]> git.ipfire.org Git - people/pmueller/ipfire-2.x.git/blame - src/initscripts/init.d/snort
Some fixes on the alix led script.
[people/pmueller/ipfire-2.x.git] / src / initscripts / init.d / snort
CommitLineData
bd3a8a50 1#!/bin/sh
83843a1c
MT
2########################################################################
3# Begin $rc_base/init.d/snort
4#
5# Description : Snort Initscript
6#
7# Authors : Michael Tremer for ipfire.org - mitch@ipfire.org
8#
9# Version : 01.00
bd3a8a50 10#
83843a1c
MT
11# Notes :
12#
13########################################################################
14
15. /etc/sysconfig/rc
16. ${rc_functions}
bd3a8a50 17
1b73b07e
CS
18PATH=/usr/local/sbin:/usr/local/bin:/bin:/usr/bin:/sbin:/usr/sbin; export PATH
19
bd3a8a50 20eval $(/usr/local/bin/readhash /var/ipfire/ethernet/settings)
83843a1c 21eval $(/usr/local/bin/readhash /var/ipfire/snort/settings)
bd3a8a50 22
83843a1c 23if [ "$ENABLE_SNORT_ORANGE" == "on" ]; then
1b73b07e
CS
24 HOME_NET+="$ORANGE_ADDRESS,"
25 DEVICES+="$ORANGE_DEV "
83843a1c 26fi
bd3a8a50 27
83843a1c 28if [ "$ENABLE_SNORT_GREEN" == "on" ]; then
1b73b07e
CS
29 HOME_NET+="$GREEN_ADDRESS,"
30 DEVICES+="$GREEN_DEV "
83843a1c 31fi
bd3a8a50 32
83843a1c 33if [ "$ENABLE_SNORT_BLUE" == "on" ]; then
1b73b07e
CS
34 HOME_NET+="$BLUE_ADDRESS,"
35 DEVICES+="$BLUE_DEV "
83843a1c 36fi
bd3a8a50 37
83843a1c 38if [ "$ENABLE_SNORT" == "on" ]; then
1b73b07e
CS
39 LOCAL_IP=`cat /var/ipfire/red/local-ipaddress`
40 if [ "$LOCAL_IP" ]; then
41 HOME_NET+="$LOCAL_IP,"
42 else
43 exit 1 ## Add error handling here
44 fi
45 DEVICES+=`cat /var/ipfire/red/iface 2>/dev/null`
83843a1c 46fi
bd3a8a50 47
83843a1c
MT
48COUNT=`echo $HOME_NET | wc -m`
49HOME_NET=`echo $HOME_NET | cut -c $[$COUNT - 2]`
50
1b73b07e
CS
51echo "var HOME_NET [$HOME_NET]" > /etc/snort/vars
52echo "var EXTERNAL_NET ANY" >> /etc/snort/vars
bd3a8a50 53
e65dae7e
CS
54DNS1=`cat /var/ipfire/red/dns1 2>/dev/null`
55DNS2=`cat /var/ipfire/red/dns2 2>/dev/null`
83843a1c
MT
56
57if [ "$DNS2" ]; then
1b73b07e 58 echo "var DNS_SERVERS [$DNS1,$DNS2]" >> /etc/snort/vars
83843a1c 59else
1b73b07e 60 echo "var DNS_SERVERS $DNS1" >> /etc/snort/vars
83843a1c 61fi
bd3a8a50
RZ
62
63case "$1" in
1b73b07e
CS
64 start)
65 for DEVICE in $DEVICES; do
66 boot_mesg "Starting Intrusion Detection System on $DEVICE..."
67 /usr/sbin/snort -c /etc/snort/snort.conf -i $DEVICE -D -l /var/log/snort --create-pidfile --nolock-pidfile --pid-path /var/run/
68 evaluate_retval
69 chmod 644 /var/run/snort_$DEVICE.pid
70 done
71
72
73 if [ -r /var/ipfire/guardian/enable ]; then
74 IFACE=`/bin/cat /var/ipfire/red/iface 2>/dev/null | /usr/bin/tr -d '\012'`
75 sed -e "s/^Interface.*/Interface ${IFACE}/" /var/ipfire/guardian/guardian.conf > temp
76 mv temp /var/ipfire/guardian/guardian.conf
a61948ad 77 chown nobody.root /var/ipfire/guardian/guardian.conf
1b73b07e
CS
78
79 boot_mesg "Starting Guardian..."
80 loadproc /usr/local/bin/guardian.pl -c /var/ipfire/guardian/guardian.conf
81 fi
82 ;;
83
84 stop)
85 DEVICES=""
86 if [ -r /var/run/snort_$BLUE_DEV.pid ]; then
87 DEVICES+="$BLUE_DEV "
88 fi
89
90 if [ -r /var/run/snort_$GREEN_DEV.pid ]; then
91 DEVICES+="$GREEN_DEV "
92 fi
93
94 if [ -r /var/run/snort_$ORANGE_DEV.pid ]; then
95 DEVICES+="$ORANGE_DEV "
96 fi
cf29614f 97
1b73b07e
CS
98 RED=`cat /var/ipfire/red/iface 2>/dev/null`
99 if [ -r /var/run/snort_$RED.pid ]; then
100 DEVICES+=`cat /var/ipfire/red/iface 2>/dev/null`
101 fi
ce8e4c83 102
1b73b07e
CS
103 for DEVICE in $DEVICES; do
104 boot_mesg "Stopping Intrusion Detection System on $DEVICE..."
105 killproc -p /var/run/snort_$DEVICE.pid /var/run
106 done
107
108 rm /var/run/snort_* >/dev/null 2>/dev/null
109
110 if [ -r /var/ipfire/guardian/enable ]; then
111 boot_mesg "Stopping Guardian..."
112 killproc /usr/local/bin/guardian.pl
113 fi
114 ;;
115
116 status)
117 statusproc /usr/sbin/snort
118 ;;
119
120 restart)
121 $0 stop
122 $0 start
123 ;;
124
125 *)
126 echo "Usage: $0 {start|stop|restart|status}"
127 exit 1
128 ;;
bd3a8a50
RZ
129esac
130
97bfe380 131chmod 644 /var/log/snort/* 2>/dev/null
9c0d99da 132
bd3a8a50 133# End $rc_base/init.d/snort