I got a chance to test it out a tiny bit (very tiny). Here's something
that seemed to work a bit better:

<decoder name="portsentry">
  <program_name>portsentry</program_name>
</decoder>

<decoder name="portsentry-attackalert">
    <parent>portsentry</parent>
    <prematch>attackalert: Connect from host: </prematch>
    <regex offset="after_prematch">(\S+)/\S+ to (\S+) port: (\d+)$</regex>
    <order>srcip,protocol,dstport</order>
</decoder>

<decoder name="portsentry-blocked">
    <parent>portsentry</parent>
    <prematch>is already blocked. Ignoring$</prematch>
    <regex>Host: (\S+) is</regex>
    <order>srcip</order>
</decoder>

On Tue, Nov 2, 2010 at 3:35 PM, Js Opdebeeck <[email protected]> wrote:
> Dan
>
> I close this post and open a new one called Portsentry ..
>
> Thanks for your help, I'll try this.
>
> On Nov 2, 12:07 am, "dan (ddp)" <[email protected]> wrote:
>> Completely untested:
>> <decoder name="portsentry">
>>   <program_name>portsentry</program_name>
>> </decoder>
>>
>> <decoder name="portsentry-attackalert">
>>   <parent>portsentry</parent>
>>   <prematch>attackalert: Connect from </prematch>
>>   <regex offset="after_prematch">ost: (\S)/\S+ to \S+ port: (\d+)$</regex>
>>   <order>srcip, dstport</order>
>> </decoder>
>>
>> <decoder name="portsentry-blocked">
>>   <parent>portsentry</parent>
>>   <prematch>is already blocked. Ignoring$</prematch>
>>   <regex>Host: (\S+) is</regex>
>>   <order>srcip</order>
>> </decoder>On Mon, Nov 1, 2010 at 6:42 PM, Js Opdebeeck 
>> <[email protected]> wrote:
>> > Hello Doug
>>
>> > Thanks for your note. The host I is Ubuntu and the default firewall is
>> > ufw.
>>
>> > Regarding the Port Scan detection, I will move to PortSentry (more
>> > common than iplog or scanlogd), and with more options.
>> > Install portsentry :
>>
>> > sudo apt-get install portsentry
>>
>> > Create a dedicated rule :
>> > sudo vi /var/ossec/rules/local_rules.xml
>>
>> > <group name="syslog,sentry,">
>> >  <rule id="160100" level="12">
>> >   <match>attackalert</match>
>> >   <description>Port Sentry Attack Alert</description>
>> >  </rule>
>> > </group>
>>
>> > But goal will be to extract the IP and source (for alert grouping) ...
>> > with a decoder.xml , but too hard for me.
>>
>> > Sample syslog
>>
>> > Nov  1 19:28:58 testserver portsentry[1620]: adminalert: Going into
>> > listen mode on UDP port: 31337
>> > Nov  1 19:28:58 testserver portsentry[1620]: adminalert: Going into
>> > listen mode on UDP port: 54321
>> > Nov  1 19:28:58 testserver portsentry[1620]: adminalert: PortSentry is
>> > now active and listening.
>> > Nov  1 19:31:33 testserver portsentry[1616]: attackalert: Connect from
>> > host: 192.168.45.1/192.168.45.1 to TCP port: 1
>> > Nov  1 19:31:33 testserver portsentry[1616]: attackalert: Ignoring TCP
>> > response per configuration file setting.
>> > Nov  1 19:31:33 testserver portsentry[1616]: attackalert: Connect from
>> > host: 192.168.45.1/192.168.45.1 to TCP port: 79
>> > Nov  1 19:31:33 testserver portsentry[1616]: attackalert: Host:
>> > 192.168.45.1 is already blocked. Ignoring
>> > Nov  1 19:31:33 testserver portsentry[1616]: attackalert: Connect from
>> > host: 192.168.45.1/192.168.45.1 to TCP port: 111
>> > Nov  1 19:31:33 testserver portsentry[1616]: attackalert: Host:
>> > 192.168.45.1 is already blocked. Ignoring
>> > Nov  1 19:31:33 testserver portsentry[1616]: attackalert: Connect from
>> > host: 192.168.45.1/192.168.45.1 to TCP port: 119
>> > Nov  1 19:31:33 testserver portsentry[1616]: attackalert: Host:
>> > 192.168.45.1 is already blocked. Ignoring
>> > Nov  1 19:31:33 testserver portsentry[1616]: attackalert: Connect from
>> > host: 192.168.45.1/192.168.45.1 to TCP port: 143
>> > Nov  1 19:31:33 testserver portsentry[1616]: attackalert: Host:
>> > 192.168.45.1 is already blocked. Ignoring
>> > Nov  1 19:31:33 testserver portsentry[1616]: attackalert: Connect from
>> > host: 192.168.45.1/192.168.45.1 to TCP port: 1080
>> > ...
>>
>> >> > Js Op de Beeck

Reply via email to