mirror of https://github.com/OISF/suricata
				
				
				
			
			You cannot select more than 25 topics
			Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
		
		
		
		
		
			
		
			
				
	
	
		
			117 lines
		
	
	
		
			3.5 KiB
		
	
	
	
		
			Plaintext
		
	
			
		
		
	
	
			117 lines
		
	
	
		
			3.5 KiB
		
	
	
	
		
			Plaintext
		
	
Autogenerated on 2012-11-29
 | 
						|
from - https://redmine.openinfosecfoundation.org/projects/suricata/wiki/CentOS5
 | 
						|
 | 
						|
 | 
						|
CentOS5
 | 
						|
 | 
						|
 | 
						|
Pre-installation requirements
 | 
						|
 | 
						|
You will have to use the Fedora EPEL repository for some packages to enable
 | 
						|
this repository. It is the same for i386 and x86_64:
 | 
						|
 | 
						|
  sudo rpm -Uvh http://download.fedora.redhat.com/pub/epel/5/i386/epel-release-
 | 
						|
  5-3.noarch.rpm
 | 
						|
 | 
						|
Before you can build Suricata for your system, run the following command to
 | 
						|
ensure that you have everything you need for the installation.
 | 
						|
 | 
						|
  sudo yum -y install libpcap libpcap-devel libnet libnet-devel pcre \
 | 
						|
  pcre-devel gcc gcc-c++ automake autoconf libtool make libyaml \
 | 
						|
  libyaml-devel zlib zlib-devel
 | 
						|
 | 
						|
Depending on the current status of your system, it may take a while to complete
 | 
						|
this process.
 | 
						|
 | 
						|
HTP
 | 
						|
 | 
						|
HTP is bundled with Suricata and installed automatically. If you need to
 | 
						|
install HTP manually for other reasons, instructions can be found at HTP
 | 
						|
library_installation.
 | 
						|
 | 
						|
 | 
						|
IPS
 | 
						|
 | 
						|
 | 
						|
If you plan to build Suricata with IPS capabilities via ./configure --enable-
 | 
						|
nfqueue, there are no pre-built packages in the CentOS base or EPEL for
 | 
						|
libnfnetlink and libnetfilter_queue. If you wish, you may use the rpms in the
 | 
						|
Emerging Threats Cent OS 5 repository:
 | 
						|
i386
 | 
						|
 | 
						|
  sudo rpm -Uvh http://rules.emergingthreatspro.com/projects/emergingrepo/i386/
 | 
						|
  libnetfilter_queue-0.0.15-1.i386.rpm \
 | 
						|
  http://rules.emergingthreatspro.com/projects/emergingrepo/i386/
 | 
						|
  libnetfilter_queue-devel-0.0.15-1.i386.rpm \
 | 
						|
  http://rules.emergingthreatspro.com/projects/emergingrepo/i386/libnfnetlink-
 | 
						|
  0.0.30-1.i386.rpm \
 | 
						|
  http://rules.emergingthreatspro.com/projects/emergingrepo/i386/libnfnetlink-
 | 
						|
  devel-0.0.30-1.i386.rpm
 | 
						|
 | 
						|
x86_64
 | 
						|
 | 
						|
  sudo rpm -Uvh http://rules.emergingthreatspro.com/projects/emergingrepo/
 | 
						|
  x86_64/libnetfilter_queue-0.0.15-1.x86_64.rpm \
 | 
						|
  http://rules.emergingthreatspro.com/projects/emergingrepo/x86_64/
 | 
						|
  libnetfilter_queue-devel-0.0.15-1.x86_64.rpm \
 | 
						|
  http://rules.emergingthreatspro.com/projects/emergingrepo/x86_64/
 | 
						|
  libnfnetlink-0.0.30-1.x86_64.rpm \
 | 
						|
  http://rules.emergingthreatspro.com/projects/emergingrepo/x86_64/
 | 
						|
  libnfnetlink-devel-0.0.30-1.x86_64.rpm
 | 
						|
 | 
						|
 | 
						|
libcap-ng installation
 | 
						|
 | 
						|
This installation is needed for dropping privileges.
 | 
						|
 | 
						|
  wget http://people.redhat.com/sgrubb/libcap-ng/libcap-ng-0.6.4.tar.gz
 | 
						|
  tar -xzvf libcap-ng-0.6.4.tar.gz
 | 
						|
  cd libcap-ng-0.6.4
 | 
						|
  ./configure
 | 
						|
  make
 | 
						|
  sudo make install
 | 
						|
 | 
						|
 | 
						|
Suricata
 | 
						|
 | 
						|
To download and build Suricata, enter the following:
 | 
						|
 | 
						|
  wget http://www.openinfosecfoundation.org/download/suricata-1.3.3.tar.gz
 | 
						|
  tar -xvzf suricata-1.3.3.tar.gz
 | 
						|
  cd suricata-1.3.3
 | 
						|
 | 
						|
If you are building from Git sources, enter all the following commands:
 | 
						|
 | 
						|
  bash autogen.sh
 | 
						|
 | 
						|
If you are not building from Git sources, enter only:
 | 
						|
 | 
						|
  ./configure --prefix=/usr --sysconfdir=/etc --localstatedir=/var
 | 
						|
  make
 | 
						|
  sudo make install
 | 
						|
 | 
						|
 | 
						|
Auto setup
 | 
						|
 | 
						|
You can also use the available auto setup features of Suricata:
 | 
						|
ex:
 | 
						|
 | 
						|
     ./configure && make && make install-conf
 | 
						|
 | 
						|
make install-conf
 | 
						|
would do the regular "make install" and then it would automatically create/
 | 
						|
setup all the necessary directories and suricata.yaml for you.
 | 
						|
 | 
						|
     ./configure && make && make install-rules
 | 
						|
 | 
						|
make install-rules
 | 
						|
would do the regular "make install" and then it would automatically download
 | 
						|
and set up the latest ruleset from Emerging Threats available for Suricata
 | 
						|
 | 
						|
     ./configure && make && make install-full
 | 
						|
 | 
						|
make install-full
 | 
						|
would combine everything mentioned above (install-conf and install-rules) - and
 | 
						|
will present you with a ready to run (configured and set up) Suricata
 | 
						|
Please continue with the Basic_Setup.
 |