notbugAs an Amazon Associate I earn from qualifying purchases.
Want a good read? Try FreeBSD Mastery: Jails (IT Mastery Book 15)
Want a good monitor light? See my photosAll times are UTC
Ukraine
Port details
ossec-hids-server-config Configuration manager for ossec-hids-server
3.7.0 security on this many watch lists=2 search for ports that depend on this port Find issues related to this port Report an issue related to this port View this port on Repology. pkg-fallout 3.6.0_1Version of this port present on the latest quarterly branch.
Maintainer: dominik.lisiak@bemsoft.pl search for ports maintained by this maintainer
Port Added: 2018-11-09 18:52:47
Last Update: 2021-04-07 08:09:01
Commit Hash: cf118cc
People watching this port, also watch:: jdictionary, py311-Automat, py311-python-gdsii, py39-PyOpenGL, p5-Sane
License: GPLv2
WWW:
https://ossec.github.io
Description:
OSSEC is a scalable, multi-platform, open source Host-based Intrusion Detection System (HIDS). It has a powerful correlation and analysis engine, integrating log analysis, file integrity checking, Windows registry monitoring, centralized policy enforcement, rootkit detection, real-time alerting and active response. This package adds the configuration overlay with samples, additional rules, commands, scripts and support for multiple configuration files.
Homepage    cgit ¦ Codeberg ¦ GitHub ¦ GitLab ¦ SVNWeb

Manual pages:
FreshPorts has no man page information for this port.
pkg-plist: as obtained via: make generate-plist
Expand this list (45 items)
Collapse this list.
  1. /usr/local/share/licenses/ossec-hids-server-config-3.7.0/catalog.mk
  2. /usr/local/share/licenses/ossec-hids-server-config-3.7.0/LICENSE
  3. /usr/local/share/licenses/ossec-hids-server-config-3.7.0/GPLv2
  4. @dir(,ossec,0550) /usr/local/ossec-hids
  5. @dir(,ossec,0550) /usr/local/ossec-hids/active-response
  6. @dir(,ossec,0550) /usr/local/ossec-hids/active-response/bin
  7. @(,ossec,0550) /usr/local/ossec-hids/active-response/bin/merge-config.sh
  8. @dir(,,0550) /usr/local/ossec-hids/bin
  9. @dir(,,0550) /usr/local/ossec-hids/bin/command
  10. @(,,0550) /usr/local/ossec-hids/bin/command/last-logins.sh
  11. @(,,0550) /usr/local/ossec-hids/bin/command/open-ports.sh
  12. @dir(,,0550) /usr/local/ossec-hids/bin/config
  13. @(,,0550) /usr/local/ossec-hids/bin/config/agent-conf
  14. @(,,0550) /usr/local/ossec-hids/bin/config/ossec-conf
  15. @dir(,ossec,0550) /usr/local/ossec-hids/etc
  16. @dir(,ossec,0550) /usr/local/ossec-hids/etc/agent.conf.d
  17. @(,ossec,0640) /usr/local/ossec-hids/etc/agent.conf.d/120.rootcheck.conf
  18. @(,ossec,0640) /usr/local/ossec-hids/etc/agent.conf.d/130.syscheck.conf
  19. @(,ossec,0640) /usr/local/ossec-hids/etc/agent.conf.d/150.logs.conf
  20. @dir(,ossec,0550) /usr/local/ossec-hids/etc/agent.conf.d/disabled
  21. @(,ossec,0640) /usr/local/ossec-hids/etc/agent.conf.d/disabled/520.rootcheck.local.conf
  22. @(,ossec,0640) /usr/local/ossec-hids/etc/agent.conf.d/disabled/530.syscheck.local.conf
  23. @(,ossec,0640) /usr/local/ossec-hids/etc/agent.conf.d/disabled/550.logs.local.conf
  24. @sample(,ossec,0640) /usr/local/ossec-hids/etc/command.conf.sample
  25. @dir(,ossec,0550) /usr/local/ossec-hids/etc/ossec.conf.d
  26. @(,ossec,0640) /usr/local/ossec-hids/etc/ossec.conf.d/100.rules.conf
  27. @(,ossec,0640) /usr/local/ossec-hids/etc/ossec.conf.d/110.active-response.conf
  28. @(,ossec,0640) /usr/local/ossec-hids/etc/ossec.conf.d/120.rootcheck.conf
  29. @(,ossec,0640) /usr/local/ossec-hids/etc/ossec.conf.d/130.syscheck.conf
  30. @(,ossec,0640) /usr/local/ossec-hids/etc/ossec.conf.d/140.command-output.conf
  31. @(,ossec,0640) /usr/local/ossec-hids/etc/ossec.conf.d/150.logs.conf
  32. @sample(,ossec,0640) /usr/local/ossec-hids/etc/ossec.conf.d/900.local.conf.sample
  33. @dir(,ossec,0550) /usr/local/ossec-hids/etc/ossec.conf.d/disabled
  34. @(,ossec,0640) /usr/local/ossec-hids/etc/ossec.conf.d/disabled/500.rules.local.conf
  35. @(,ossec,0640) /usr/local/ossec-hids/etc/ossec.conf.d/disabled/510.active-response.local.conf
  36. @(,ossec,0640) /usr/local/ossec-hids/etc/ossec.conf.d/disabled/520.rootcheck.local.conf
  37. @(,ossec,0640) /usr/local/ossec-hids/etc/ossec.conf.d/disabled/530.syscheck.local.conf
  38. @(,ossec,0640) /usr/local/ossec-hids/etc/ossec.conf.d/disabled/540.command-output.local.conf
  39. @(,ossec,0640) /usr/local/ossec-hids/etc/ossec.conf.d/disabled/550.logs.local.conf
  40. @dir(,ossec,0550) /usr/local/ossec-hids/rules
  41. @(,ossec,0640) /usr/local/ossec-hids/rules/freebsd_cmdout_rules.xml
  42. @(,ossec,0640) /usr/local/ossec-hids/rules/freebsd_config_rules.xml
  43. @owner
  44. @group
  45. @mode
Collapse this list.
Dependency lines:
  • ossec-hids-server-config>0:security/ossec-hids-server-config
Conflicts:
CONFLICTS_INSTALL:
  • ossec-hids-client
  • ossec-hids-agent
  • ossec-hids-local
To install the port:
cd /usr/ports/security/ossec-hids-server-config/ && make install clean
To add the package, run one of these commands:
  • pkg install security/ossec-hids-server-config
  • pkg install ossec-hids-server-config
NOTE: If this package has multiple flavors (see below), then use one of them instead of the name specified above.
PKGNAME: ossec-hids-server-config
Flavors: there is no flavor information for this port.
distinfo:
TIMESTAMP = 1656551293 SHA256 (ossec-ossec-hids-3.7.0_GH0.tar.gz) = 23f5ede50f5de449db0a571fc453977f7079b4b47ce90b0ef31feed20df100e9 SIZE (ossec-ossec-hids-3.7.0_GH0.tar.gz) = 2518737

Packages (timestamps in pop-ups are UTC):
ossec-hids-server-config
ABIaarch64amd64armv6armv7i386powerpcpowerpc64powerpc64le
FreeBSD:13:latest-3.7.03.6.0_13.7.03.7.0-3.6.0_1-
FreeBSD:13:quarterly-3.7.03.7.03.7.03.7.03.7.03.7.03.7.0
FreeBSD:14:latest-3.7.03.7.03.7.03.7.03.7.0-3.7.0
FreeBSD:14:quarterly-3.7.0-3.7.03.7.03.7.03.7.03.7.0
FreeBSD:15:latest-3.7.0n/a3.7.0n/a3.7.03.7.03.7.0
Master port: security/ossec-hids-local-config
Dependencies
NOTE: FreshPorts displays only information on required and default dependencies. Optional dependencies are not covered.
Runtime dependencies:
  1. ossec-hids-server>=3.7.0 : security/ossec-hids-server
There are no ports dependent upon this port

Configuration Options:
===> The following configuration options are available for ossec-hids-server-config-3.7.0: ====> Alerting Rules DEFAULT_R=on: Rules provided by OSSEC CONFIG_R=on: Alert changes of the OSSEC main configuration files CMDOUT_R=on: Alert changes of output of the monitored commands ====> Active Response DEFAULT_C=on: Commands provided by OSSEC MERGE_C=on: Commands to merge configuration files MERGE_AR=on: Merge configuration files when they change RESTART_AR=on: Restart OSSEC when main configuration files change HOSTDENY_AR=off: Block the attacker's IP using access control files FWDROP_AR=off: Block the attacker's IP on the firewall ====> System Audit and Rootkit Detection (rootcheck) BASIC_RC=on: Basic audit and rootkits ====> File Integrity Checking (syscheck) NEWFILES_SC=on: Alert on new files created NOAUTO_SC=on: Disable auto_ignore feature BASIC_SC=on: "bin", "sbin" and "etc" directories OSSEC_SC=on: OSSEC directories PGSQL_SC=off: PostgreSQL configuration files ====> Command Output Monitoring LOGINS=on: Last logins PORTS_TCP=on: Open TCP ports PORTS_UDP=on: Open UDP ports ====> Log Monitoring BASIC=on: Basic system logs OSSEC=on: OSSEC active response logs APACHE=off: Apache logs NGINX=off: Nginx logs RADIUS=off: FreeRADIUS logs VSFTPD=off: Vsftpd logs ====> Pushed System Audit and Rootkit Detection (rootcheck) BASIC_RC_P=on: Basic audit and rootkits (profile: basic) CIS_RC_P=on: CIS benchmark - Legacy (profile: cis) CIS_L1_RC_P=on: CIS benchmark - Level 1 (profile: cis-level1) CIS_L2_RC_P=on: CIS benchmark - Level 2 (profile: cis-level2) ====> Pushed File Integrity Checking (syscheck) BASIC_SC_P=on: "bin", "sbin" and "etc" directories (profile: basic) OSSEC_SC_P=on: OSSEC directories (profile: ossec) PGSQL_SC_P=on: PostgreSQL configuration files (profile: postgresql) ====> Pushed Log Monitoring BASIC_P=on: Basic system logs (profile: basic) OSSEC_P=on: OSSEC active response logs (profile: ossec) APACHE_P=on: Apache logs (profile: apache) NGINX_P=on: Nginx logs (profile: nginx) RADIUS_P=on: FreeRADIUS logs (profile: radius) VSFTPD_P=on: Vsftpd logs (profile: vsftpd) ====> Active Response Firewall: you have to select exactly one of them NOFW=on: Custom or no firewall IPF=off: ipfilter IPFW=off: ipfirewall PF=off: Packet Filter ===> Use 'make config' to modify these settings
Options name:
security_ossec-hids-server-config
FreshPorts was unable to extract/find any pkg message
Master Sites:
  1. There is no master site for this port.

Number of commits found: 3

Commit History - (may be incomplete: for full details, see links to repositories near top of page)
This is a slave port. You may also want to view the commits to the master port: security/ossec-hids-local-config
CommitCreditsLog message
3.6.0_1
07 Apr 2021 08:09:01
commit hash: cf118ccf875508b9a1c570044c93cfcc82bd455ccommit hash: cf118ccf875508b9a1c570044c93cfcc82bd455ccommit hash: cf118ccf875508b9a1c570044c93cfcc82bd455ccommit hash: cf118ccf875508b9a1c570044c93cfcc82bd455c files touched by this commit
Mathieu Arnold (mat) search for other commits by this committer
One more small cleanup, forgotten yesterday.
Reported by:	lwhsu
3.6.0_1
06 Apr 2021 14:31:07
commit hash: 305f148f482daf30dcf728039d03d019f88344ebcommit hash: 305f148f482daf30dcf728039d03d019f88344ebcommit hash: 305f148f482daf30dcf728039d03d019f88344ebcommit hash: 305f148f482daf30dcf728039d03d019f88344eb files touched by this commit
Mathieu Arnold (mat) search for other commits by this committer
Remove # $FreeBSD$ from Makefiles.
3.1.0
09 Nov 2018 18:52:22
Revision:484537Original commit files touched by this commit
swills search for other commits by this committer
security/ossec-hids-server: update from 2.8.3 to 3.1.0

PR:		232794
Submitted by:	Dominik Lisiak <dominik.lisiak@bemsoft.pl> (maintainer)

Number of commits found: 3