Solved

Snort configure - unrecognized options

Posted on 2014-12-30
2
500 Views
Last Modified: 2015-01-05
Trying to install Snort with BASE using this guide - https://www.howtoforge.com/intrusion_detection_base_snort_p3 

When I run this command I get the below error. ./configure --enable-dynamicplugin --with-mysql

WARNING: unrecognized options: --enable-dynamicplugin, --with-mysql

From googling it looks like --with-mysql has been deprecated and I can't seem to find anything on --enable-dynamicplugin.

BASE requires a DB to be setup in order for it to work, can anyone please help me set this up?

Thanks.
0
Comment
Question by:gman
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 38

Accepted Solution

by:
Rich Rumble earned 500 total points
ID: 40524263
BASE is waaaaaaay outdated... But as for MySQL being deprecated, it's only the direct output to MySQL that is deprecated. You have to convert Unified2 to MySQL using Barnyard2, then you can get your Snort alerts into MySQL that way. Snort dropped the direct logging to MySQL a year or so ago.
Drop the --with-mysql when configuring Snort.
I'd suggest you try the Security Onion actually. You can choose from Snort, Bro-IDS or Suricata, and it will create and configure a front-end like Sguil and Snorby (which are much more modern than ACID or BASE).
-rich
0
 
LVL 62

Expert Comment

by:gheist
ID: 40524779
Which linux distribution? khm khm.
does ./configure --help list those options? I think no - they are long obsolete, and possibly guide is for some prehistoric version.
0

Featured Post

[Webinar] Learn How Hackers Steal Your Credentials

Do You Know How Hackers Steal Your Credentials? Join us and Skyport Systems to learn how hackers steal your credentials and why Active Directory must be secure to stop them. Thursday, July 13, 2017 10:00 A.M. PDT

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Many of you may be aware of the recent Google Docs scam emails that have been floating around coming from various people that you know. Here's a guide on identifying How To Identify the Scam Email You will see an email from someone you’ve had co…
This article provides a convenient collection of links to Microsoft provided Security Patches for operating systems that have reached their End of Life support cycle. Included operating systems covered by this article are Windows XP,  Windows Server…
Learn how to find files with the shell using the find and locate commands. Use locate to find a needle in a haystack.: With locate, check if the file still exists.: Use find to get the actual location of the file.:
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

696 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question