<feed xmlns='http://www.w3.org/2005/Atom'>
<title>kunkku/aports/testing/psad, branch master</title>
<subtitle>kunkku's aports repo
</subtitle>
<link rel='alternate' type='text/html' href='https://git-old.alpinelinux.org/user/kunkku/aports/'/>
<entry>
<title>testing/[various]: move to community</title>
<updated>2016-08-21T20:24:04+00:00</updated>
<author>
<name>Stuart Cardall</name>
<email>developer@it-offshore.co.uk</email>
</author>
<published>2016-08-18T20:46:53+00:00</published>
<link rel='alternate' type='text/html' href='https://git-old.alpinelinux.org/user/kunkku/aports/commit/?id=5c9f3ca3e307be53b45beeed2ce1626f38008625'/>
<id>5c9f3ca3e307be53b45beeed2ce1626f38008625</id>
<content type='text'>
albatross-themes
apk-post-messages
autossh
bitcoin
btrbk
entr
ffmpegthumbnailer
firejail
firetools
fwsnort
gnome-colors
imapsync
inetutils-syslogd
inotify-tools-inc
isync
junit
ktsuss
letsencrypt-nosudo
libmbim
libndp
libqmi
libteam
mini-sendmail
modemmanager
namecoin
networkmanager
nginx-naxsi
numix-themes
nxapi
opencl-headers
opencl-icd-loader
opus-tools
perl-authen-ntlm
perl-bit-vector
perl-data-uniqid
perl-file-copy-recursive
perl-getopt-argvfile
perl-io-tee
perl-iptables-chainmgr
perl-iptables-parse
perl-module-scandeps
perl-par-dist
perl-par-packer
perl-par
perl-uri-escape
psad
py-crcmod
py-graphviz
py-lz4
py-opencl
py-opengl-accelerate
runit
secpwgen
secure-delete
socklog
spacefm
tinyssh
udevil
virt-viewer
virtualbricks
whois
wrk
xpra
zram-init
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
albatross-themes
apk-post-messages
autossh
bitcoin
btrbk
entr
ffmpegthumbnailer
firejail
firetools
fwsnort
gnome-colors
imapsync
inetutils-syslogd
inotify-tools-inc
isync
junit
ktsuss
letsencrypt-nosudo
libmbim
libndp
libqmi
libteam
mini-sendmail
modemmanager
namecoin
networkmanager
nginx-naxsi
numix-themes
nxapi
opencl-headers
opencl-icd-loader
opus-tools
perl-authen-ntlm
perl-bit-vector
perl-data-uniqid
perl-file-copy-recursive
perl-getopt-argvfile
perl-io-tee
perl-iptables-chainmgr
perl-iptables-parse
perl-module-scandeps
perl-par-dist
perl-par-packer
perl-par
perl-uri-escape
psad
py-crcmod
py-graphviz
py-lz4
py-opencl
py-opengl-accelerate
runit
secpwgen
secure-delete
socklog
spacefm
tinyssh
udevil
virt-viewer
virtualbricks
whois
wrk
xpra
zram-init
</pre>
</div>
</content>
</entry>
<entry>
<title>testing/psad: update to 2.4.3</title>
<updated>2015-12-23T06:37:20+00:00</updated>
<author>
<name>Stuart Cardall</name>
<email>developer@it-offshore.co.uk</email>
</author>
<published>2015-12-23T01:38:12+00:00</published>
<link rel='alternate' type='text/html' href='https://git-old.alpinelinux.org/user/kunkku/aports/commit/?id=93944746480626c127ad357ab7fe8354834ed542'/>
<id>93944746480626c127ad357ab7fe8354834ed542</id>
<content type='text'>
'psad_fw_read.pid does not exist' warnings are not relevant in Busybox
&amp; can be ignored. They will be supressed in the next release:

https://github.com/mrash/psad/issues/31
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
'psad_fw_read.pid does not exist' warnings are not relevant in Busybox
&amp; can be ignored. They will be supressed in the next release:

https://github.com/mrash/psad/issues/31
</pre>
</div>
</content>
</entry>
<entry>
<title>testing/psad: update to 2.4.2</title>
<updated>2015-12-09T08:39:12+00:00</updated>
<author>
<name>Stuart Cardall</name>
<email>developer@it-offshore.co.uk</email>
</author>
<published>2015-12-06T09:21:46+00:00</published>
<link rel='alternate' type='text/html' href='https://git-old.alpinelinux.org/user/kunkku/aports/commit/?id=d60570bcd35eef566bae7fffcc919f6a107543ec'/>
<id>d60570bcd35eef566bae7fffcc919f6a107543ec</id>
<content type='text'>
this also fixes whois lookups causing reboots in psad / busybox
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
this also fixes whois lookups causing reboots in psad / busybox
</pre>
</div>
</content>
</entry>
<entry>
<title>testing/psad: temporarily disable whois lookups</title>
<updated>2015-07-01T07:17:12+00:00</updated>
<author>
<name>Stuart Cardall</name>
<email>developer@it-offshore.co.uk</email>
</author>
<published>2015-06-30T13:51:58+00:00</published>
<link rel='alternate' type='text/html' href='https://git-old.alpinelinux.org/user/kunkku/aports/commit/?id=03556f718db92c9f24a2c288be5a3e4398a2dae7'/>
<id>03556f718db92c9f24a2c288be5a3e4398a2dae7</id>
<content type='text'>
At the moment whois lookups trigger reboots on Alpine 3.1 &amp; 3.2 so
I don't think it's related to the new OpenRC version. Have raised an
issue on github.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
At the moment whois lookups trigger reboots on Alpine 3.1 &amp; 3.2 so
I don't think it's related to the new OpenRC version. Have raised an
issue on github.
</pre>
</div>
</content>
</entry>
<entry>
<title>testing/psad: update to 2.4.1</title>
<updated>2015-06-09T13:49:37+00:00</updated>
<author>
<name>Stuart Cardall</name>
<email>developer@it-offshore.co.uk</email>
</author>
<published>2015-06-02T11:25:32+00:00</published>
<link rel='alternate' type='text/html' href='https://git-old.alpinelinux.org/user/kunkku/aports/commit/?id=e653c8729ccce79168d4c5f332f4fd3880224eb4'/>
<id>e653c8729ccce79168d4c5f332f4fd3880224eb4</id>
<content type='text'>
psad-2.4.1 (05/13/2015):
    - Bug fix to honor the IGNORE_PROTOCOLS configuration variable for
      non-tcp/udp/icmp protocols. This bug was reported by Paul Versloot.
      Also extended the IGNORE_PROTOCOLS feature to match on both protocol
      name and number as well regardless of what iptables reports within log
      messages. This is so the user does not have to know what iptables will
      report (which can be inconsistent, e.g. 'TCP' vs. '2' for IGMP).
    - Added two configuration variables ENABLE_WHOIS_LOOKUPS and
      ENABLE_DNS_LOOKUPS (set to 'Y' by default) to allow whois and reverse
      DNS lookups to be controlled from the command line.
    - Bug fix for an uninitialized variable in 'psad -L' mode when auto
      blocking is enabled. This bug was reported via github issue #19 by
      gihub user 'itoffshore'.

(the last bug was also fixed by updating the dependent perl modules which we
have already done).
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
psad-2.4.1 (05/13/2015):
    - Bug fix to honor the IGNORE_PROTOCOLS configuration variable for
      non-tcp/udp/icmp protocols. This bug was reported by Paul Versloot.
      Also extended the IGNORE_PROTOCOLS feature to match on both protocol
      name and number as well regardless of what iptables reports within log
      messages. This is so the user does not have to know what iptables will
      report (which can be inconsistent, e.g. 'TCP' vs. '2' for IGMP).
    - Added two configuration variables ENABLE_WHOIS_LOOKUPS and
      ENABLE_DNS_LOOKUPS (set to 'Y' by default) to allow whois and reverse
      DNS lookups to be controlled from the command line.
    - Bug fix for an uninitialized variable in 'psad -L' mode when auto
      blocking is enabled. This bug was reported via github issue #19 by
      gihub user 'itoffshore'.

(the last bug was also fixed by updating the dependent perl modules which we
have already done).
</pre>
</div>
</content>
</entry>
<entry>
<title>testing/psad: update to 2.4.0</title>
<updated>2015-04-30T08:30:05+00:00</updated>
<author>
<name>Stuart Cardall</name>
<email>developer@it-offshore.co.uk</email>
</author>
<published>2015-04-29T22:18:27+00:00</published>
<link rel='alternate' type='text/html' href='https://git-old.alpinelinux.org/user/kunkku/aports/commit/?id=4d1c70b09e198d7c2e625a7cdf95baca172638a9'/>
<id>4d1c70b09e198d7c2e625a7cdf95baca172638a9</id>
<content type='text'>
The 2.2.4 PSAD package in the repos has no files (only folders) if
you examine the apk.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
The 2.2.4 PSAD package in the repos has no files (only folders) if
you examine the apk.
</pre>
</div>
</content>
</entry>
<entry>
<title>testing/psad: upgrade to 2.2.4</title>
<updated>2015-02-24T09:02:47+00:00</updated>
<author>
<name>Leonardo Arena</name>
<email>rnalrd@alpinelinux.org</email>
</author>
<published>2015-02-24T09:02:47+00:00</published>
<link rel='alternate' type='text/html' href='https://git-old.alpinelinux.org/user/kunkku/aports/commit/?id=7c825055c965b4a77e1cdcd5dbc9bde000add105'/>
<id>7c825055c965b4a77e1cdcd5dbc9bde000add105</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>/testing/PSAD - version bump to 2.2.3</title>
<updated>2014-03-31T11:52:41+00:00</updated>
<author>
<name>Stuart Cardall</name>
<email>developer@it-offshore.co.uk</email>
</author>
<published>2014-03-20T08:00:47+00:00</published>
<link rel='alternate' type='text/html' href='https://git-old.alpinelinux.org/user/kunkku/aports/commit/?id=bedbf4896916660a5d0728343c4c8f3cc42570ae'/>
<id>bedbf4896916660a5d0728343c4c8f3cc42570ae</id>
<content type='text'>
Version bump to PSAD 2.2.3

ChangeLog

psad-2.2.3 (03/01/2014):
    - Added compatibility with 'upstart' init daemons with assistance from Tim
      Kramer.  This change adds a new config variable 'ENABLE_PSADWATCHD' that
      can be used to disable psadwatchd when deployed with upstart since it
      has built-in process monitoring and restarting capabilities.  By default
      psadwatchd is not enabled anymore since this variable is set to "N". The
      reason for this change is that psad is extremely stable and so almost
      never needs to be restarted in practice, and process monitoring is
      better provided via other solutions (like upstart) anyway.  In addition,
      a new init script located at init-scripts/upstart/psad.conf has been
      added that is compatible with upstart - this script is meant to be copied
      to the /etc/init/ directory.
    - (Wolfgang Breyha) Bug fix to allow VLAN interfaces and interface aliases
      in IGNORE_INTERFACES.  This fixes issue #8 on github.
    - Bug fix to not modify /etc/hosts.deny permissions when removing
      tcpwrappers auto-block rules. This issue was reported as Debian bug
      #724267 (http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=724267) and
      relayed via Franck Joncourt. Closes issue #7 on github.

psad-2.2.2 (01/13/2014):
    - Added detection for Errata Security's "Masscan" port scanner that was
      used in an Internet-wide scan for port 22 on Sept. 12, 2013 (see:
      http://blog.erratasec.com/2013/09/we-scanned-internet-for-port-22.html).
      The detection strategy used by psad relies on the fact that masscan does
      not appear to set the options portion of the TCP header, and if the
      iptables LOG rules that generate log data for psad are built with the
      --log-tcp-options switch, then no options in a SYN scan can be seen.
      This is not to say that other scanning software always sets TCP options -
      Scapy seems to not set options by default when issuing a SYN scan like
      this either: http://www.secdev.org/projects/scapy/doc/usage.html#syn-scans
      There is a new psad.conf variable "EXPECT_TCP_OPTIONS" to assist with
      Masscan detection as well.  When looking for Masscan SYN scans, psad
      requires at least one TCP options field to be populated within a LOG
      message (so that it knows --log-tcp-options has been set for at least
      some logged traffic), and after seeing this then SYN packets with no
      options are attributed to Masscan traffic.  All usual psad threshold
      variables continue to apply however, so (by default) a single Masscan
      SYN packet will not trigger a psad alert.  Masscan detection can be
      disabled altogether by setting EXPECT_TCP_OPTIONS to "N", and this will
      not affect any other psad detection techniques such as passive OS
      fingerprinting, etc.
    - RPM bug fix to include the protocols file.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Version bump to PSAD 2.2.3

ChangeLog

psad-2.2.3 (03/01/2014):
    - Added compatibility with 'upstart' init daemons with assistance from Tim
      Kramer.  This change adds a new config variable 'ENABLE_PSADWATCHD' that
      can be used to disable psadwatchd when deployed with upstart since it
      has built-in process monitoring and restarting capabilities.  By default
      psadwatchd is not enabled anymore since this variable is set to "N". The
      reason for this change is that psad is extremely stable and so almost
      never needs to be restarted in practice, and process monitoring is
      better provided via other solutions (like upstart) anyway.  In addition,
      a new init script located at init-scripts/upstart/psad.conf has been
      added that is compatible with upstart - this script is meant to be copied
      to the /etc/init/ directory.
    - (Wolfgang Breyha) Bug fix to allow VLAN interfaces and interface aliases
      in IGNORE_INTERFACES.  This fixes issue #8 on github.
    - Bug fix to not modify /etc/hosts.deny permissions when removing
      tcpwrappers auto-block rules. This issue was reported as Debian bug
      #724267 (http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=724267) and
      relayed via Franck Joncourt. Closes issue #7 on github.

psad-2.2.2 (01/13/2014):
    - Added detection for Errata Security's "Masscan" port scanner that was
      used in an Internet-wide scan for port 22 on Sept. 12, 2013 (see:
      http://blog.erratasec.com/2013/09/we-scanned-internet-for-port-22.html).
      The detection strategy used by psad relies on the fact that masscan does
      not appear to set the options portion of the TCP header, and if the
      iptables LOG rules that generate log data for psad are built with the
      --log-tcp-options switch, then no options in a SYN scan can be seen.
      This is not to say that other scanning software always sets TCP options -
      Scapy seems to not set options by default when issuing a SYN scan like
      this either: http://www.secdev.org/projects/scapy/doc/usage.html#syn-scans
      There is a new psad.conf variable "EXPECT_TCP_OPTIONS" to assist with
      Masscan detection as well.  When looking for Masscan SYN scans, psad
      requires at least one TCP options field to be populated within a LOG
      message (so that it knows --log-tcp-options has been set for at least
      some logged traffic), and after seeing this then SYN packets with no
      options are attributed to Masscan traffic.  All usual psad threshold
      variables continue to apply however, so (by default) a single Masscan
      SYN packet will not trigger a psad alert.  Masscan detection can be
      disabled altogether by setting EXPECT_TCP_OPTIONS to "N", and this will
      not affect any other psad detection techniques such as passive OS
      fingerprinting, etc.
    - RPM bug fix to include the protocols file.
</pre>
</div>
</content>
</entry>
<entry>
<title>Patch for PSAD to fix sending mail &amp; service starting.</title>
<updated>2013-11-19T15:59:04+00:00</updated>
<author>
<name>IT Offshore</name>
<email>developer@it-offshore.co.uk</email>
</author>
<published>2013-11-18T22:40:23+00:00</published>
<link rel='alternate' type='text/html' href='https://git-old.alpinelinux.org/user/kunkku/aports/commit/?id=0b02ba041a307ec2a76786ecd345afe41f9da52c'/>
<id>0b02ba041a307ec2a76786ecd345afe41f9da52c</id>
<content type='text'>
Added start() to /etc/init.d/psad - it was not starting without it.

Added a dependency for mailx to APKBUILD &amp; fixed /etc/psad/psad.conf setting for mail (ssmtp on it's own was not enough - mail was
incorrectly formed).

Tested on a live server - scans are detected, blocked &amp; email notifications sent.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Added start() to /etc/init.d/psad - it was not starting without it.

Added a dependency for mailx to APKBUILD &amp; fixed /etc/psad/psad.conf setting for mail (ssmtp on it's own was not enough - mail was
incorrectly formed).

Tested on a live server - scans are detected, blocked &amp; email notifications sent.
</pre>
</div>
</content>
</entry>
<entry>
<title>Initial APKBUILD for PSAD into Testing</title>
<updated>2013-11-15T14:30:43+00:00</updated>
<author>
<name>IT Offshore</name>
<email>developer@it-offshore.co.uk</email>
</author>
<published>2013-11-10T09:58:56+00:00</published>
<link rel='alternate' type='text/html' href='https://git-old.alpinelinux.org/user/kunkku/aports/commit/?id=78aed1773bd4a4656ed3e5d24cf0981cb3a0a16d'/>
<id>78aed1773bd4a4656ed3e5d24cf0981cb3a0a16d</id>
<content type='text'>
Corrected patch for PSAD - the APKBUILD now provides the answers
required by install.pl so the package will build unattended. I looked
at building the package the Redhat way but the perl install script also
preserves configuration settings on upgrades.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Corrected patch for PSAD - the APKBUILD now provides the answers
required by install.pl so the package will build unattended. I looked
at building the package the Redhat way but the perl install script also
preserves configuration settings on upgrades.
</pre>
</div>
</content>
</entry>
</feed>
