On Fri, Aug 17, 2012 at 1:20 PM, Adriel Desautels
<ad_li...@netragard.com> wrote:
> Dan,
>
> Not only have I stopped and restarted but I even reinstalled OSSEC.
>

Try removing the secure remote option.

> What specifically do you want to know about the machine / server?
>

Seriously? You couldn't just throw some information in the email? Forget it.

> On 8/17/12 11:24 AM, dan (ddp) wrote:
>> On Fri, Aug 17, 2012 at 10:12 AM, Adriel Desautels
>> <ad_li...@netragard.com> wrote:
>>> Here it is:
>>>
>>> root@bos-ossec01:/var/ossec/etc# cat ossec.conf
>>> <ossec_config>
>>>   <global>
>>>     <email_notification>yes</email_notification>
>>>     <email_to>x...@xxx.xxx</email_to>
>>>     <smtp_server>xx.xx.xx.xx</smtp_server>
>>>     <email_from>m...@xxx.xxx</email_from>
>>>   </global>
>>>
>>>   <rules>
>>>     <include>rules_config.xml</include>
>>>     <include>pam_rules.xml</include>
>>>     <include>sshd_rules.xml</include>
>>>     <include>telnetd_rules.xml</include>
>>>     <include>syslog_rules.xml</include>
>>>     <include>arpwatch_rules.xml</include>
>>>     <include>symantec-av_rules.xml</include>
>>>     <include>symantec-ws_rules.xml</include>
>>>     <include>pix_rules.xml</include>
>>>     <include>named_rules.xml</include>
>>>     <include>smbd_rules.xml</include>
>>>     <include>vsftpd_rules.xml</include>
>>>     <include>pure-ftpd_rules.xml</include>
>>>     <include>proftpd_rules.xml</include>
>>>     <include>ms_ftpd_rules.xml</include>
>>>     <include>ftpd_rules.xml</include>
>>>     <include>hordeimp_rules.xml</include>
>>>     <include>roundcube_rules.xml</include>
>>>     <include>wordpress_rules.xml</include>
>>>     <include>cimserver_rules.xml</include>
>>>     <include>vpopmail_rules.xml</include>
>>>     <include>vmpop3d_rules.xml</include>
>>>     <include>courier_rules.xml</include>
>>>     <include>web_rules.xml</include>
>>>     <include>apache_rules.xml</include>
>>>     <include>nginx_rules.xml</include>
>>>     <include>php_rules.xml</include>
>>>     <include>mysql_rules.xml</include>
>>>     <include>postgresql_rules.xml</include>
>>>     <include>ids_rules.xml</include>
>>>     <include>squid_rules.xml</include>
>>>     <include>firewall_rules.xml</include>
>>>     <include>cisco-ios_rules.xml</include>
>>>     <include>netscreenfw_rules.xml</include>
>>>     <include>sonicwall_rules.xml</include>
>>>     <include>postfix_rules.xml</include>
>>>     <include>sendmail_rules.xml</include>
>>>     <include>imapd_rules.xml</include>
>>>     <include>mailscanner_rules.xml</include>
>>>     <include>dovecot_rules.xml</include>
>>>     <include>ms-exchange_rules.xml</include>
>>>     <include>racoon_rules.xml</include>
>>>     <include>vpn_concentrator_rules.xml</include>
>>>     <include>spamd_rules.xml</include>
>>>     <include>msauth_rules.xml</include>
>>>     <include>mcafee_av_rules.xml</include>
>>>     <include>trend-osce_rules.xml</include>
>>>     <include>ms-se_rules.xml</include>
>>>     <!-- <include>policy_rules.xml</include> -->
>>>     <include>zeus_rules.xml</include>
>>>     <include>solaris_bsm_rules.xml</include>
>>>     <include>vmware_rules.xml</include>
>>>     <include>ms_dhcp_rules.xml</include>
>>>     <include>asterisk_rules.xml</include>
>>>     <include>ossec_rules.xml</include>
>>>     <include>attack_rules.xml</include>
>>>     <include>openbsd_rules.xml</include>
>>>     <include>clam_av_rules.xml</include>
>>>     <include>bro-ids_rules.xml</include>
>>>     <include>dropbear_rules.xml</include>
>>>     <include>local_rules.xml</include>
>>>   </rules>
>>>
>>>   <syscheck>
>>>     <!-- Frequency that syscheck is executed - default to every 22 hours -->
>>>     <frequency>79200</frequency>
>>>
>>>     <!-- Directories to check  (perform all possible verifications) -->
>>>     <directories check_all="yes">/etc,/usr/bin,/usr/sbin</directories>
>>>     <directories check_all="yes">/bin,/sbin</directories>
>>>
>>>     <!-- Files/directories to ignore -->
>>>     <ignore>/etc/mtab</ignore>
>>>     <ignore>/etc/mnttab</ignore>
>>>     <ignore>/etc/hosts.deny</ignore>
>>>     <ignore>/etc/mail/statistics</ignore>
>>>     <ignore>/etc/random-seed</ignore>
>>>     <ignore>/etc/adjtime</ignore>
>>>     <ignore>/etc/httpd/logs</ignore>
>>>     <ignore>/etc/utmpx</ignore>
>>>     <ignore>/etc/wtmpx</ignore>
>>>     <ignore>/etc/cups/certs</ignore>
>>>     <ignore>/etc/dumpdates</ignore>
>>>     <ignore>/etc/svc/volatile</ignore>
>>>
>>>     <!-- Windows files to ignore -->
>>>     <ignore>C:\WINDOWS/System32/LogFiles</ignore>
>>>     <ignore>C:\WINDOWS/Debug</ignore>
>>>     <ignore>C:\WINDOWS/WindowsUpdate.log</ignore>
>>>     <ignore>C:\WINDOWS/iis6.log</ignore>
>>>     <ignore>C:\WINDOWS/system32/wbem/Logs</ignore>
>>>     <ignore>C:\WINDOWS/system32/wbem/Repository</ignore>
>>>     <ignore>C:\WINDOWS/Prefetch</ignore>
>>>     <ignore>C:\WINDOWS/PCHEALTH/HELPCTR/DataColl</ignore>
>>>     <ignore>C:\WINDOWS/SoftwareDistribution</ignore>
>>>     <ignore>C:\WINDOWS/Temp</ignore>
>>>     <ignore>C:\WINDOWS/system32/config</ignore>
>>>     <ignore>C:\WINDOWS/system32/spool</ignore>
>>>     <ignore>C:\WINDOWS/system32/CatRoot</ignore>
>>>   </syscheck>
>>>
>>>   <rootcheck>
>>>     <rootkit_files>/var/ossec/etc/shared/rootkit_files.txt</rootkit_files>
>>>
>>> <rootkit_trojans>/var/ossec/etc/shared/rootkit_trojans.txt</rootkit_trojans>
>>>     <system_audit>/var/ossec/etc/shared/system_audit_rcl.txt</system_audit>
>>>
>>> <system_audit>/var/ossec/etc/shared/cis_debian_linux_rcl.txt</system_audit>
>>>
>>> <system_audit>/var/ossec/etc/shared/cis_rhel_linux_rcl.txt</system_audit>
>>>
>>> <system_audit>/var/ossec/etc/shared/cis_rhel5_linux_rcl.txt</system_audit>
>>>   </rootcheck>
>>>
>>>   <global>
>>>     <white_list>127.0.0.1</white_list>
>>>     <white_list>^localhost.localdomain$</white_list>
>>>     <white_list>10.5.4.1</white_list>
>>>   </global>
>>>
>>>   <remote>
>>>     <connection>syslog</connection>
>>>     <allowed-ips>10.5.4.1</allowed-ips>
>>> </remote>
>>>
>>>   <remote>
>>>     <connection>secure</connection>
>>>   </remote>
>>>
>>>   <alerts>
>>>     <log_alert_level>1</log_alert_level>
>>>     <email_alert_level>7</email_alert_level>
>>>   </alerts>
>>>
>>>   <command>
>>>     <name>host-deny</name>
>>>     <executable>host-deny.sh</executable>
>>>     <expect>srcip</expect>
>>>     <timeout_allowed>yes</timeout_allowed>
>>>   </command>
>>>
>>>   <command>
>>>     <name>firewall-drop</name>
>>>     <executable>firewall-drop.sh</executable>
>>>     <expect>srcip</expect>
>>>     <timeout_allowed>yes</timeout_allowed>
>>>   </command>
>>>
>>>   <command>
>>>     <name>disable-account</name>
>>>     <executable>disable-account.sh</executable>
>>>     <expect>user</expect>
>>>     <timeout_allowed>yes</timeout_allowed>
>>>   </command>
>>>
>>>   <command>
>>>     <name>restart-ossec</name>
>>>     <executable>restart-ossec.sh</executable>
>>>     <expect></expect>
>>>   </command>
>>>
>>>
>>>   <command>
>>>     <name>route-null</name>
>>>     <executable>route-null.sh</executable>
>>>     <expect>srcip</expect>
>>>     <timeout_allowed>yes</timeout_allowed>
>>>   </command>
>>>
>>>
>>>   <!-- Active Response Config -->
>>>   <active-response>
>>>     <!-- This response is going to execute the host-deny
>>>        - command for every event that fires a rule with
>>>        - level (severity) >= 6.
>>>        - The IP is going to be blocked for  600 seconds.
>>>       -->
>>>     <command>host-deny</command>
>>>     <location>local</location>
>>>     <level>6</level>
>>>     <timeout>600</timeout>
>>>   </active-response>
>>>
>>>   <active-response>
>>>     <!-- Firewall Drop response. Block the IP for
>>>        - 600 seconds on the firewall (iptables,
>>>        - ipfilter, etc).
>>>       -->
>>>     <command>firewall-drop</command>
>>>     <location>local</location>
>>>     <level>6</level>
>>>     <timeout>600</timeout>
>>>   </active-response>
>>>
>>>   <!-- Files to monitor (localfiles) -->
>>>
>>>   <localfile>
>>>     <log_format>syslog</log_format>
>>>     <location>/var/log/messages</location>
>>>   </localfile>
>>>
>>>   <localfile>
>>>     <log_format>syslog</log_format>
>>>     <location>/var/log/auth.log</location>
>>>   </localfile>
>>>
>>>   <localfile>
>>>     <log_format>syslog</log_format>
>>>     <location>/var/log/syslog</location>
>>>   </localfile>
>>>
>>>   <localfile>
>>>     <log_format>syslog</log_format>
>>>     <location>/var/log/mail.info</location>
>>>   </localfile>
>>>
>>>   <localfile>
>>>     <log_format>syslog</log_format>
>>>     <location>/var/log/dpkg.log</location>
>>>   </localfile>
>>> </ossec_config>
>>>
>>>
>>> On 8/17/12 8:34 AM, dan (ddp) wrote:
>>>> On Thu, Aug 16, 2012 at 9:25 PM, Adriel Desautels
>>>> <ad_li...@netragard.com> wrote:
>>>>> I have the following in ossec.conf:
>>>>>
>>>>> .
>>>>> .
>>>>> .
>>>>>   <remote>
>>>>>     <connection>syslog</connection>
>>>>>         <allowed-ips>10.5.4.1</allowed-ips>
>>>>>         <port>514</port>
>>>>>   </remote>
>>>>>
>>>>>   <remote>
>>>>>     <connection>secure</connection>
>>>>>   </remote>
>>>>> .
>>>>> .
>>>>> .
>>>>>
>>>>> And yet when 10.5.4.1 sends a message to the OSSEC server I get this:
>>>>>
>>>>> WARN: Message from 10.5.4.1 not allowed.
>>>>>
>>>>>
>>>>> Am I missing something?
>>>>>
>>>>> And yes... I've restarted the server.
>>>> Please provide your entire ossec.conf.
>> I've been unable to reproduce this issue. Stop the OSSEC processes,
>> and make sure they've stopped. Then start them up again. See if that
>> fixes it.
>>
>> Also, can you provide more information about the OSSEC server?
>
>

Reply via email to