Result for 3CE1FFE2B6905185683FA8B351C890AE17D41251

Query result

Key Value
FileName./usr/share/doc/fwsnort/README
FileSize3270
MD5F430B0446274CF4BAFB424307087B1A7
SHA-13CE1FFE2B6905185683FA8B351C890AE17D41251
SHA-256B314DDE868071E1F31CD1913E9CACFFD50625129911857420EF740431394F6B3
SSDEEP48:iLxmCaWj6hz5RwzgjuZzZwSPkzGhXWRzH8IOzJZrmg9qDlpXd/AUF0KNE1YRMiH+:WxmCOAgqrbVWdEZqfd/UKNAGnR730
TLSHT15861861E3B04937E18C053E5764EA3E4B72981DE6379907584AF929DA513A7A42F3CE0
hashlookup:parent-total7
hashlookup:trust85

Network graph view

Parents (Total: 7)

The searched file hash is included in 7 parent files which include package known and seen by metalookup. A sample is included below:

Key Value
MD5BB90A342C993FE24DCD3DF0A34DEB4C3
PackageArchnoarch
PackageDescriptionfwsnort translates Snort rules into equivalent iptables rules and generates a Bourne shell script that implements the resulting iptables commands. This ruleset allows network traffic that exhibits Snort signatures to be logged and/or dropped by iptables directly without putting any interface into promiscuous mode or queuing packets from kernel to user space. In addition, fwsnort (optionally) uses the IPTables::Parse module to parse the iptables ruleset on the machine to determine which Snort rules are applicable to the specific iptables policy. After all, if iptables is blocking all inbound http traffic from external addresses, it is probably not of much use to try detecting inbound attacks against against tcp/80. By default fwsnort generates iptables rules that log Snort sid's with --log-prefix to klogd where the messages can be analyzed with a log watcher such as logwatch or psad (see http://www.cipherdyne.org/psad). fwsnort relies on the iptables string match extension to match Snort content fields in the application portion of ip traffic. Since Snort rules can contain hex data in content fields, fwsnort implements a patch against iptables-1.2.7a which adds a "--hex-string" option which will accept content fields such as "|0d0a5b52504c5d3030320d0a|". fwsnort bundles the latest rule set from Emerging Threats (http://www.emergingthreats.net) and also includes all rules from the Snort-2.3.3 IDS - the final Snort rule set that was released under the GPL. fwsnort is able to translate well over 60% of all bundled rules. For more information about the translation strategy as well as advantages/disadvantages of the method used by fwsnort to obtain intrusion detection data, see the README included with the fwsnort sources or browse to: http://www.cipherdyne.org/fwsnort/
PackageMaintainerumeabot <umeabot>
PackageNamefwsnort
PackageRelease3.mga8
PackageVersion1.6.8
SHA-16055C9674118F052108108A4B6632E6FC26EC88D
SHA-2563D2CE0F006EA20B263D464340859DF8EADDCE23AC5790FF1A18A21C20B9FAF39
Key Value
MD51DE9FB13ED0C22D060A695D6BF5DE2CB
PackageArchnoarch
PackageDescriptionfwsnort translates Snort rules into equivalent iptables rules and generates a Bourne shell script that implements the resulting iptables commands. This ruleset allows network traffic that exhibits Snort signatures to be logged and/or dropped by iptables directly without putting any interface into promiscuous mode or queuing packets from kernel to user space. In addition, fwsnort (optionally) uses the IPTables::Parse module to parse the iptables ruleset on the machine to determine which Snort rules are applicable to the specific iptables policy. After all, if iptables is blocking all inbound http traffic from external addresses, it is probably not of much use to try detecting inbound attacks against against tcp/80. By default fwsnort generates iptables rules that log Snort sid's with --log-prefix to klogd where the messages can be analyzed with a log watcher such as logwatch or psad (see http://www.cipherdyne.org/psad). fwsnort relies on the iptables string match extension to match Snort content fields in the application portion of ip traffic. Since Snort rules can contain hex data in content fields, fwsnort implements a patch against iptables-1.2.7a which adds a "--hex-string" option which will accept content fields such as "|0d0a5b52504c5d3030320d0a|". fwsnort bundles the latest rule set from Emerging Threats (http://www.emergingthreats.net) and also includes all rules from the Snort-2.3.3 IDS - the final Snort rule set that was released under the GPL. fwsnort is able to translate well over 60% of all bundled rules. For more information about the translation strategy as well as advantages/disadvantages of the method used by fwsnort to obtain intrusion detection data, see the README included with the fwsnort sources or browse to: http://www.cipherdyne.org/fwsnort/
PackageMaintainerumeabot <umeabot>
PackageNamefwsnort
PackageRelease2.mga7
PackageVersion1.6.8
SHA-11655E61088A6FEE30058894AE91221A1158B291A
SHA-256BECB99C34E49DE4A9031770B1DD09964E78B3DDA6FF1BCEC3FE851609E0BBBC1
Key Value
FileSize63602
MD523AE4743FFF56ADAB5B15762732ECCB4
PackageDescriptionSnort-to-iptables rule translator Fwsnort translates Snort rules into equivalent iptables rules and generates a shell script that implements the resulting iptables commands. . This allows network traffic that matches Snort signatures to be logged and/or dropped by iptables directly without putting any interface into promiscuous mode or queuing packets from kernel to user space.
PackageMaintainerDebian QA Group <packages@qa.debian.org>
PackageNamefwsnort
PackageSectionadmin
PackageVersion1.6.7-3
SHA-13BDAE96224CF798E0E2AE86049D8D8BAF4800C93
SHA-256CD51A61EFA94D6D53B6EF51C1FC839D612820C43C28B21DDF8EB189A73C92DAD
Key Value
FileSize50864
MD5C9171FC2473C243788A86CBDA3313104
PackageDescriptionSnort-to-iptables rule translator Fwsnort translates Snort rules into equivalent iptables rules and generates a shell script that implements the resulting iptables commands. . This allows network traffic that matches Snort signatures to be logged and/or dropped by iptables directly without putting any interface into promiscuous mode or queuing packets from kernel to user space.
PackageMaintainerUbuntu Developers <ubuntu-devel-discuss@lists.ubuntu.com>
PackageNamefwsnort
PackageSectionadmin
PackageVersion1.6.8-1
SHA-12DF4D89B4621D3364581455421637CBBC32AD443
SHA-2566329F4E6D21A3B191AF65928A1E92D2B57E17439572FBCF927FF99209CA4EDC0
Key Value
FileSize63896
MD5CF6802B8C3B4ED76C828B18C0E7549B1
PackageDescriptionSnort-to-iptables rule translator Fwsnort translates Snort rules into equivalent iptables rules and generates a shell script that implements the resulting iptables commands. . This allows network traffic that matches Snort signatures to be logged and/or dropped by iptables directly without putting any interface into promiscuous mode or queuing packets from kernel to user space.
PackageMaintainerDebian QA Group <packages@qa.debian.org>
PackageNamefwsnort
PackageSectionadmin
PackageVersion1.6.8-1
SHA-1AAF189A2B1A5F05190703DCDC455F44A8EF25900
SHA-2568153DF9CE1BF9E992FC4DC6A17265A1FF2BF0BDA6D38CAF64EEFA5586CABD7FC
Key Value
FileSize50938
MD5FC3EAB6AE56E032EA1CC0B34D8C02412
PackageDescriptionSnort-to-iptables rule translator Fwsnort translates Snort rules into equivalent iptables rules and generates a shell script that implements the resulting iptables commands. . This allows network traffic that matches Snort signatures to be logged and/or dropped by iptables directly without putting any interface into promiscuous mode or queuing packets from kernel to user space.
PackageMaintainerUbuntu Developers <ubuntu-devel-discuss@lists.ubuntu.com>
PackageNamefwsnort
PackageSectionadmin
PackageVersion1.6.7-3
SHA-1510074659B1F31FC7AB2FDE416B2D06949A40C22
SHA-2562D70C19E990E48E5F727ED3F5DC5E64CAA1C5ED604B27DB5D0D24A9DE8FCC8BD
Key Value
MD5994776189AF9B7BFD4D600AEC0D0D320
PackageArchnoarch
PackageDescriptionfwsnort translates Snort rules into equivalent iptables rules and generates a Bourne shell script that implements the resulting iptables commands. This ruleset allows network traffic that exhibits Snort signatures to be logged and/or dropped by iptables directly without putting any interface into promiscuous mode or queuing packets from kernel to user space. In addition, fwsnort (optionally) uses the IPTables::Parse module to parse the iptables ruleset on the machine to determine which Snort rules are applicable to the specific iptables policy. After all, if iptables is blocking all inbound http traffic from external addresses, it is probably not of much use to try detecting inbound attacks against against tcp/80. By default fwsnort generates iptables rules that log Snort sid's with --log-prefix to klogd where the messages can be analyzed with a log watcher such as logwatch or psad (see http://www.cipherdyne.org/psad). fwsnort relies on the iptables string match extension to match Snort content fields in the application portion of ip traffic. Since Snort rules can contain hex data in content fields, fwsnort implements a patch against iptables-1.2.7a which adds a "--hex-string" option which will accept content fields such as "|0d0a5b52504c5d3030320d0a|". fwsnort bundles the latest rule set from Emerging Threats (http://www.emergingthreats.net) and also includes all rules from the Snort-2.3.3 IDS - the final Snort rule set that was released under the GPL. fwsnort is able to translate well over 60% of all bundled rules. For more information about the translation strategy as well as advantages/disadvantages of the method used by fwsnort to obtain intrusion detection data, see the README included with the fwsnort sources or browse to: http://www.cipherdyne.org/fwsnort/
PackageMaintainerumeabot <umeabot>
PackageNamefwsnort
PackageRelease4.mga9
PackageVersion1.6.8
SHA-1AF540E17609D5DDDEA46860286E6EC66417442DD
SHA-256D58A5F8F5E9C436B934A45E1F2B9B3FD5B8C437CB0C0BEA2EFDBC21A17604512