >X+USER_NO_STOP="y" >X >X >X # USER_INSTALL_TYPE defines the installation type to >X # be used during install. It can only be "local", >X # "agent" or "server". >X #USER_INSTALL_TYPE="local" >X-#USER_INSTALL_TYPE="agent" >X+USER_INSTALL_TYPE="agent" >X #USER_INSTALL_TYPE="server" >X >X >X # USER_DIR defines the location to install ossec >X-#USER_DIR="/var/ossec" >X+USER_DIR="/usr/local/wazuh-agent" >X >X >X # If USER_DELETE_DIR is set to "y", the directory >X # to install OSSEC will be removed if present. >X-#USER_DELETE_DIR="y" >X+USER_DELETE_DIR="n" >X >X >X # If USER_ENABLE_ACTIVE_RESPONSE is set to "n", >X # active response will be disabled. >X-#USER_ENABLE_ACTIVE_RESPONSE="y" >X+USER_ENABLE_ACTIVE_RESPONSE="y" >X >X >X # If USER_ENABLE_SYSCHECK is set to "y", >X # syscheck will be enabled. Set to "n" to >X # disable it. >X-#USER_ENABLE_SYSCHECK="y" >X+USER_ENABLE_SYSCHECK="y" >X >X >X # If USER_ENABLE_ROOTCHECK is set to "y", >X # rootcheck will be enabled. Set to "n" to >X # disable it. >X-#USER_ENABLE_ROOTCHECK="y" >X+USER_ENABLE_ROOTCHECK="y" >X >X # If USER_ENABLE_OPENSCAP is set to "y", >X # the OpenSCAP module will be enabled. >X # Set to "n" to disable it. >X-#USER_ENABLE_OPENSCAP="y" >X+USER_ENABLE_OPENSCAP="y" >X >X # If USER_ENABLE_SYSCOLLECTOR is set to "y", >X # syscollector will be enabled. Set to "n" to >X # disable it. >X-#USER_ENABLE_SYSCOLLECTOR="y" >X+USER_ENABLE_SYSCOLLECTOR="y" >X >X # If USER_ENABLE_SECURITY_CONFIGURATION_ASSESSMENT is set to "y", >X # the configuration assessment module will be enabled. >X@@ -83,16 +83,16 @@ USER_ENABLE_SECURITY_CONFIGURATION_ASSESSMENT="y" >X # If USER_ENABLE_AUTHD is set to "y", >X # the Auth service will be enabled. >X # Set to "n" to disable it. >X-#USER_ENABLE_AUTHD="y" >X+USER_ENABLE_AUTHD="y" >X >X # If USER_GENERATE_AUTHD_CERT is set to "y", >X # the Authd certificate will be auto generated. >X # Set to "n" to disable it. >X-#USER_GENERATE_AUTHD_CERT="y" >X+USER_GENERATE_AUTHD_CERT="n" >X >X # If USER_UPDATE is set to anything, the update >X # installation will be done. >X-#USER_UPDATE="y" >X+USER_UPDATE="n" >X >X # If USER_BINARYINSTALL is set, the installation >X # is not going to compile the code, but use the >X@@ -105,13 +105,13 @@ USER_ENABLE_SECURITY_CONFIGURATION_ASSESSMENT="y" >X # Specifies the IP address or hostname of the >X # ossec server. Only used on agent installations. >X # Choose only one, not both. >X-# USER_AGENT_SERVER_IP="1.2.3.4" >X+USER_AGENT_SERVER_IP="127.0.0.1" >X # USER_AGENT_SERVER_NAME >X >X >X # USER_CREATE_SSL_CERT creates the manager certificate >X # and key when set to yes >X-#USER_CREATE_SSL_CERT="y" >X+USER_CREATE_SSL_CERT="n" >X >X # USER_AGENT_CONFIG_PROFILE specifies the agent's config profile >X # name. This is used to create agent.conf configuration profiles >X@@ -124,10 +124,10 @@ USER_ENABLE_SECURITY_CONFIGURATION_ASSESSMENT="y" >X ### Server/Local Installation variables. ### >X >X # USER_ENABLE_EMAIL enables or disables email alerting. >X-#USER_ENABLE_EMAIL="y" >X+USER_ENABLE_EMAIL="n" >X >X # USER_AUTO_START enables or disables the auto-start of Wazuh >X-#USER_AUTO_START="y" >X+USER_AUTO_START="n" >X >X # USER_EMAIL_ADDRESS defines the destination e-mail of the alerts. >X #USER_EMAIL_ADDRESS="dcid@test.ossec.net" >X@@ -146,7 +146,7 @@ USER_ENABLE_SECURITY_CONFIGURATION_ASSESSMENT="y" >X >X # USER_CA_STORE is a path to a X509 certificate or to a folder >X # containing certificates to verify incoming WPK packages for remote upgrades. >X-#USER_CA_STORE="/path/to/my_cert.pem" >X+USER_CA_STORE="n" >X >X # OPTIMIZE_CPYTHON activate all the Python optimizations when >X # building the CPython interpeter. This can take a while. >1bd991792f4254b3e4bed4aaa49d9fae >exit >
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 237900
:
204379
|
205371
|
205389