notbugAs an Amazon Associate I earn from qualifying purchases.
Want a good read? Try FreeBSD Mastery: Jails (IT Mastery Book 15)
Want a good monitor light? See my photosAll times are UTC
Ukraine
Port details
suricata High Performance Network IDS, IPS and Security Monitoring engine
8.0.2 security on this many watch lists=15 search for ports that depend on this port An older version of this port was marked as vulnerable. Find issues related to this port Report an issue related to this port View this port on Repology. pkg-fallout 7.0.11_1Version of this port present on the latest quarterly branch.
Maintainer: franco@opnsense.org search for ports maintained by this maintainer
Port Added: 2010-09-01 15:32:48
Last Update: 2025-11-21 09:48:52
Commit Hash: 6e743fa
People watching this port, also watch:: snort, openssl, aide, monit, gimp
License: GPLv2
WWW:
https://suricata.io
Description:
The Suricata Engine is an Open Source Next Generation Intrusion Detection and Prevention Engine developed by the Open Information Security Foundation (OISF). This engine is not intended to just replace or emulate the existing tools in the industry, but will bring new ideas and technologies to the field. OISF is part of and funded by the Department of Homeland Security's Directorate for Science and Technology HOST program (Homeland Open Security Technology), by the Navy's Space and Naval Warfare Systems Command (SPAWAR), as well as through the very generous support of the members of the OISF Consortium. More information about the Consortium is available, as well as a list of our current Consortium Members.
Homepage    cgit ¦ Codeberg ¦ GitHub ¦ GitLab ¦ SVNWeb

Manual pages:
pkg-plist: as obtained via: make generate-plist
Expand this list (135 items)
Collapse this list.
  1. @ldconfig
  2. /usr/local/share/licenses/suricata-8.0.2/catalog.mk
  3. /usr/local/share/licenses/suricata-8.0.2/LICENSE
  4. /usr/local/share/licenses/suricata-8.0.2/GPLv2
  5. bin/suricata
  6. bin/suricata-update
  7. bin/suricatactl
  8. bin/suricatasc
  9. lib/suricata/python/suricata/__init__.py
  10. lib/suricata/python/suricata/__pycache__/__init__.cpython-311.pyc
  11. lib/suricata/python/suricata/config/__pycache__/defaults.cpython-311.pyc
  12. lib/suricata/python/suricata/config/defaults.py
  13. lib/suricata/python/suricata/update/__init__.py
  14. lib/suricata/python/suricata/update/__pycache__/__init__.cpython-311.pyc
  15. lib/suricata/python/suricata/update/__pycache__/config.cpython-311.pyc
  16. lib/suricata/python/suricata/update/__pycache__/engine.cpython-311.pyc
  17. lib/suricata/python/suricata/update/__pycache__/exceptions.cpython-311.pyc
  18. lib/suricata/python/suricata/update/__pycache__/extract.cpython-311.pyc
  19. lib/suricata/python/suricata/update/__pycache__/loghandler.cpython-311.pyc
  20. lib/suricata/python/suricata/update/__pycache__/main.cpython-311.pyc
  21. lib/suricata/python/suricata/update/__pycache__/maps.cpython-311.pyc
  22. lib/suricata/python/suricata/update/__pycache__/matchers.cpython-311.pyc
  23. lib/suricata/python/suricata/update/__pycache__/net.cpython-311.pyc
  24. lib/suricata/python/suricata/update/__pycache__/notes.cpython-311.pyc
  25. lib/suricata/python/suricata/update/__pycache__/osinfo.cpython-311.pyc
  26. lib/suricata/python/suricata/update/__pycache__/parsers.cpython-311.pyc
  27. lib/suricata/python/suricata/update/__pycache__/rule.cpython-311.pyc
  28. lib/suricata/python/suricata/update/__pycache__/sources.cpython-311.pyc
  29. lib/suricata/python/suricata/update/__pycache__/util.cpython-311.pyc
  30. lib/suricata/python/suricata/update/__pycache__/version.cpython-311.pyc
  31. lib/suricata/python/suricata/update/commands/__init__.py
  32. lib/suricata/python/suricata/update/commands/__pycache__/__init__.cpython-311.pyc
  33. lib/suricata/python/suricata/update/commands/__pycache__/addsource.cpython-311.pyc
  34. lib/suricata/python/suricata/update/commands/__pycache__/checkversions.cpython-311.pyc
  35. lib/suricata/python/suricata/update/commands/__pycache__/disablesource.cpython-311.pyc
  36. lib/suricata/python/suricata/update/commands/__pycache__/enablesource.cpython-311.pyc
  37. lib/suricata/python/suricata/update/commands/__pycache__/listsources.cpython-311.pyc
  38. lib/suricata/python/suricata/update/commands/__pycache__/removesource.cpython-311.pyc
  39. lib/suricata/python/suricata/update/commands/__pycache__/updatesources.cpython-311.pyc
  40. lib/suricata/python/suricata/update/commands/addsource.py
  41. lib/suricata/python/suricata/update/commands/checkversions.py
  42. lib/suricata/python/suricata/update/commands/disablesource.py
  43. lib/suricata/python/suricata/update/commands/enablesource.py
  44. lib/suricata/python/suricata/update/commands/listsources.py
  45. lib/suricata/python/suricata/update/commands/removesource.py
  46. lib/suricata/python/suricata/update/commands/updatesources.py
  47. lib/suricata/python/suricata/update/compat/__init__.py
  48. lib/suricata/python/suricata/update/compat/__pycache__/__init__.cpython-311.pyc
  49. lib/suricata/python/suricata/update/compat/__pycache__/ordereddict.cpython-311.pyc
  50. lib/suricata/python/suricata/update/compat/argparse/__init__.py
  51. lib/suricata/python/suricata/update/compat/argparse/__pycache__/__init__.cpython-311.pyc
  52. lib/suricata/python/suricata/update/compat/argparse/__pycache__/argparse.cpython-311.pyc
  53. lib/suricata/python/suricata/update/compat/argparse/argparse.py
  54. lib/suricata/python/suricata/update/compat/ordereddict.py
  55. lib/suricata/python/suricata/update/config.py
  56. lib/suricata/python/suricata/update/configs/__init__.py
  57. lib/suricata/python/suricata/update/configs/__pycache__/__init__.cpython-311.pyc
  58. lib/suricata/python/suricata/update/configs/disable.conf
  59. lib/suricata/python/suricata/update/configs/drop.conf
  60. lib/suricata/python/suricata/update/configs/enable.conf
  61. lib/suricata/python/suricata/update/configs/modify.conf
  62. lib/suricata/python/suricata/update/configs/threshold.in
  63. lib/suricata/python/suricata/update/configs/update.yaml
  64. lib/suricata/python/suricata/update/data/__init__.py
  65. lib/suricata/python/suricata/update/data/__pycache__/__init__.cpython-311.pyc
  66. lib/suricata/python/suricata/update/data/__pycache__/index.cpython-311.pyc
  67. lib/suricata/python/suricata/update/data/__pycache__/update.cpython-311.pyc
  68. lib/suricata/python/suricata/update/data/index.py
  69. lib/suricata/python/suricata/update/data/update.py
  70. lib/suricata/python/suricata/update/engine.py
  71. lib/suricata/python/suricata/update/exceptions.py
  72. lib/suricata/python/suricata/update/extract.py
  73. lib/suricata/python/suricata/update/loghandler.py
  74. lib/suricata/python/suricata/update/main.py
  75. lib/suricata/python/suricata/update/maps.py
  76. lib/suricata/python/suricata/update/matchers.py
  77. lib/suricata/python/suricata/update/net.py
  78. lib/suricata/python/suricata/update/notes.py
  79. lib/suricata/python/suricata/update/osinfo.py
  80. lib/suricata/python/suricata/update/parsers.py
  81. lib/suricata/python/suricata/update/rule.py
  82. lib/suricata/python/suricata/update/sources.py
  83. lib/suricata/python/suricata/update/util.py
  84. lib/suricata/python/suricata/update/version.py
  85. share/man/man1/suricata.1.gz
  86. share/man/man1/suricatactl-filestore.1.gz
  87. share/man/man1/suricatactl.1.gz
  88. share/man/man1/suricatasc.1.gz
  89. share/doc/suricata/AUTHORS
  90. share/doc/suricata/Basic_Setup.txt
  91. share/doc/suricata/INSTALL
  92. share/doc/suricata/NEWS
  93. share/doc/suricata/README
  94. share/doc/suricata/Setting_up_IPSinline_for_Linux.txt
  95. share/doc/suricata/TODO
  96. share/doc/suricata/Third_Party_Installation_Guides.txt
  97. share/suricata/rules/app-layer-events.rules
  98. share/suricata/rules/decoder-events.rules
  99. share/suricata/rules/dhcp-events.rules
  100. share/suricata/rules/dnp3-events.rules
  101. share/suricata/rules/dns-events.rules
  102. share/suricata/rules/enip-events.rules
  103. share/suricata/rules/files.rules
  104. share/suricata/rules/ftp-events.rules
  105. share/suricata/rules/http-events.rules
  106. share/suricata/rules/http2-events.rules
  107. share/suricata/rules/ipsec-events.rules
  108. share/suricata/rules/kerberos-events.rules
  109. share/suricata/rules/mdns-events.rules
  110. share/suricata/rules/modbus-events.rules
  111. share/suricata/rules/mqtt-events.rules
  112. share/suricata/rules/nfs-events.rules
  113. share/suricata/rules/ntp-events.rules
  114. share/suricata/rules/pgsql-events.rules
  115. share/suricata/rules/pop3-events.rules
  116. share/suricata/rules/quic-events.rules
  117. share/suricata/rules/rfb-events.rules
  118. share/suricata/rules/smb-events.rules
  119. share/suricata/rules/smtp-events.rules
  120. share/suricata/rules/ssh-events.rules
  121. share/suricata/rules/stream-events.rules
  122. share/suricata/rules/tls-events.rules
  123. share/suricata/rules/websocket-events.rules
  124. @sample etc/suricata/classification.config.sample
  125. @sample etc/suricata/reference.config.sample
  126. @sample etc/suricata/suricata.yaml.sample
  127. @sample etc/suricata/threshold.config.sample
  128. @dir share/suricata
  129. @dir share/doc/suricata
  130. @dir etc/suricata
  131. @dir(root,wheel,0700) /var/log/suricata
  132. @postunexec if [ -d %D/etc/suricata ]; then echo "==> If you are permanently removing this port, run ``rm -rf ${PKG_PREFIX}/etc/suricata`` to remove configuration files."; fi
  133. @owner
  134. @group
  135. @mode
Collapse this list.
USE_RC_SUBR (Service Scripts)
  • suricata
Dependency lines:
  • suricata>0:security/suricata
To install the port:
cd /usr/ports/security/suricata/ && make install clean
To add the package, run one of these commands:
  • pkg install security/suricata
  • pkg install suricata
NOTE: If this package has multiple flavors (see below), then use one of them instead of the name specified above.
PKGNAME: suricata
Flavors: there is no flavor information for this port.
distinfo:
TIMESTAMP = 1762422775 SHA256 (suricata-8.0.2.tar.gz) = 9d450ca2cadbe101993e99033a62349d2bda9dfd90a6acc1bcb6cc6db76eb551 SIZE (suricata-8.0.2.tar.gz) = 44124259

Packages (timestamps in pop-ups are UTC):
suricata
ABIaarch64amd64armv6armv7i386powerpcpowerpc64powerpc64le
FreeBSD:13:latest7.0.11_28.0.2-7.0.11_18.0.2n/an/an/a
FreeBSD:13:quarterly7.0.11_17.0.11_1-7.0.10_27.0.11_1n/an/an/a
FreeBSD:14:latest7.0.11_28.0.2-7.0.118.0.2--6.0.12_1
FreeBSD:14:quarterly7.0.11_17.0.11_1-7.0.10_27.0.11_1-7.0.2_17.0.2_1
FreeBSD:15:latest7.0.11_38.0.2n/a7.0.11n/an/a7.0.2_3-
FreeBSD:15:quarterly7.0.11_17.0.11_1n/a-n/an/a--
FreeBSD:16:latest7.0.11_28.0.2n/a-n/an/a--
Dependencies
NOTE: FreshPorts displays only information on required and default dependencies. Optional dependencies are not covered.
Build dependencies:
  1. rustc : lang/rust
  2. py311-pyyaml>=0 : devel/py-pyyaml@py311
  3. gmake>=4.4.1 : devel/gmake
  4. pkgconf>=1.3.0_1 : devel/pkgconf
  5. python3.11 : lang/python311
  6. autoconf>=2.72 : devel/autoconf
  7. automake>=1.17 : devel/automake
  8. libtoolize : devel/libtool
Test dependencies:
  1. python3.11 : lang/python311
Runtime dependencies:
  1. py311-pyyaml>=0 : devel/py-pyyaml@py311
  2. python3.11 : lang/python311
Library dependencies:
  1. libjansson.so : devel/jansson
  2. liblz4.so : archivers/liblz4
  3. libnet.so : net/libnet
  4. libpcre2-8.so : devel/pcre2
  5. libyaml.so : textproc/libyaml
  6. libiconv.so : converters/libiconv
There are no ports dependent upon this port

Configuration Options:
===> The following configuration options are available for suricata-8.0.2: GEOIP=off: GeoIP support HYPERSCAN=off: Hyperscan support IPFW=on: IPFW and IP Divert support for inline IDP NETMAP=on: Netmap support for inline IDP NSS=off: File checksums and SSL/TLS fingerprinting PORTS_PCAP=off: Use libpcap from ports PYTHON=on: Python-based update and control utilities REDIS=off: Redis output support TESTS=off: Unit tests in suricata binary ====> Scripting: you can only select none or one of them LUA=off: LUA scripting support LUAJIT=off: LuaJIT scripting support ===> Use 'make config' to modify these settings
Options name:
security_suricata
USES:
autoreconf cpe gmake iconv:translit libtool localbase pathfix pkgconfig python
FreshPorts was unable to extract/find any pkg message
Master Sites:
Expand this list (1 items)
Collapse this list.
  1. https://www.openinfosecfoundation.org/download/
Collapse this list.

Number of commits found: 211 (showing only 11 on this page)

«  1 | 2 | 3 

Commit History - (may be incomplete: for full details, see links to repositories near top of page)
CommitCreditsLog message
1.1.1
14 Jan 2012 08:57:23
Original commit files touched by this commit This port version is marked as vulnerable.
dougb search for other commits by this committer
In the rc.d scripts, change assignments to rcvar to use the
literal name_enable wherever possible, and ${name}_enable
when it's not, to prepare for the demise of set_rcvar().

In cases where I had to hand-edit unusual instances also
modify formatting slightly to be more uniform (and in
some cases, correct). This includes adding some $FreeBSD$
tags, and most importantly moving rcvar= to right after
name= so it's clear that one is derived from the other.
1.1.1
10 Jan 2012 19:34:02
Original commit files touched by this commit This port version is marked as vulnerable.
wxs search for other commits by this committer
- Update to 1.1.1.
- Use libhtp from ports instead of the bundled one.
- Remove check for 6.x.

PR:             ports/163603
Submitted by:   wxs@
Approved by:    eksffa@freebsdbrasil.com.br (maintiner timeout)
1.0.3
08 Jan 2012 07:01:25
Original commit files touched by this commit This port version is marked as vulnerable.
eadler search for other commits by this committer
Repeated words are are hard to to find sometimes.

Approved by:    portmgr (itetcu)
1.0.3
19 Jul 2011 21:14:31
Original commit files touched by this commit This port version is marked as vulnerable.
zi search for other commits by this committer
Add DAG Support
Fix build when using custom LOCALBASE/PREFIX
Pacify portlint(1)

PR:             ports/158147
Submitted by:   rpsfa@rit.edu (me)
Approved by:    maintainer timeout, tabthorpe (mentor)
1.0.3
22 Jun 2011 00:29:16
Original commit files touched by this commit This port version is marked as vulnerable.
wxs search for other commits by this committer
- Update to 1.0.3.
- Add LICENSE.

PR:             ports/157860
Submitted by:   Ryan Steinmetz <rpsfa@rit.edu>
Approved by:    Patrick Tracanelli <eksffa@freebsdbrasil.com.br> (maintainer)
1.0.1_1
04 Dec 2010 07:34:27
Original commit files touched by this commit This port version is marked as vulnerable.
ade search for other commits by this committer
Sync to new bsd.autotools.mk
1.0.1_1
16 Oct 2010 11:52:47
Original commit files touched by this commit This port version is marked as vulnerable.
ade search for other commits by this committer
Punt autoconf267->autoconf268
1.0.1_1
17 Sep 2010 09:31:03
Original commit files touched by this commit This port version is marked as vulnerable.
linimon search for other commits by this committer
Mark as broken on sparc64 (and, by implication, the other tier-2 archs).

Hat:            portmgr
1.0.1_1
15 Sep 2010 18:35:24
Original commit files touched by this commit This port version is marked as vulnerable.
ade search for other commits by this committer
Autotools update.   Read ports/UPDATING 20100915 for details.

Approved by:    portmgr (for Mk/bsd.port.mk part)
Tested by:      Multiple -exp runs
1.0.1
09 Sep 2010 11:41:48
Original commit files touched by this commit This port version is marked as vulnerable.
pav search for other commits by this committer
- Mark BROKEN on 6.X: does not configure

PR:             ports/150393 (based on)
Submitted by:   Patrick Tracanelli <eksffa@freebsdbrasil.com.br> (maintainer)
1.0.1
01 Sep 2010 15:31:52
Original commit files touched by this commit This port version is marked as vulnerable.
jmelo search for other commits by this committer
The Suricata Engine is an Open Source Next Generation Intrusion Detection and
Prevention Engine developed by the Open Information Security Foundation (OISF).

This engine is not intended to just replace or emulate the existing tools in
the industry, but will bring new ideas and technologies to the field.

OISF is part of and funded by the Department of Homeland Security's Directorate
for Science and Technology HOST program (Homeland Open Security Technology),
by the the Navy's Space and Naval Warfare Systems Command (SPAWAR), as well as
through the very generous support of the members of the OISF Consortium.

More information about the Consortium is available, as well as a list of our
current Consortium Members.

The Suricata Engine and the HTP Library are available to use under the GPLv2.

The HTP Library is an HTTP normalizer and parser written by Ivan Ristic of
Mod Security fame for the OISF. This integrates and provides very advanced
processing of HTTP streams for Suricata. The HTP library is required by the
engine but may also be used independently in a range of applications and tools.

WWW: http://openinfosecfoundation.org

PR:             ports/150191
Submitted by:   Patrick Tracanelli <eksffa@freebsdbrasil.com.br>

Number of commits found: 211 (showing only 11 on this page)

«  1 | 2 | 3