<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://lms.onnocenter.or.id/wiki/index.php?action=history&amp;feed=atom&amp;title=Suricata%3A_Instalasi_Snorby_%26_barnyard2</id>
	<title>Suricata: Instalasi Snorby &amp; barnyard2 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://lms.onnocenter.or.id/wiki/index.php?action=history&amp;feed=atom&amp;title=Suricata%3A_Instalasi_Snorby_%26_barnyard2"/>
	<link rel="alternate" type="text/html" href="https://lms.onnocenter.or.id/wiki/index.php?title=Suricata:_Instalasi_Snorby_%26_barnyard2&amp;action=history"/>
	<updated>2026-04-20T18:16:57Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.45.1</generator>
	<entry>
		<id>https://lms.onnocenter.or.id/wiki/index.php?title=Suricata:_Instalasi_Snorby_%26_barnyard2&amp;diff=60615&amp;oldid=prev</id>
		<title>Onnowpurbo: /* Referensi */</title>
		<link rel="alternate" type="text/html" href="https://lms.onnocenter.or.id/wiki/index.php?title=Suricata:_Instalasi_Snorby_%26_barnyard2&amp;diff=60615&amp;oldid=prev"/>
		<updated>2020-03-30T03:43:29Z</updated>

		<summary type="html">&lt;p&gt;&lt;span class=&quot;autocomment&quot;&gt;Referensi&lt;/span&gt;&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 03:43, 30 March 2020&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l671&quot;&gt;Line 671:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 671:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* https://www.corelan.be/index.php/2011/02/27/cheat-sheet-installing-snorby-2-2-with-apache2-and-suricata-with-barnyard2-on-ubuntu-10-x/&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* https://www.corelan.be/index.php/2011/02/27/cheat-sheet-installing-snorby-2-2-with-apache2-and-suricata-with-barnyard2-on-ubuntu-10-x/&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-side-deleted&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-side-deleted&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;==Pranala Menarik==&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-side-deleted&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-side-deleted&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;* [[Suricata]]&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-side-deleted&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;* [[Suricata (software)]]&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-side-deleted&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;* [[Suricata: Instalasi di Ubuntu]]&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-side-deleted&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;* [[Suricata: Instalasi di Ubuntu 18.04]]&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-side-deleted&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;* [[Suricata: Konfigurasi Minimal Ubuntu 18.04]]&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-side-deleted&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;* [[Suricata: Test DDoS Attack]]&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-side-deleted&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;* [[Suricata: Konfigurasi Dasar]]&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-side-deleted&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;* [[Suricata: Manajemen Rule dengan Oinkmaster]]&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-side-deleted&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;* [[Suricata: Instalasi Snorby &amp;amp; barnyard2]]&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Onnowpurbo</name></author>
	</entry>
	<entry>
		<id>https://lms.onnocenter.or.id/wiki/index.php?title=Suricata:_Instalasi_Snorby_%26_barnyard2&amp;diff=43217&amp;oldid=prev</id>
		<title>Onnowpurbo: New page: Cheat sheet : Installing Snorby 2.2 with Apache2 and Suricata with Barnyard2 on Ubuntu 10.x Published February 27, 2011 | By Corelan Team (corelanc0d3r) Introduction  After spending a few ...</title>
		<link rel="alternate" type="text/html" href="https://lms.onnocenter.or.id/wiki/index.php?title=Suricata:_Instalasi_Snorby_%26_barnyard2&amp;diff=43217&amp;oldid=prev"/>
		<updated>2015-06-01T08:57:26Z</updated>

		<summary type="html">&lt;p&gt;New page: Cheat sheet : Installing Snorby 2.2 with Apache2 and Suricata with Barnyard2 on Ubuntu 10.x Published February 27, 2011 | By Corelan Team (corelanc0d3r) Introduction  After spending a few ...&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;Cheat sheet : Installing Snorby 2.2 with Apache2 and Suricata with Barnyard2 on Ubuntu 10.x&lt;br /&gt;
Published February 27, 2011 | By Corelan Team (corelanc0d3r)&lt;br /&gt;
Introduction&lt;br /&gt;
&lt;br /&gt;
After spending a few hours fighting a battle against Snorby and Apache2 + Passenger, I finally managed to get it to run properly on my Ubunty 10.x box (32bit). Looking back, I figured I might not be the only one who is having issues with this.&lt;br /&gt;
&lt;br /&gt;
So I decided to publish the notes I took while setting everything up, and as a little bonus, explain how to install and configure Suricata as well (configured in combination with barnyard2 which will pick up local logs and send them to the remote MySQL server).&lt;br /&gt;
&lt;br /&gt;
There are the components that will be installed :&lt;br /&gt;
&lt;br /&gt;
    Snorby 2.x (latest revision from git)&lt;br /&gt;
    MySql 5&lt;br /&gt;
    Ruby 1.9.2p0&lt;br /&gt;
    Apache2&lt;br /&gt;
    Passenger 3&lt;br /&gt;
    Barnyard 2&lt;br /&gt;
    Suricata 1.1beta1 with emerging-threat ruleset&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
Install dependencies / prerequisites for Snorby&lt;br /&gt;
Packages&lt;br /&gt;
&lt;br /&gt;
First, make sure your system is up to date :&lt;br /&gt;
&lt;br /&gt;
aptitude update&lt;br /&gt;
apt-get update&lt;br /&gt;
apt-get upgrade&lt;br /&gt;
apt-get dist-upgrade&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Then install new packages :&lt;br /&gt;
&lt;br /&gt;
apt-get install gcc g++ build-essential libssl-dev libreadline5-dev \&lt;br /&gt;
     zlib1g-dev linux-headers-generic libsqlite3-dev libxslt-dev libxml2-dev \&lt;br /&gt;
     imagemagick git-core libmysqlclient-dev mysql-server libmagickwand-dev \&lt;br /&gt;
     default-jre&lt;br /&gt;
&lt;br /&gt;
wkhtmlpdf with QT patch&lt;br /&gt;
&lt;br /&gt;
cd /tmp&lt;br /&gt;
wget http://wkhtmltopdf.googlecode.com/files/wkhtmltopdf-0.10.0_rc2-static-i386.tar.bz2&lt;br /&gt;
bunzip2 wkhtmltopdf-0.10.0_rc2-static-i386.tar.bz2&lt;br /&gt;
tar xvf wkhtmltopdf-0.10.0_rc2-static-i386.tar&lt;br /&gt;
cp wkhtmltopdf-i386 /usr/bin/wkhtmltopdf&lt;br /&gt;
&lt;br /&gt;
Ruby 1.9.2p0&lt;br /&gt;
&lt;br /&gt;
cd /tmp&lt;br /&gt;
wget http://ftp.ruby-lang.org//pub/ruby/1.9/ruby-1.9.2-p0.tar.gz&lt;br /&gt;
tar -xvzf ruby-1.9.2-p0.tar.gz&lt;br /&gt;
cd ruby-1.9.2-p0&lt;br /&gt;
./configure&lt;br /&gt;
make &amp;amp;&amp;amp; make install&lt;br /&gt;
ln -s /usr/local/ruby/bin/bundle /usr/bin&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Run &amp;quot;ruby – v&amp;quot; and verify that it returns the correct version :&lt;br /&gt;
&lt;br /&gt;
ruby 1.9.2p0 (2010-08-18 revision 29036) [i686-linux]&lt;br /&gt;
&lt;br /&gt;
(If this shows a different version, then verify that /usr/local/ruby/bin/ruby -v is version 1.9.2p0)&lt;br /&gt;
gems&lt;br /&gt;
&lt;br /&gt;
gem install thor i18n bundler&lt;br /&gt;
gem install tzinfo builder memcache-client rack rack-test erubis mail text-format&lt;br /&gt;
gem install rack-mount --version=0.4.0&lt;br /&gt;
gem install rails sqlite3-ruby&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
Installing Snorby&lt;br /&gt;
&lt;br /&gt;
git clone http://github.com/Snorby/snorby.git /var/www/snorby&lt;br /&gt;
&lt;br /&gt;
Edit configuration files :&lt;br /&gt;
&lt;br /&gt;
Edit /var/www/snorby/config/database.yml : look for the &amp;quot;snorby&amp;quot; entry and enter the mysql root username &amp;amp; password here :&lt;br /&gt;
&lt;br /&gt;
snorby: &amp;amp;snorby&lt;br /&gt;
  adapter: mysql&lt;br /&gt;
  username: root&lt;br /&gt;
  password: &amp;lt;enter the mysql root password here&amp;gt;&lt;br /&gt;
  host: localhost&lt;br /&gt;
&lt;br /&gt;
(don’t worry, we’ll get rid of the root username/password later on)&lt;br /&gt;
&lt;br /&gt;
Edit /var/www/snorby/config/snorby_config.yml : set the correct path to wkhtmltopdf&lt;br /&gt;
&lt;br /&gt;
development:&lt;br /&gt;
  domain: localhost:3000&lt;br /&gt;
  wkhtmltopdf: /usr/bin/wkhtmltopdf&lt;br /&gt;
&lt;br /&gt;
test:&lt;br /&gt;
  domain: localhost:3000&lt;br /&gt;
  wkhtmltopdf: /usr/bin/wkhtmltopdf&lt;br /&gt;
&lt;br /&gt;
production:&lt;br /&gt;
  domain: localhost:3000&lt;br /&gt;
  wkhtmltopdf: /usr/bin/wkhtmltopdf&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
Run Snorby setup :&lt;br /&gt;
&lt;br /&gt;
cd /var/www/snorby&lt;br /&gt;
rake snorby:setup&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
It is very likely that you will get the following error :&lt;br /&gt;
&lt;br /&gt;
(in /var/www/snorby)&lt;br /&gt;
You have requested:&lt;br /&gt;
  activesupport = 3.0.3&lt;br /&gt;
&lt;br /&gt;
The bundle currently has activesupport locked at 3.0.4.&lt;br /&gt;
Try running `bundle update activesupport`&lt;br /&gt;
Try running `bundle install`.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Fix : run the following commands in the /var/www/snorby folder :&lt;br /&gt;
&lt;br /&gt;
bundle update activesupport railties rails&lt;br /&gt;
gem install arel&lt;br /&gt;
gem install ezprint&lt;br /&gt;
bundle install&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Run the setup again :&lt;br /&gt;
&lt;br /&gt;
cd /var/www/snorby&lt;br /&gt;
rake snorby:setup&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
If all goes well, the snorby database should get created/populated now. Since we used the mysql root username/password in the database.yml configuration file, the necessary database and tables should be created successfully.&lt;br /&gt;
&lt;br /&gt;
root@server:/var/www/snorby# rake snorby:setup&lt;br /&gt;
(in /var/www/snorby)&lt;br /&gt;
&amp;lt;...long key....&amp;gt;&lt;br /&gt;
[datamapper] Created database &amp;#039;snorby&amp;#039;&lt;br /&gt;
[datamapper] Finished auto_upgrade! for :default repository &amp;#039;snorby&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
If you get an error about ezprint:&lt;br /&gt;
&lt;br /&gt;
(in /var/www/snorby)&lt;br /&gt;
rake aborted!&lt;br /&gt;
http://github.com/mephux/ezprint.git (at rails3) is not checked out. \ &lt;br /&gt;
   Please run `bundle install`&lt;br /&gt;
/var/www/snorby/Rakefile:4&lt;br /&gt;
(See full trace by running task with --trace)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Solution : run this from /var/www/snorby&lt;br /&gt;
&lt;br /&gt;
bundle pack&lt;br /&gt;
bundle install --path vender/cache&lt;br /&gt;
&lt;br /&gt;
then run bundle install the rake snorby:setup command again&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
Configure mysql&lt;br /&gt;
&lt;br /&gt;
We used the root user / password to allow snorby to create the necessary tables.  If you prefer to use a mysql user account that has less privileges, then you can add a new mysql user, grant privileges, and edit the snorby configuration again :&lt;br /&gt;
&lt;br /&gt;
mysql -u root -p&lt;br /&gt;
&lt;br /&gt;
creat user &amp;#039;snorbyuser&amp;#039;@&amp;#039;localhost&amp;#039; IDENTIFIED BY &amp;#039;some_pass&amp;#039;;&lt;br /&gt;
grant all privileges on snorby.* to &amp;#039;snorbyuser&amp;#039;@&amp;#039;localhost&amp;#039; with grant option;&lt;br /&gt;
flush privileges;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Now edit /var/www/snorby/config/database.yml again and replace the username and password with the newly created user&lt;br /&gt;
&lt;br /&gt;
snorby: &amp;amp;snorby&lt;br /&gt;
  adapter: mysql&lt;br /&gt;
  username: snorbyuser&lt;br /&gt;
  password: some_pass&lt;br /&gt;
  host: localhost&lt;br /&gt;
&lt;br /&gt;
You will need to create a useraccount for your (remote) suricata/snorby sensors too.  The procedure is exactly the same as indicated above, but you will have to replace ‘localhost’ with the IP address of the remote sensor.  If the sensor is local, you can use the snorbyuser@localhost mysql user account as well.&lt;br /&gt;
&lt;br /&gt;
By default, the mysql server listens on localhost only.  Edit /etc/mysql/my.cnf to change the default behaviour :&lt;br /&gt;
&lt;br /&gt;
# Instead of skip-networking the default is now to listen only on&lt;br /&gt;
# localhost which is more compatible and is not less secure.&lt;br /&gt;
bind-address            = 127.0.0.1&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Comment the bind-address statement (add a # in front of the line) and restart mysql&lt;br /&gt;
&lt;br /&gt;
service mysql restart&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Verify that the server is now listening on all ip addresses :&lt;br /&gt;
&lt;br /&gt;
root@server:/# lsof -i | grep mysqld&lt;br /&gt;
mysqld  21309    mysql   10u  IPv4 16405476      0t0  TCP *:mysql (LISTEN)&lt;br /&gt;
&lt;br /&gt;
TCP *:mysql =&amp;gt; listening on all interfaces&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
Apache2 &amp;amp; Passenger&lt;br /&gt;
Install packages &amp;amp; dependencies&lt;br /&gt;
&lt;br /&gt;
apt-get install apache2 apache2-prefork-dev libapr1-dev libaprutil1-dev libopenssl-ruby&lt;br /&gt;
apt-get install libcurl4-openssl-dev&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Start apache2 and make sure the default webpage loads&lt;br /&gt;
&lt;br /&gt;
service apache2 start&lt;br /&gt;
&lt;br /&gt;
Install passenger&lt;br /&gt;
&lt;br /&gt;
gem install --no-ri --no-rdoc --version 3.0.3 passenger&lt;br /&gt;
&lt;br /&gt;
Install passenger module for apache2&lt;br /&gt;
&lt;br /&gt;
/usr/local/ruby/lib/ruby/gems/1.9.1/gems/passenger-3.0.3/bin/passenger-install-apache2-module -a&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
Edit /etc/apache2/mods-available/passenger.load (or create if it does not exits) :&lt;br /&gt;
&lt;br /&gt;
LoadModule passenger_module /usr/local/ruby/lib/ruby/gems/1.9.1/gems/passenger-3.0.3/ext/apache2/mod_passenger.so&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Edit /etc/apache2/mods-available/passenger.conf :&lt;br /&gt;
&lt;br /&gt;
&amp;lt;IfModule mod_passenger.c&amp;gt;&lt;br /&gt;
   PassengerRoot /usr/local/ruby/lib/ruby/gems/1.9.1/gems/passenger-3.0.3&lt;br /&gt;
   PassengerRuby /usr/local/ruby/bin/ruby&lt;br /&gt;
&amp;lt;/IfModule&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Enable the module (and some other modules you might need) :&lt;br /&gt;
&lt;br /&gt;
a2enmod passenger&lt;br /&gt;
a2enmod rewrite&lt;br /&gt;
a2enmod ssl&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Set file/folder permissions on the snorby folder :&lt;br /&gt;
&lt;br /&gt;
chown www-data:www-data /var/www/snorby -R&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
Integrate Snorby with Apache2&lt;br /&gt;
&lt;br /&gt;
Suppose we want the snorby frontend to be reachable using virtualhost snorby.corelan.be :&lt;br /&gt;
&lt;br /&gt;
Create a file &amp;quot;snorby&amp;quot; under /etc/apache2/sites-available :&lt;br /&gt;
&lt;br /&gt;
&amp;lt;VirtualHost *:80&amp;gt;&lt;br /&gt;
        ServerAdmin webmaster@localhost&lt;br /&gt;
        ServerName snorby.corelan.be&lt;br /&gt;
        DocumentRoot /var/www/snorby/public&lt;br /&gt;
&lt;br /&gt;
        &amp;lt;Directory &amp;quot;/var/www/snorby/public&amp;quot;&amp;gt;&lt;br /&gt;
                AllowOverride all&lt;br /&gt;
                Order deny,allow&lt;br /&gt;
                Allow from all&lt;br /&gt;
                Options -MultiViews&lt;br /&gt;
        &amp;lt;/Directory&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/VirtualHost&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Enable the new website :&lt;br /&gt;
&lt;br /&gt;
ln -s /etc/apache2/sites-available/snorby /etc/apache2/sites-enabled/snorby&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Restart apache2 :&lt;br /&gt;
&lt;br /&gt;
service apache2 restart&lt;br /&gt;
&lt;br /&gt;
Make sure snorby.corelan.be points at your local apache2 server, and navigate to that website :&lt;br /&gt;
&lt;br /&gt;
image&lt;br /&gt;
&lt;br /&gt;
(log in with user snorby@snorby.org and password snorby)&lt;br /&gt;
&lt;br /&gt;
If you get an error page instead of the login page :&lt;br /&gt;
&lt;br /&gt;
image&lt;br /&gt;
&lt;br /&gt;
-&amp;gt; complaining about ezprint.git not being installed, then go to the /var/www/snorby folder and run the following 2 commands :&lt;br /&gt;
&lt;br /&gt;
bundle pack&lt;br /&gt;
bundle install --path vender/cache&lt;br /&gt;
&lt;br /&gt;
Wait until the process has finished.&lt;br /&gt;
&lt;br /&gt;
Restart apache2, and then try to access the website again, you should now be able to log on.&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
If you get a message about the &amp;quot;worker&amp;quot; not being started :&lt;br /&gt;
&lt;br /&gt;
image&lt;br /&gt;
&lt;br /&gt;
Solution : click &amp;quot;Administation&amp;quot;, Click &amp;quot;Worker Options&amp;quot; Administration menu and select &amp;quot;Start worker&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Now click on &amp;quot;Worker Options&amp;quot; and start the 2 jobs&lt;br /&gt;
&lt;br /&gt;
image&lt;br /&gt;
&lt;br /&gt;
image&lt;br /&gt;
&lt;br /&gt;
If you go back to the main page now, you may see &amp;quot;Currently caching&amp;quot; for a brief moment (depending on the number of events already in the database) :&lt;br /&gt;
&lt;br /&gt;
image&lt;br /&gt;
&lt;br /&gt;
    Tip : if, at any given time, the dashboard continues to show 0 events (or an incorrect number of events in general), but the Events view shows that all entries are inside the database, then you may have to clear the caches and rebuild it from scratch :&lt;br /&gt;
&lt;br /&gt;
    mysql -u root -p&lt;br /&gt;
&lt;br /&gt;
    use snorby;&lt;br /&gt;
    truncate table caches;&lt;br /&gt;
    exit&lt;br /&gt;
&lt;br /&gt;
    Now remove the 2 worker jobs (use the little trash can icon next to each worker job to remove the job)&lt;br /&gt;
&lt;br /&gt;
    image&lt;br /&gt;
&lt;br /&gt;
    Recreate the jobs via Worker Options, and the main dashboard should eventually get populated again.&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
Okay, the server is now ready to receive data from local/remote sensors (Snort, Suricata, …).&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
Updating Snorby&lt;br /&gt;
&lt;br /&gt;
Updating snorby is as easy as running the following commands :&lt;br /&gt;
&lt;br /&gt;
cd /var/www/snorby&lt;br /&gt;
git pull origin master&lt;br /&gt;
rake snorby:update&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
Installing Suricata &amp;amp; Barnyard2&lt;br /&gt;
Dependencies&lt;br /&gt;
&lt;br /&gt;
apt-get install libpcre3 libpcre3-dbg libpcre3-dev \&lt;br /&gt;
            build-essential autoconf automake libtool \&lt;br /&gt;
            libpcap-dev libnet1-dev mysql-client libmysqlclient16-dev&lt;br /&gt;
&lt;br /&gt;
Set up yaml :&lt;br /&gt;
&lt;br /&gt;
yaml :&lt;br /&gt;
cd /tmp&lt;br /&gt;
wget http://pyyaml.org/download/libyaml/yaml-0.1.3.tar.gz&lt;br /&gt;
tar xvfz yaml-0.1.3.tar.gz&lt;br /&gt;
cd yaml-0.1.3&lt;br /&gt;
./configure &amp;amp;&amp;amp; make &amp;amp;&amp;amp; make install&lt;br /&gt;
&lt;br /&gt;
Install barnyard2 :&lt;br /&gt;
&lt;br /&gt;
cd /tmp&lt;br /&gt;
wget http://www.securixlive.com/download/barnyard2/barnyard2-1.9.tar.gz&lt;br /&gt;
tar xvfz barnyard2-1.9.tar.gz&lt;br /&gt;
cd barnyard2-1.9&lt;br /&gt;
./configure --with-mysql &amp;amp;&amp;amp; make &amp;amp;&amp;amp; make install&lt;br /&gt;
&lt;br /&gt;
Do NOT delete the /tmp/barnyard2-1.9 folder yet.&lt;br /&gt;
Install suricata:&lt;br /&gt;
&lt;br /&gt;
cd /tmp&lt;br /&gt;
wget http://www.openinfosecfoundation.org/download/suricata-1.1beta1.tar.gz&lt;br /&gt;
tar xvfz suricata-1.1beta1.tar.gz&lt;br /&gt;
cd suricata-1.1beta1&lt;br /&gt;
mkdir /var/log/suricata&lt;br /&gt;
./configure &amp;amp;&amp;amp; make &amp;amp;&amp;amp; make install&lt;br /&gt;
&lt;br /&gt;
Do NOT remove the /tmp/suricata-1.1beta1 folder yet, we need some files from this folder later on.&lt;br /&gt;
&lt;br /&gt;
Try to run suricata :&lt;br /&gt;
&lt;br /&gt;
suricata&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
If you get the following message :&lt;br /&gt;
&lt;br /&gt;
suricata: error while loading shared libraries: libhtp-0.2.so.1: cannot open shared object file: No such file or directory&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
then add &amp;quot;/usr/local/lib&amp;quot; to /etc/ld.so.conf and run ldconfig.&lt;br /&gt;
&lt;br /&gt;
root@server:/# cat /etc/ld.so.conf&lt;br /&gt;
include /etc/ld.so.conf.d/*.conf&lt;br /&gt;
/usr/local/lib&lt;br /&gt;
root@server:/# ldconfig&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Run &amp;quot;suricata&amp;quot; again :&lt;br /&gt;
&lt;br /&gt;
suricata&lt;br /&gt;
[14005] 27/2/2011 -- 22:08:28 - (suricata.c:440) &amp;lt;Info&amp;gt; (main) -- This is Suricata version 1.1beta1&lt;br /&gt;
[14005] 27/2/2011 -- 22:08:28 - (util-cpu.c:171) &amp;lt;Info&amp;gt; (UtilCpuPrintSummary) -- CPUs/cores online: 2&lt;br /&gt;
[14005] 27/2/2011 -- 22:08:28 - (suricata.c:765) &amp;lt;Error&amp;gt; (main) -- [ERRCODE: SC_ERR_OPENING_FILE(40)]&lt;br /&gt;
    - Configuration file has not been provided&lt;br /&gt;
&lt;br /&gt;
Suricata 1.1beta1&lt;br /&gt;
USAGE: suricata&lt;br /&gt;
&lt;br /&gt;
        -c &amp;lt;path&amp;gt;                    : path to configuration file&lt;br /&gt;
        -i &amp;lt;dev or ip&amp;gt;               : run in pcap live mode&lt;br /&gt;
        -r &amp;lt;path&amp;gt;                    : run in pcap file/offline mode&lt;br /&gt;
        -s &amp;lt;path&amp;gt;                    : path to signature file (optional)&lt;br /&gt;
        -l &amp;lt;dir&amp;gt;                     : default log directory&lt;br /&gt;
        -D                           : run as daemon&lt;br /&gt;
        --engine-analysis            : print reports on analysis of different sections in the engine and exit.&lt;br /&gt;
                                       Please have a look at the conf parameter engine-analysis on what reports&lt;br /&gt;
                                       can be printed&lt;br /&gt;
        --pidfile &amp;lt;file&amp;gt;             : write pid to this file (only for daemon mode)&lt;br /&gt;
        --init-errors-fatal          : enable fatal failure on signature init error&lt;br /&gt;
        --dump-config                : show the running configuration&lt;br /&gt;
        --pcap-buffer-size           : size of the pcap buffer value from 0 - 2147483647&lt;br /&gt;
        --user &amp;lt;user&amp;gt;                : run suricata as this user after init&lt;br /&gt;
        --group &amp;lt;group&amp;gt;              : run suricata as this group after init&lt;br /&gt;
        --erf-in &amp;lt;path&amp;gt;              : process an ERF file&lt;br /&gt;
&lt;br /&gt;
To run the engine with default configuration on interface eth0&lt;br /&gt;
with signature file &amp;quot;signatures.rules&amp;quot;, run the command as:&lt;br /&gt;
&lt;br /&gt;
suricata -c suricata.yaml -s signatures.rules -i eth0&lt;br /&gt;
&lt;br /&gt;
Get suricata rules (emerging-threats)&lt;br /&gt;
&lt;br /&gt;
mkdir /etc/suricata&lt;br /&gt;
cd /etc/suricata&lt;br /&gt;
wget http://rules.emergingthreats.net/open/suricata/emerging.rules.tar.gz&lt;br /&gt;
tar xvfz emerging.rules.tar.gz&lt;br /&gt;
&lt;br /&gt;
Configure suricata :&lt;br /&gt;
&lt;br /&gt;
cd /tmp/suricata-1.1beta1&lt;br /&gt;
cp suricata.yaml /etc/suricata/&lt;br /&gt;
cp classification.config /etc/suricata/&lt;br /&gt;
cp reference.config /etc/suricata/&lt;br /&gt;
&lt;br /&gt;
(note : After copying those files, you can remove the installation folder from /tmp)&lt;br /&gt;
&lt;br /&gt;
Edit /etc/suricata/suricata.yaml&lt;br /&gt;
&lt;br /&gt;
Make sure alert output for barnyard2 is enabled (it is enabled by default) :&lt;br /&gt;
&lt;br /&gt;
  # alert output for use with Barnyard2&lt;br /&gt;
  - unified2-alert:&lt;br /&gt;
      enabled: yes&lt;br /&gt;
      filename: unified2.alert&lt;br /&gt;
&lt;br /&gt;
      # Limit in MB.&lt;br /&gt;
      #limit: 32&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Scroll down until you reach &amp;quot;default-rule-path:&amp;quot; and enable/put the emerging-threat rules files that are relevant to your system under &amp;quot;rule-files:&amp;quot;. (You can find the list with rules under /etc/suricata/rules).  Example :&lt;br /&gt;
&lt;br /&gt;
default-rule-path: /etc/suricata/rules/&lt;br /&gt;
rule-files:&lt;br /&gt;
 - emerging-attack_response.rules&lt;br /&gt;
 - emerging-dos.rules&lt;br /&gt;
 - emerging-exploit.rules&lt;br /&gt;
 - emerging-games.rules&lt;br /&gt;
 - emerging-inappropriate.rules&lt;br /&gt;
 - emerging-malware.rules&lt;br /&gt;
 - emerging-p2p.rules&lt;br /&gt;
 - emerging-policy.rules&lt;br /&gt;
 - emerging-scada.rules&lt;br /&gt;
 - emerging-smtp.rules&lt;br /&gt;
 - emerging-virus.rules&lt;br /&gt;
 - emerging-voip.rules&lt;br /&gt;
 - emerging-web_client.rules&lt;br /&gt;
 - emerging-web_server.rules&lt;br /&gt;
 - emerging-web_specific_apps.rules&lt;br /&gt;
 - emerging-worm.rules&lt;br /&gt;
 - emerging-user_agents.rules&lt;br /&gt;
 - emerging-current_events.rules&lt;br /&gt;
&lt;br /&gt;
Next, edit the HOME_NET variable and set it to your local IP or IP subnet&lt;br /&gt;
&lt;br /&gt;
Example :&lt;br /&gt;
&lt;br /&gt;
HOME_NET: &amp;quot;[192.168.0.0/24]&amp;quot;&lt;br /&gt;
&lt;br /&gt;
That’s the basic config.&lt;br /&gt;
Keeping suricata up to date&lt;br /&gt;
&lt;br /&gt;
You can use this optional simple script to grab a copy of the git master and update the suricata binaries :&lt;br /&gt;
&lt;br /&gt;
#!/bin/bash&lt;br /&gt;
cd /tmp&lt;br /&gt;
rm -rf /tmp/suricata&lt;br /&gt;
mkdir suricata&lt;br /&gt;
cd suricata&lt;br /&gt;
/usr/bin/git clone git://phalanx.openinfosecfoundation.org/oisf.git&lt;br /&gt;
cd oisf&lt;br /&gt;
./autogen.sh&lt;br /&gt;
./configure &amp;amp;&amp;amp; make &amp;amp;&amp;amp; make install&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
Configure barnyard2 :&lt;br /&gt;
&lt;br /&gt;
Get the sample config file from the installation folder :&lt;br /&gt;
&lt;br /&gt;
cp /tmp/barnyard2-1.9/etc/barnyard2.conf /etc/suricata/&lt;br /&gt;
&lt;br /&gt;
(note : After copying the file, you can remove the installation folder from /tmp)&lt;br /&gt;
&lt;br /&gt;
Edit the conf file and set the following parameters :&lt;br /&gt;
&lt;br /&gt;
(we’ll assume you are installing suricata on the same box as the snorby engine)&lt;br /&gt;
&lt;br /&gt;
config reference_file:      /etc/suricata/reference.config&lt;br /&gt;
config classification_file: /etc/suricata/classification.config&lt;br /&gt;
config gen_file:            /etc/suricata/rules/gen-msg.map&lt;br /&gt;
config sid_file:            /etc/suricata/rules/sid-msg.map&lt;br /&gt;
&lt;br /&gt;
output database: log, mysql, user=snorbyuser password=some_pass /&lt;br /&gt;
   dbname=snorby host=localhost sensor_name=sensor1&lt;br /&gt;
&lt;br /&gt;
(obviously the output database configuration must be placed on one line, remove the / between the password and dbname.)&lt;br /&gt;
&lt;br /&gt;
If you are installing remote suricate sensors (remote from the mysql server / snorby engine point of view), then you will have to configure mysql and grant access to the remote mysqluser, from the IP of the sensor.  The &amp;quot;host&amp;quot; entry in the barnyard2.conf file needs to point at the remote mysql server.&lt;br /&gt;
&lt;br /&gt;
Finally, create the log folder for barnyard2 :&lt;br /&gt;
&lt;br /&gt;
mkdir /var/log/barnyard2&lt;br /&gt;
&lt;br /&gt;
Run barnyard2 :&lt;br /&gt;
&lt;br /&gt;
barnyard2 -c /etc/suricata/barnyard2.conf -d /var/log/suricata -f unified2.alert -w /var/log/suricata/suricata.waldo -D&lt;br /&gt;
&lt;br /&gt;
This will run barnyard2 in daemon mode. If barnyard2 does not appear to be working, omit the -D parameter and you will be able to see any errors that might prevent barnyard2 from running.&lt;br /&gt;
&lt;br /&gt;
When barnyard2 is running, you should see a new sensor in Snorby. If you don’t like the display name of the sensor, you can change the name via Administration Menu – Sensors&lt;br /&gt;
&lt;br /&gt;
When barnyard2 is running, you can launch suricata too :&lt;br /&gt;
Run suricata :&lt;br /&gt;
&lt;br /&gt;
suricata -c /etc/suricata/suricata.yaml -i eth0 -D&lt;br /&gt;
&lt;br /&gt;
(change interface accordingly.  -D will make suricate run in daemon mode)&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
As soon as suricata starts generating alerts, barnyard2 should pick them up, and use the mysql connector to write them into the events table of the snorby database. You should be able to see these new events in the &amp;quot;events&amp;quot; view of Snorby.&lt;br /&gt;
&lt;br /&gt;
In the background (every 30 mins), the snorby worker jobs will pick up the events, process them, add them to the caches table, and show them on the dashboard too.&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
Test IDS&lt;br /&gt;
&lt;br /&gt;
If you want to test your setup, then run :&lt;br /&gt;
&lt;br /&gt;
lynx www.testmyids.com&lt;br /&gt;
&lt;br /&gt;
(if lynx was not installed, run apt-get install lynx and try again)&lt;br /&gt;
&lt;br /&gt;
Watch the /var/log/suricata folder. You should see something similar to this :&lt;br /&gt;
&lt;br /&gt;
root@server:/var/log/suricata# ls -al&lt;br /&gt;
total 88&lt;br /&gt;
drwxr-xr-x  2 root root  4096 2011-02-28 05:38 .&lt;br /&gt;
drwxr-xr-x 18 root root  4096 2011-02-28 05:30 ..&lt;br /&gt;
-rw-r-----  1 root root   194 2011-02-28 05:37 fast.log&lt;br /&gt;
-rw-r-----  1 root root     0 2011-02-28 05:35 http.log&lt;br /&gt;
-rw-r--r--  1 root root 66873 2011-02-28 05:39 stats.log&lt;br /&gt;
-rw-------  1 root root  2056 2011-02-28 05:38 suricata.waldo&lt;br /&gt;
-rw-r-----  1 root root     0 2011-02-28 05:34 unified2.alert.1298867650&lt;br /&gt;
-rw-r-----  1 root root    60 2011-02-28 05:37 unified2.alert.1298867720&lt;br /&gt;
&lt;br /&gt;
If the fast.log file, suricata.waldo and unified2.alert files are growing, then the IDS is picking up the test alerts from www.testmyids.com&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
Addendum (march 2nd 2011)&lt;br /&gt;
&lt;br /&gt;
After running this setup for a few days, I noticed that Snorby only appears to be seeing &amp;quot;low severity&amp;quot; events, no matter how hard I try.&lt;br /&gt;
&lt;br /&gt;
Something must be wrong.&lt;br /&gt;
&lt;br /&gt;
I did some tests and it appears that suricata 1.1 might not be able to properly classify events.&lt;br /&gt;
&lt;br /&gt;
I tried with snort, and that seems to work well.&lt;br /&gt;
&lt;br /&gt;
Update : I filed a bug report with suricata and it looks like they have fixed the issue. You can use the suricata &amp;quot;update&amp;quot; script to grab the latest version.&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
Snort&lt;br /&gt;
&lt;br /&gt;
Follow the installation guide at http://www.snort.org/assets/158/snortinstallguide2904.pdf with the exception of  creating a &amp;quot;snort&amp;quot; database. Make sure to set up barnyard2 logging and tell it to use &amp;quot;snorby&amp;quot; instead of the &amp;quot;snort&amp;quot; database.&lt;br /&gt;
&lt;br /&gt;
In short, the easiest way to get snort to run on ubuntu 10.x is to run apt-get install snort   (or apt-get install snort-mysql if you want to have snort log events directly into the MySql database. This is not the recommended configuration and barnyard2 will be able to handle MySQL downtime)&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
© 2011, Corelan Team (corelanc0d3r). All rights reserved.&lt;br /&gt;
&lt;br /&gt;
    Twitter36&lt;br /&gt;
    Reddit&lt;br /&gt;
    Facebook4&lt;br /&gt;
    Google&lt;br /&gt;
    LinkedIn9&lt;br /&gt;
    StumbleUpon&lt;br /&gt;
&lt;br /&gt;
Related Posts:&lt;br /&gt;
&lt;br /&gt;
    Pastenum – Pastebin/pastie enumeration tool&lt;br /&gt;
    Backtrack 4 cheat sheet&lt;br /&gt;
    Exploit writing tutorial part 11 : Heap Spraying Demystified&lt;br /&gt;
    BruCON 2010 : Day 0x1&lt;br /&gt;
    Starting to write Immunity Debugger PyCommands : my cheatsheet&lt;br /&gt;
    Script to backup Cisco switches via telnet / tftp&lt;br /&gt;
    Fuzzing with Metasploit : Simple FTP fuzzer&lt;br /&gt;
    Exploit writing tutorial part 4 : From Exploit to Metasploit – The basics&lt;br /&gt;
    Juniper ScreenOS : Active/Passive clustering&lt;br /&gt;
    Installing Windows 7 from a USB key&lt;br /&gt;
&lt;br /&gt;
Posted in 001_Security, Linux and Unix, Networking, Papers | Tagged a2enmod, apache2, apt-get, barnyard, bind-address, bundle install, cheat sheet, cheatsheet, configuration, daily cache, database.yml, emerging, emerging-threats, ezprint, gem, HOME_NET, ids, installation, ips, libhtp-0.2.so.1, my.cnf, mysql, passenger, passenger-install-apache2-module, passenger.conf, passenger.load, PassengerRoot, PassengerRuby, procedure, qt patch, rails, ruby, sensor cache, setup, snorby, snorby_config.yml, snort, step by step, suricata, ubuntu, unified2.alert, waldo, wkhtmltopdf, www.testmyids.com&lt;br /&gt;
5 Responses to Cheat sheet : Installing Snorby 2.2 with Apache2 and Suricata with Barnyard2 on Ubuntu 10.x&lt;br /&gt;
&lt;br /&gt;
    incry6t says:	&lt;br /&gt;
    February 28, 2011 at 07:38	&lt;br /&gt;
&lt;br /&gt;
    very informative, great post! i’m curious why you decided to use suricata and not snort? how is it working out for you?&lt;br /&gt;
        Corelan Team (corelanc0d3r) says:	&lt;br /&gt;
        February 28, 2011 at 07:54	&lt;br /&gt;
&lt;br /&gt;
        ah I never played with suricata before and I wanted to give it a try. It seems to run quite fast (faster than snort, but I may not have been running it long enough to really compare)&lt;br /&gt;
    muchikon says:	&lt;br /&gt;
    March 20, 2011 at 18:58	&lt;br /&gt;
&lt;br /&gt;
    thanks for the job done, very appreciated&lt;br /&gt;
    turki_00 says:	&lt;br /&gt;
    June 5, 2011 at 01:41	&lt;br /&gt;
&lt;br /&gt;
    this is a great tutorial, i follow it and it works fine.&lt;br /&gt;
&lt;br /&gt;
    am having difficulties in running snorby under a subdirectoy (rather than have it in the top domain)&lt;br /&gt;
&lt;br /&gt;
    when i point to the top domain, http://mydomain.com&lt;br /&gt;
    I can see the login screen and everything is working fine !&lt;br /&gt;
&lt;br /&gt;
    However, when i point to a subdirectory http://mydomain.com/mysnorby&lt;br /&gt;
    it is not working and giving me the snorby directory listing.&lt;br /&gt;
&lt;br /&gt;
    I tried to play with the apache virtual host configuration , but no luck.&lt;br /&gt;
    Corelan Team (corelanc0d3r) says:	&lt;br /&gt;
    August 23, 2011 at 11:00	&lt;br /&gt;
&lt;br /&gt;
    Update : you can download barnyard2 packages here :&lt;br /&gt;
    https://launchpad.net/~hurricanedefense/+archive/testing/+build/2315749&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Referensi==&lt;br /&gt;
&lt;br /&gt;
* https://www.corelan.be/index.php/2011/02/27/cheat-sheet-installing-snorby-2-2-with-apache2-and-suricata-with-barnyard2-on-ubuntu-10-x/&lt;/div&gt;</summary>
		<author><name>Onnowpurbo</name></author>
	</entry>
</feed>