aboutsummaryrefslogtreecommitdiffstats
path: root/framework/src/suricata/doc/CentOS_56_Installation.txt
blob: 8bb835f1fe4dfbddd247714b8c95f1fc3b30c901 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
Autogenerated on 2012-11-29
from - https://redmine.openinfosecfoundation.org/projects/suricata/wiki/CentOS_56_Installation


CentOS 5.6 Installation


Pre-installation requirements

You will have to use the Fedora EPEL repository for some packages to enable
this repository. It is the same for i386 and x86_64:

  sudo rpm -Uvh http://dl.fedoraproject.org/pub/epel/5/x86_64/epel-release-5-
  4.noarch.rpm

Before you can build Suricata for your system, run the following command to
ensure that you have everything you need for the installation.

  sudo yum -y install libpcap libpcap-devel libnet libnet-devel pcre \
  pcre-devel gcc gcc-c++ automake autoconf libtool make libyaml \
  libyaml-devel zlib zlib-devel

Depending on the current status of your system, it may take a while to complete
this process.

HTP

HTP is bundled with Suricata and installed automatically. If you need to
install HTP manually for other reasons, instructions can be found at HTP
library_installation.


IPS


If you plan to build Suricata with IPS capabilities via ./configure --enable-
nfqueue, there are no pre-built packages in the CentOS base or EPEL for
libnfnetlink and libnetfilter_queue. If you wish, you may use the rpms in the
Emerging Threats Cent OS 5 repository:
i386

  sudo rpm -Uvh http://rules.emergingthreatspro.com/projects/emergingrepo/i386/
  libnetfilter_queue-0.0.15-1.i386.rpm \
  http://rules.emergingthreatspro.com/projects/emergingrepo/i386/
  libnetfilter_queue-devel-0.0.15-1.i386.rpm \
  http://rules.emergingthreatspro.com/projects/emergingrepo/i386/libnfnetlink-
  0.0.30-1.i386.rpm \
  http://rules.emergingthreatspro.com/projects/emergingrepo/i386/libnfnetlink-
  devel-0.0.30-1.i386.rpm

x86_64

  sudo rpm -Uvh http://rules.emergingthreatspro.com/projects/emergingrepo/
  x86_64/libnetfilter_queue-0.0.15-1.x86_64.rpm \
  http://rules.emergingthreatspro.com/projects/emergingrepo/x86_64/
  libnetfilter_queue-devel-0.0.15-1.x86_64.rpm \
  http://rules.emergingthreatspro.com/projects/emergingrepo/x86_64/
  libnfnetlink-0.0.30-1.x86_64.rpm \
  http://rules.emergingthreatspro.com/projects/emergingrepo/x86_64/
  libnfnetlink-devel-0.0.30-1.x86_64.rpm


libcap-ng installation

This installation is needed for dropping privileges.

  wget http://people.redhat.com/sgrubb/libcap-ng/libcap-ng-0.6.4.tar.gz
  tar -xzvf libcap-ng-0.6.4.tar.gz
  cd libcap-ng-0.6.4
  ./configure
  make
  sudo make install


Suricata

To download and build Suricata, enter the following:

  wget http://www.openinfosecfoundation.org/download/suricata-1.3.3.tar.gz
  tar -xvzf suricata-1.3.3.tar.gz
  cd suricata-1.3.3

If you are building from Git sources, enter all the following commands:

  bash autogen.sh

If you are not building from Git sources, enter only:

  ./configure --prefix=/usr --sysconfdir=/etc --localstatedir=/var
  make
  sudo make install


Auto setup

You can also use the available auto setup features of Suricata:
ex:

     ./configure && make && make install-conf

make install-conf
would do the regular "make install" and then it would automatically create/
setup all the necessary directories and suricata.yaml for you.

     ./configure && make && make install-rules

make install-rules
would do the regular "make install" and then it would automatically download
and set up the latest ruleset from Emerging Threats available for Suricata

     ./configure && make && make install-full

make install-full
would combine everything mentioned above (install-conf and install-rules) - and
will present you with a ready to run (configured and set up) Suricata
Please continue with the Basic_Setup.