#!/bin/sh # # snort Start/Stop the snort IDS daemon. # # chkconfig: 2345 85 24 # description: snort is a lightweight network intrusion detection tool that \ # currently detects more than 1100 host and network \ # vulnerabilities, portscans, backdoors, and more. # # Source function library. . /etc/rc.d/init.d/functions . /etc/sysconfig/network # Get service config - may override defaults [ -f /etc/sysconfig/snort ] && . /etc/sysconfig/snort # Check that networking is up. if is_yes "${NETWORKING}"; then if [ ! -f /var/lock/subsys/network -a "$1" != stop -a "$1" != status ]; then msg_network_down snort exit 1 fi else exit 0 fi RETVAL=0 # See how we were called. case "$1" in start) # Check if the service is already running? if [ ! -f /var/lock/subsys/snort ]; then msg_starting snort # we need full path here; see SnortUsersManual.pdf daemon /usr/sbin/snort \ -u snort -g snort -d -D \ -l /var/log/snort -c /etc/snort/snort.conf RETVAL=$? [ $RETVAL -eq 0 ] && touch /var/lock/subsys/snort else msg_already_running snort fi ;; stop) if [ -f /var/lock/subsys/snort ]; then # Stop daemons. msg_stopping snort killproc snort rm -f /var/lock/subsys/snort else msg_not_running snort fi ;; reload|force-reload) if [ -f /var/lock/subsys/snort ]; then msg_reloading snort killproc snort -HUP RETVAL=$? else msg_not_running snort >&2 exit 7 fi ;; restart) $0 stop $0 start exit $? ;; status) status snort exit $? ;; *) msg_usage "$0 {start|stop|restart|reload|force-reload|status}" exit 3 esac exit $RETVAL