]> git.ipfire.org Git - people/pmueller/ipfire-2.x.git/blobdiff - src/initscripts/init.d/snort
Fix snort errormessage if no rules are present to check.
[people/pmueller/ipfire-2.x.git] / src / initscripts / init.d / snort
old mode 100755 (executable)
new mode 100644 (file)
index 2b860bf..5446094
 #!/bin/sh
+########################################################################
+# Begin $rc_base/init.d/snort
+#
+# Description : Snort Initscript
+#
+# Authors     : Michael Tremer for ipfire.org - mitch@ipfire.org
+#
+# Version     : 01.00
 #
-# setting and configure Parameter
+# Notes       :
+#
+########################################################################
+
+. /etc/sysconfig/rc
+. ${rc_functions}
+
+PATH=/usr/local/sbin:/usr/local/bin:/bin:/usr/bin:/sbin:/usr/sbin; export PATH
 
-cd /etc/snort
-snort=/usr/sbin/snort
-vars=/etc/snort/vars
 eval $(/usr/local/bin/readhash /var/ipfire/ethernet/settings)
-HOME_NET=`echo $GREEN_NETADDRESS`
-EXTERMAL_NET="EXTERNAL_NET=ANY"
+eval $(/usr/local/bin/readhash /var/ipfire/snort/settings)
 
-# setting the snort sensore to the interface  !!
-DEVICE=`echo $GREEN_DEV`
-PIDFILE=/var/run/snort_$DEVICE.pid
-startparameter=" -c snort.conf -i $DEVICE -D -l /var/log/snort --pid-path $PIDFILE"
+if [ "$ENABLE_SNORT_ORANGE" == "on" ]; then
+        HOME_NET+="$ORANGE_ADDRESS,"
+        DEVICES+="$ORANGE_DEV "
+fi
 
+if [ "$ENABLE_SNORT_GREEN" == "on" ]; then
+        HOME_NET+="$GREEN_ADDRESS,"
+        DEVICES+="$GREEN_DEV "
+fi
 
-#create the  DYNAMIC vars Variable of Snort 
- echo "var HOME_NET $HOME_NET" > $vars
- echo "var EXTERNAL_NET ANY" >> $vars
+if [ "$ENABLE_SNORT_BLUE" == "on" ]; then
+        HOME_NET+="$BLUE_ADDRESS,"
+        DEVICES+="$BLUE_DEV "
+fi
 
+if [ "$ENABLE_SNORT" == "on" ]; then
+        LOCAL_IP=`cat /var/ipfire/red/local-ipaddress`
+        if [ "$LOCAL_IP" ]; then
+                HOME_NET+="$LOCAL_IP,"
+        else
+                exit 1 ## Add error handling here
+        fi
+        DEVICES+=`cat /var/ipfire/red/iface 2>/dev/null`
+fi
 
-# Begin $rc_base/init.d/snort
+COUNT=`echo $HOME_NET | wc -m`
+HOME_NET=`echo $HOME_NET | cut -c $[$COUNT - 2]`
+echo "var HOME_NET [$HOME_NET]" >       /etc/snort/vars
+echo "var EXTERNAL_NET ANY" >>          /etc/snort/vars
 
-. /etc/sysconfig/rc
-. $rc_functions
+DNS1=`cat /var/ipfire/red/dns1 2>/dev/null`
+DNS2=`cat /var/ipfire/red/dns2 2>/dev/null`
+
+if [ "$DNS2" ]; then
+        echo "var DNS_SERVERS [$DNS1,$DNS2]" >> /etc/snort/vars
+else
+        echo "var DNS_SERVERS $DNS1" >> /etc/snort/vars
+fi 
 
 case "$1" in
-       start)
-               boot_mesg "Starting snort..."
-               loadproc $snort $startparameter
-               ;;
-
-       stop)
-               boot_mesg "Stopping snort..."
-               killproc -p $PIDFILE /var/run
-               ;;
-
-       status)
-               statusproc /usr/sbin/snort
-               ;;
-
-       *)
-               echo "Usage: $0 {start|stop|status}"
-               exit 1
-               ;;
+        start)
+               # Disable incompatible rules
+                boot_mesg "Check/Fix Intrusion Detection rules..."
+               for file in $(ls /etc/snort/rules/*.rules 2>/dev/null); do
+                       sed -i 's|^alert.*!\[\$DNS_SERVERS|#&|g' $file
+                       sed -i 's|^alert.*!\$SSH_PORTS|#&|g' $file
+                       sed -i 's|^alert.*!\$HOME_NET|#&|g' $file
+                       sed -i 's|^alert.*!\$SQL_SERVERS|#&|g' $file
+               done
+               echo_ok
+
+                for DEVICE in $DEVICES; do
+                        boot_mesg "Starting Intrusion Detection System on $DEVICE..."
+                        /usr/sbin/snort -c /etc/snort/snort.conf -i $DEVICE -D -l /var/log/snort --create-pidfile --nolock-pidfile --pid-path /var/run/
+                        evaluate_retval
+                       sleep 1
+                        chmod 644 /var/run/snort_$DEVICE.pid
+                done
+                
+         
+                if [ -r /var/ipfire/guardian/enable ]; then
+                             IFACE=`/bin/cat /var/ipfire/red/iface 2>/dev/null | /usr/bin/tr -d '\012'`
+                       sed -e "s/^Interface.*/Interface       ${IFACE}/" /var/ipfire/guardian/guardian.conf > temp
+                       mv temp /var/ipfire/guardian/guardian.conf
+                       chown nobody.root /var/ipfire/guardian/guardian.conf
+                     
+                  boot_mesg "Starting Guardian..."
+                             loadproc /usr/local/bin/guardian.pl -c /var/ipfire/guardian/guardian.conf
+                           fi
+                   ;;
+                
+        stop)
+               DEVICES=""
+               if [ -r /var/run/snort_$BLUE_DEV.pid ]; then
+                 DEVICES+="$BLUE_DEV "
+               fi
+               
+               if [ -r /var/run/snort_$GREEN_DEV.pid ]; then
+                 DEVICES+="$GREEN_DEV "
+              fi
+             
+              if [ -r /var/run/snort_$ORANGE_DEV.pid ]; then
+                 DEVICES+="$ORANGE_DEV "
+              fi
+      
+              RED=`cat /var/ipfire/red/iface 2>/dev/null`
+              if [ -r /var/run/snort_$RED.pid ]; then
+                 DEVICES+=`cat /var/ipfire/red/iface 2>/dev/null`
+              fi
+       
+              for DEVICE in $DEVICES; do
+                 boot_mesg "Stopping Intrusion Detection System on $DEVICE..."
+                 killproc -p /var/run/snort_$DEVICE.pid /var/run
+              done
+              
+              rm /var/run/snort_* >/dev/null 2>/dev/null
+                
+              if [ -r /var/ipfire/guardian/enable ]; then
+                         boot_mesg "Stopping Guardian..."
+                         killproc /usr/local/bin/guardian.pl
+                         fi
+        ;;
+                
+        status)
+                statusproc /usr/sbin/snort
+                ;;
+                
+        restart)
+                $0 stop
+                $0 start
+                ;;
+                
+        *)
+                echo "Usage: $0 {start|stop|restart|status}"
+                exit 1
+                ;;
 esac
 
+chmod 644 /var/log/snort/* 2>/dev/null
+
 # End $rc_base/init.d/snort