This looks like a hack job...

        if ls /var/run/snort_*pid >/dev/null 2>&1 ; then
          sleep 3
          ps cax \
                | grep '/usr/sbin/snort' \
                | awk '{ print $1 }' \
                | xargs --no-run-if-empty kill -9 >/dev/null
          rm -f /var/run/snort_*.pid
        fi
        echo "."
        ;;

they should have used a -e file test...let me write a patch and send it to 
you...this should help diagnose the problem...

Apply it with 'cat snort.patch | patch -p1'.  Run your init and let me know 
after which 'test' the error occurs...


-- 
Phil

PGP/GPG Key:
http://www.zionlth.org/~plhofmei/
wget -O - http://www.zionlth.org/~plhofmei/ | gpg --import
--- snort.orig  Fri Jul 19 15:05:33 2002
+++ snort       Fri Jul 19 15:06:39 2002
@@ -26,6 +26,7 @@
                -S "HOME_NET=[$DEBIAN_SNORT_HOME_NET]" \
                -h "$DEBIAN_SNORT_HOME_NET" \
                -c /etc/snort/snort.conf \
+               echo "test 1"
                -l /var/log/snort \
                -b \
                -d  \
@@ -43,12 +44,14 @@
        echo -n "Stopping Network Intrusion Detection System: snort"
                /sbin/start-stop-daemon --stop --quiet --oknodo --exec $DAEMON 
>/dev/null
        # If it isn't willing we shoot it!
+       echo "test 2"
        if ls /var/run/snort_*pid >/dev/null 2>&1 ; then
          sleep 3
          ps cax \
                | grep '/usr/sbin/snort' \
                | awk '{ print $1 }' \
                | xargs --no-run-if-empty kill -9 >/dev/null
+         echo "test 3"
          rm -f /var/run/snort_*.pid
        fi
                echo "."

Reply via email to