> Currently this is not possible, but you can open a feature request at:
> 
> http://www.ossec.net/bugs/
> 
> 
> And we will take a look into implementing it.

I think this deserves an open discussion about the potential risks of 
implementing something like this.  The OSSEC agent on Windows runs as 
SYSTEM, which means that it would potentially be able to kill any 
process, including several critical Windows processes.  Would it be able 
to kill explorer.exe?  Perhaps.  What about antivirus?  Probably.  The 
OSSEC agent process, itself?  Surely, unless that was protected in the 
code somehow.

Also consider that in an Enterprise environment the Security Analyst 
often does not have privileged access to the systems which are being 
monitored.  If the Windows agent can kill processes as SYSTEM at the 
discretion of the Analyst, that creates segregation of duties and 
security boundary issues.

I'm guessing this kind of functionality would be implemented as a form 
of Active Response.  This raises the question of false-positives and how 
they are handled.  What if a process starts which the Analyst wants 
killed, but it has the same process name as something else?  Which one 
gets killed?  What if I, as a non-privileged user on the local system 
start something with the same process name as software I want killed, 
but don't have the rights to do it?  Think AV.  Then maybe I can perform 
a privilege escalation attack.

Philosophically, one has to ask what the role of OSSEC is.  Is it 
primarily detective or reactive?  We already have Active Response which 
can do some neat things and it does truly add benefit.  But as it's 
expanded we have to think about the not-so-neat and clever ways it can 
be abused.

This may be useful functionality, but we should try to think about the 
ways in which it can be abused.  Anyone else got any sadistic ideas? :)

Reply via email to