Package: psad
Version: 2.1.5
Severity: wishlist
Tags: patch

PSAD's package description could do with some attention.

First, it thinks the latest version of Linux is 2.4.x, and claims to
support 2.2.x - in fact 2.4 is officially unsupported on oldstable.

Second, it has a rather hard to follow list of (lists of) features.
I've tried to tidy it into a clear bulleted list; if I've chopped it
up wrongly, my apologies, but that's more evidence it needs fixing.

And third, it claims to incorporate Snort signatures.  The NEWS file
says those were thrown out a while ago.

Here's a more nitpicky package description review - don't bother
reading it if I've already convinced you to accept the patch!

> HomePage: http://www.cipherdyne.org/psad/

(That camelcase is unconventional, but should be harmless.  So I
don't know why psad's PTS page doesn't show a link...)

> Package: psad
> Architecture: any         

(Does the dependency on iptables save it from needing to specify
"except the kfreebsd-* release arches"?)

>[...]
> Description: The Port Scan Attack Detector

This is close to the style recommended by the Developers Reference,
but it would be closer without the capitalised definite article.

>  PSAD is a collection of four lightweight system daemons written in
>  Perl and in C that is designed to work with Linux firewalling code
>  (iptables in the 2.4.x kernels, and ipchains in the 2.2.x kernels)

So just say "with iptables", and drop all the references to 2.2/2.4
and ipchains/iptables throughout.

>  to detect port scans. It features a set of highly configurable danger
                                     (1)
>  thresholds (with sensible defaults provided), verbose alert messages
                                                 (2)
>  that include the source, destination, scanned port range, begin and
                    (2a)    (2b)         (2c)                (2d)
>  end times, tcp flags and corresponding nmap options (Linux 2.4.x
   (2d')      (2e)          (2e'?  No, 2f?)
>  kernels only), reverse DNS info, email alerting, and automatic
                  (2g?  No, 3!)     (4)                 (5)
>  blocking of offending ip addresses via dynamic configuration of
>  ipchains/iptables firewall rulesets.

Plus some miscellaneous tweaks, such as using the shift key more for
Nmap, TCP, and IP (but fwsnort seems to be canonically lowercase).

> .
> In addition, for the 2.4.x kernels psad incorporates many
> of the tcp signatures included in Snort to detect highly suspect scans
> for:
> [...]

Discard all this; instead I've taken some text from the upstream
website.  My patch has this instead:

 Description: Port Scan Attack Detector
  PSAD is a collection of four lightweight system daemons (in Perl and
  C) designed to work with iptables to detect port scans. It features:
   * a set of highly configurable danger thresholds (with sensible
     defaults provided);
   * verbose alert messages that include the source, destination,
     scanned port range, beginning and end times, TCP flags, and
     corresponding Nmap options;
   * reverse DNS information;
   * alerts via email;
   * automatic blocking of offending IP addresses via dynamic firewall
     configuration.
  .
  When combined with fwsnort and the Netfilter string match extension,
  PSAD is capable of detecting many attacks described in the Snort rule
  set that involve application layer data.

-- 
JBR
Ankh kak! (Ancient Egyptian blessing)
diff -ru psad-2.1.5.pristine/debian/control psad-2.1.5/debian/control
--- psad-2.1.5.pristine/debian/control	2010-01-31 23:33:53.000000000 +0000
+++ psad-2.1.5/debian/control	2010-02-01 00:40:00.000000000 +0000
@@ -6,7 +6,7 @@
 Build-Depends: debhelper (>= 7), quilt
 Standards-Version: 3.8.3
 
-HomePage: http://www.cipherdyne.org/psad/
+Homepage: http://www.cipherdyne.org/psad/
 Package: psad
 Architecture: any
 Depends: ${misc:Depends}, ${shlibs:Depends}, ${perl:Depends},
@@ -17,23 +17,19 @@
 Recommends: bastille
 Suggests: fwsnort
 Conflicts: bastille (<< 1:1.3.0-4)
-Description: The Port Scan Attack Detector
- PSAD is a collection of four lightweight system daemons written in 
- Perl and in C that is designed to work with Linux firewalling code
- (iptables in the 2.4.x kernels, and ipchains in the 2.2.x kernels)
- to detect port scans. It features a set of highly configurable danger
- thresholds (with sensible defaults provided), verbose alert messages
- that include the source, destination, scanned port range, begin and 
- end times, tcp flags and corresponding nmap options (Linux 2.4.x 
- kernels only), reverse DNS info, email alerting, and automatic 
- blocking of offending ip addresses via dynamic configuration of 
- ipchains/iptables firewall rulesets.  
+Description: Port Scan Attack Detector
+ PSAD is a collection of four lightweight system daemons (in Perl and
+ C) designed to work with iptables to detect port scans. It features:
+  * a set of highly configurable danger thresholds (with sensible
+    defaults provided);
+  * verbose alert messages that include the source, destination,
+    scanned port range, beginning and end times, TCP flags, and
+    corresponding Nmap options;
+  * reverse DNS information;
+  * alerts via email;
+  * automatic blocking of offending IP addresses via dynamic firewall
+    configuration.
  .
- In addition, for the 2.4.x kernels psad incorporates many
- of the tcp signatures included in Snort to detect highly suspect scans
- for:
- .
-  * various backdoor programs (e.g. EvilFTP, GirlFriend, SubSeven)
-  * DDoS tools (mstream, shaft)
-  * advanced port scans (syn, fin, xmas) such as those made with nmap
- . 
+ When combined with fwsnort and the Netfilter string match extension,
+ PSAD is capable of detecting many attacks described in the Snort rule
+ set that involve application layer data.

Reply via email to