Hello Shaharyar,

compiling from source works just fine

Jan

On Sun, Feb 7, 2016 at 6:39 PM, Shaharyar Chaudhry <c.shahar...@gmail.com>
wrote:

> Hey, I was wondering how you got the ossec agent to work on rpi, is there
> a guide to this? I am trying to get agent on my rpi2 model to work. Any
> help would be great.
>
> Cheers :)
>
>
> On Thursday, October 15, 2015 at 9:50:38 AM UTC-4, Jedi Meister wrote:
>>
>> So,
>>
>> I rebuild the server with the SAME  tar.gz file and restart it.
>>
>> Now i receive the alerts from the clients.
>>
>> ** Alert 1444916936.103875: - syslog,sshd,authentication_failed,
>> 2015 Oct 15 15:48:56 (hal) 78.46.76.44->/var/log/auth.log
>> Rule: 5716 (level 5) -> 'SSHD authentication failed.'
>> Src IP: 80.87.168.98
>> User: itsolutions
>> Oct 15 15:48:55 hal sshd[21772]: Failed password for foobar from
>> 80.87.168.98 port 55976 ssh2
>>
>>
>> VERY Strange. But anyway, it works now.
>>
>> Thanks for the help!!
>>
>> Am Donnerstag, 15. Oktober 2015 15:44:39 UTC+2 schrieb Jedi Meister:
>>>
>>> Sorry,
>>>
>>> You didn't give us much to go on. Did you create a new key for this
>>> agent?
>>> Yes, new keys were generated on the rasperrby for the agents
>>>
>>>
>>> Did you install it?
>>> I used the install.sh method of the installation tar.gz
>>>
>>>
>>> Did you restart the OSSEC processes after adding the key?
>>> Yes, Restart or ossec and restart of the system
>>>
>>> Are you sure there's no firewall on the OSSEC manager blocking the
>>> traffic?
>>> Correct, Iptables is flushed, the firewall before let the ossec
>>> communication pass (as I receive the data with the same rule on the old
>>> system)
>>>
>>> Are there any logs from the manager's ossec.log file that might hint
>>> at the problem?
>>>
>>> No, there is only the no indication. I included the full log:
>>>
>>> 2015/10/15 15:42:17 ossec-testrule: INFO: Reading local decoder file.
>>> 2015/10/15 15:42:18 ossec-testrule: INFO: Started (pid: 5575).
>>> 2015/10/15 15:42:18 ossec-maild: INFO: Started (pid: 5587).
>>> 2015/10/15 15:42:18 ossec-execd: INFO: Started (pid: 5591).
>>> 2015/10/15 15:42:18 ossec-remoted: INFO: Started (pid: 5603).
>>> 2015/10/15 15:42:18 ossec-remoted: INFO: Started (pid: 5605).
>>> 2015/10/15 15:42:18 ossec-analysisd: INFO: Reading local decoder file.
>>> 2015/10/15 15:42:18 ossec-analysisd: INFO: Reading rules file:
>>> 'rules_config.xml'
>>> 2015/10/15 15:42:18 ossec-analysisd: INFO: Reading rules file:
>>> 'pam_rules.xml'
>>> 2015/10/15 15:42:18 ossec-analysisd: INFO: Reading rules file:
>>> 'sshd_rules.xml'
>>> 2015/10/15 15:42:18 ossec-analysisd: INFO: Reading rules file:
>>> 'telnetd_rules.xml'
>>> 2015/10/15 15:42:18 ossec-analysisd: INFO: Reading rules file:
>>> 'syslog_rules.xml'
>>> 2015/10/15 15:42:18 ossec-analysisd: INFO: Reading rules file:
>>> 'arpwatch_rules.xml'
>>> 2015/10/15 15:42:18 ossec-analysisd: INFO: Reading rules file:
>>> 'symantec-av_rules.xml'
>>> 2015/10/15 15:42:18 ossec-analysisd: INFO: Reading rules file:
>>> 'symantec-ws_rules.xml'
>>> 2015/10/15 15:42:18 ossec-analysisd: INFO: Reading rules file:
>>> 'pix_rules.xml'
>>> 2015/10/15 15:42:18 ossec-analysisd: INFO: Reading rules file:
>>> 'named_rules.xml'
>>> 2015/10/15 15:42:18 ossec-analysisd: INFO: Reading rules file:
>>> 'smbd_rules.xml'
>>> 2015/10/15 15:42:18 ossec-analysisd: INFO: Reading rules file:
>>> 'vsftpd_rules.xml'
>>> 2015/10/15 15:42:18 ossec-analysisd: INFO: Reading rules file:
>>> 'pure-ftpd_rules.xml'
>>> 2015/10/15 15:42:18 ossec-analysisd: INFO: Reading rules file:
>>> 'proftpd_rules.xml'
>>> 2015/10/15 15:42:18 ossec-analysisd: INFO: Reading rules file:
>>> 'ms_ftpd_rules.xml'
>>> 2015/10/15 15:42:18 ossec-analysisd: INFO: Reading rules file:
>>> 'ftpd_rules.xml'
>>> 2015/10/15 15:42:18 ossec-analysisd: INFO: Reading rules file:
>>> 'hordeimp_rules.xml'
>>> 2015/10/15 15:42:18 ossec-analysisd: INFO: Reading rules file:
>>> 'roundcube_rules.xml'
>>> 2015/10/15 15:42:18 ossec-analysisd: INFO: Reading rules file:
>>> 'wordpress_rules.xml'
>>> 2015/10/15 15:42:18 ossec-analysisd: INFO: Reading rules file:
>>> 'cimserver_rules.xml'
>>> 2015/10/15 15:42:18 ossec-analysisd: INFO: Reading rules file:
>>> 'vpopmail_rules.xml'
>>> 2015/10/15 15:42:18 ossec-analysisd: INFO: Reading rules file:
>>> 'vmpop3d_rules.xml'
>>> 2015/10/15 15:42:18 ossec-analysisd: INFO: Reading rules file:
>>> 'courier_rules.xml'
>>> 2015/10/15 15:42:18 ossec-analysisd: INFO: Reading rules file:
>>> 'web_rules.xml'
>>> 2015/10/15 15:42:18 ossec-analysisd: INFO: Reading rules file:
>>> 'web_appsec_rules.xml'
>>> 2015/10/15 15:42:18 ossec-analysisd: INFO: Reading rules file:
>>> 'apache_rules.xml'
>>> 2015/10/15 15:42:18 ossec-analysisd: INFO: Reading rules file:
>>> 'nginx_rules.xml'
>>> 2015/10/15 15:42:18 ossec-analysisd: INFO: Reading rules file:
>>> 'php_rules.xml'
>>> 2015/10/15 15:42:18 ossec-analysisd: INFO: Reading rules file:
>>> 'mysql_rules.xml'
>>> 2015/10/15 15:42:18 ossec-analysisd: INFO: Reading rules file:
>>> 'postgresql_rules.xml'
>>> 2015/10/15 15:42:18 ossec-analysisd: INFO: Reading rules file:
>>> 'ids_rules.xml'
>>> 2015/10/15 15:42:18 ossec-analysisd: INFO: Reading rules file:
>>> 'squid_rules.xml'
>>> 2015/10/15 15:42:18 ossec-analysisd: INFO: Reading rules file:
>>> 'firewall_rules.xml'
>>> 2015/10/15 15:42:18 ossec-analysisd: INFO: Reading rules file:
>>> 'cisco-ios_rules.xml'
>>> 2015/10/15 15:42:18 ossec-analysisd: INFO: Reading rules file:
>>> 'netscreenfw_rules.xml'
>>> 2015/10/15 15:42:18 ossec-analysisd: INFO: Reading rules file:
>>> 'sonicwall_rules.xml'
>>> 2015/10/15 15:42:18 ossec-analysisd: INFO: Reading rules file:
>>> 'postfix_rules.xml'
>>> 2015/10/15 15:42:18 ossec-analysisd: INFO: Reading rules file:
>>> 'sendmail_rules.xml'
>>> 2015/10/15 15:42:18 ossec-analysisd: INFO: Reading rules file:
>>> 'imapd_rules.xml'
>>> 2015/10/15 15:42:18 ossec-analysisd: INFO: Reading rules file:
>>> 'mailscanner_rules.xml'
>>> 2015/10/15 15:42:18 ossec-analysisd: INFO: Reading rules file:
>>> 'dovecot_rules.xml'
>>> 2015/10/15 15:42:18 ossec-analysisd: INFO: Reading rules file:
>>> 'ms-exchange_rules.xml'
>>> 2015/10/15 15:42:18 ossec-analysisd: INFO: Reading rules file:
>>> 'racoon_rules.xml'
>>> 2015/10/15 15:42:18 ossec-analysisd: INFO: Reading rules file:
>>> 'vpn_concentrator_rules.xml'
>>> 2015/10/15 15:42:18 ossec-analysisd: INFO: Reading rules file:
>>> 'spamd_rules.xml'
>>> 2015/10/15 15:42:18 ossec-analysisd: INFO: Reading rules file:
>>> 'msauth_rules.xml'
>>> 2015/10/15 15:42:18 ossec-analysisd: INFO: Reading rules file:
>>> 'mcafee_av_rules.xml'
>>> 2015/10/15 15:42:18 ossec-analysisd: INFO: Reading rules file:
>>> 'trend-osce_rules.xml'
>>> 2015/10/15 15:42:18 ossec-analysisd: INFO: Reading rules file:
>>> 'ms-se_rules.xml'
>>> 2015/10/15 15:42:18 ossec-analysisd: INFO: Reading rules file:
>>> 'zeus_rules.xml'
>>> 2015/10/15 15:42:18 ossec-analysisd: INFO: Reading rules file:
>>> 'solaris_bsm_rules.xml'
>>> 2015/10/15 15:42:18 ossec-analysisd: INFO: Reading rules file:
>>> 'vmware_rules.xml'
>>> 2015/10/15 15:42:18 ossec-analysisd: INFO: Reading rules file:
>>> 'ms_dhcp_rules.xml'
>>> 2015/10/15 15:42:18 ossec-analysisd: INFO: Reading rules file:
>>> 'asterisk_rules.xml'
>>> 2015/10/15 15:42:18 ossec-analysisd: INFO: Reading rules file:
>>> 'ossec_rules.xml'
>>> 2015/10/15 15:42:18 ossec-analysisd: INFO: Reading rules file:
>>> 'attack_rules.xml'
>>> 2015/10/15 15:42:18 ossec-analysisd: INFO: Reading rules file:
>>> 'openbsd_rules.xml'
>>> 2015/10/15 15:42:18 ossec-analysisd: INFO: Reading rules file:
>>> 'clam_av_rules.xml'
>>> 2015/10/15 15:42:18 ossec-analysisd: INFO: Reading rules file:
>>> 'dropbear_rules.xml'
>>> 2015/10/15 15:42:18 ossec-analysisd: INFO: Reading rules file:
>>> 'local_rules.xml'
>>> 2015/10/15 15:42:18 ossec-analysisd: INFO: Total rules enabled: '1310'
>>> 2015/10/15 15:42:18 ossec-analysisd: INFO: Ignoring file: '/etc/mtab'
>>> 2015/10/15 15:42:18 ossec-analysisd: INFO: Ignoring file: '/etc/mnttab'
>>> 2015/10/15 15:42:18 ossec-analysisd: INFO: Ignoring file:
>>> '/etc/hosts.deny'
>>> 2015/10/15 15:42:18 ossec-analysisd: INFO: Ignoring file:
>>> '/etc/mail/statistics'
>>> 2015/10/15 15:42:18 ossec-analysisd: INFO: Ignoring file:
>>> '/etc/random-seed'
>>> 2015/10/15 15:42:18 ossec-analysisd: INFO: Ignoring file: '/etc/adjtime'
>>> 2015/10/15 15:42:18 ossec-analysisd: INFO: Ignoring file:
>>> '/etc/httpd/logs'
>>> 2015/10/15 15:42:18 ossec-analysisd: INFO: Ignoring file: '/etc/utmpx'
>>> 2015/10/15 15:42:18 ossec-analysisd: INFO: Ignoring file: '/etc/wtmpx'
>>> 2015/10/15 15:42:18 ossec-analysisd: INFO: Ignoring file:
>>> '/etc/cups/certs'
>>> 2015/10/15 15:42:18 ossec-analysisd: INFO: Ignoring file:
>>> '/etc/dumpdates'
>>> 2015/10/15 15:42:18 ossec-analysisd: INFO: Ignoring file:
>>> '/etc/svc/volatile'
>>> 2015/10/15 15:42:18 ossec-analysisd: INFO: Ignoring file:
>>> 'C:\WINDOWS/System32/LogFiles'
>>> 2015/10/15 15:42:18 ossec-analysisd: INFO: Ignoring file:
>>> 'C:\WINDOWS/Debug'
>>> 2015/10/15 15:42:18 ossec-analysisd: INFO: Ignoring file:
>>> 'C:\WINDOWS/WindowsUpdate.log'
>>> 2015/10/15 15:42:18 ossec-analysisd: INFO: Ignoring file:
>>> 'C:\WINDOWS/iis6.log'
>>> 2015/10/15 15:42:18 ossec-analysisd: INFO: Ignoring file:
>>> 'C:\WINDOWS/system32/wbem/Logs'
>>> 2015/10/15 15:42:18 ossec-analysisd: INFO: Ignoring file:
>>> 'C:\WINDOWS/system32/wbem/Repository'
>>> 2015/10/15 15:42:18 ossec-analysisd: INFO: Ignoring file:
>>> 'C:\WINDOWS/Prefetch'
>>> 2015/10/15 15:42:18 ossec-analysisd: INFO: Ignoring file:
>>> 'C:\WINDOWS/PCHEALTH/HELPCTR/DataColl'
>>> 2015/10/15 15:42:18 ossec-analysisd: INFO: Ignoring file:
>>> 'C:\WINDOWS/SoftwareDistribution'
>>> 2015/10/15 15:42:18 ossec-analysisd: INFO: Ignoring file:
>>> 'C:\WINDOWS/Temp'
>>> 2015/10/15 15:42:18 ossec-analysisd: INFO: Ignoring file:
>>> 'C:\WINDOWS/system32/config'
>>> 2015/10/15 15:42:18 ossec-analysisd: INFO: Ignoring file:
>>> 'C:\WINDOWS/system32/spool'
>>> 2015/10/15 15:42:18 ossec-analysisd: INFO: Ignoring file:
>>> 'C:\WINDOWS/system32/CatRoot'
>>> 2015/10/15 15:42:18 ossec-analysisd: INFO: White listing IP: '127.0.0.1'
>>> 2015/10/15 15:42:18 ossec-analysisd: INFO: White listing IP:
>>> '10.23.23.123'
>>> 2015/10/15 15:42:18 ossec-analysisd: INFO: 2 IPs in the white list for
>>> active response.
>>> 2015/10/15 15:42:18 ossec-analysisd: INFO: White listing Hostname:
>>> 'localhost.localdomain'
>>> 2015/10/15 15:42:18 ossec-analysisd: INFO: 1 Hostname(s) in the white
>>> list for active response.
>>> 2015/10/15 15:42:18 ossec-analysisd: INFO: Started (pid: 5595).
>>> 2015/10/15 15:42:19 ossec-remoted(4111): INFO: Maximum number of agents
>>> allowed: '256'.
>>> 2015/10/15 15:42:19 ossec-remoted(1410): INFO: Reading authentication
>>> keys file.
>>> 2015/10/15 15:42:19 ossec-remoted: INFO: Assigning counter for agent
>>> hal: '7:3538'.
>>> 2015/10/15 15:42:19 ossec-remoted: INFO: Assigning sender counter: 0:102
>>> 2015/10/15 15:42:19 ossec-monitord: INFO: Started (pid: 5614).
>>> 2015/10/15 15:42:21 ossec-analysisd: INFO: Connected to
>>> '/queue/alerts/ar' (active-response queue)
>>> 2015/10/15 15:42:21 ossec-analysisd: INFO: Connected to
>>> '/queue/alerts/execq' (exec queue)
>>> 2015/10/15 15:42:23 ossec-syscheckd: INFO: Started (pid: 5610).
>>> 2015/10/15 15:42:23 ossec-rootcheck: INFO: Started (pid: 5610).
>>> 2015/10/15 15:42:23 ossec-syscheckd: INFO: Monitoring directory: '/etc'.
>>> 2015/10/15 15:42:23 ossec-syscheckd: INFO: Monitoring directory:
>>> '/usr/bin'.
>>> 2015/10/15 15:42:23 ossec-syscheckd: INFO: Monitoring directory:
>>> '/usr/sbin'.
>>> 2015/10/15 15:42:23 ossec-syscheckd: INFO: Monitoring directory: '/bin'.
>>> 2015/10/15 15:42:23 ossec-syscheckd: INFO: Monitoring directory: '/sbin'.
>>> 2015/10/15 15:42:24 ossec-logcollector(1950): INFO: Analyzing file:
>>> '/var/log/auth.log'.
>>> 2015/10/15 15:42:24 ossec-logcollector(1950): INFO: Analyzing file:
>>> '/var/log/syslog'.
>>> 2015/10/15 15:42:24 ossec-logcollector(1950): INFO: Analyzing file:
>>> '/var/log/dpkg.log'.
>>> 2015/10/15 15:42:24 ossec-logcollector(1950): INFO: Analyzing file:
>>> '/var/log/apache2/error.log'.
>>> 2015/10/15 15:42:24 ossec-logcollector(1950): INFO: Analyzing file:
>>> '/var/log/apache2/access.log'.
>>> 2015/10/15 15:42:24 ossec-logcollector: INFO: Monitoring output of
>>> command(360): df -h
>>> 2015/10/15 15:42:24 ossec-logcollector: INFO: Monitoring full output of
>>> command(360): netstat -tan |grep LISTEN |grep -v 127.0.0.1 | sort
>>> 2015/10/15 15:42:24 ossec-logcollector: INFO: Monitoring full output of
>>> command(360): last -n 5
>>> 2015/10/15 15:42:24 ossec-logcollector: INFO: Started (pid: 5599).
>>>
>>>
>>>
>>>
>>> Am Donnerstag, 15. Oktober 2015 14:52:51 UTC+2 schrieb dan (ddpbsd):
>>>>
>>>> On Thu, Oct 15, 2015 at 8:49 AM, Jedi Meister <foob...@gmail.com>
>>>> wrote:
>>>> > Hi,
>>>> >
>>>> > I'm currently migrating OSSEC from Ubuntu 14.04 (x64) to an
>>>> Raspeberry Pi2
>>>> > running Ubuntu 14.04 (arm). As there is no binary build, I build up
>>>> > everything from the source. I copy over the running config from the
>>>> Ubuntu
>>>> > host to the Raspberry.
>>>> >
>>>> > When I start OSSEC, Agents can not connect to OSSEC.
>>>> >
>>>> > I search the list and found something similar at:
>>>> >
>>>> https://www.mail-archive.com/ossec-list@googlegroups.com/msg09198.html
>>>> >
>>>> > There was the case that the agents can not connect to the Rethat
>>>> system but
>>>> > to a cent os system in the same network.
>>>> >
>>>> > It's the same here. Firewall is open and agents sends data:
>>>> > tcpdump: verbose output suppressed, use -v or -vv for full protocol
>>>> decode
>>>> > listening on eth0, link-type EN10MB (Ethernet), capture size 65535
>>>> bytes
>>>> >
>>>> > 14:46:42.590610 IP static.xx.xx.xx.xx > 10.23.23.2.1514: UDP, length
>>>> 441
>>>> >
>>>> >
>>>> > Log files:
>>>> > 2015/10/15 14:29:38 ossec-remoted(4111): INFO: Maximum number of
>>>> agents
>>>> > allowed: '256'.
>>>> > 2015/10/15 14:29:38 ossec-remoted(1410): INFO: Reading authentication
>>>> keys
>>>> > file.
>>>> > 2015/10/15 14:29:38 ossec-monitord: INFO: Started (pid: 32534).
>>>> > 2015/10/15 14:29:40 ossec-analysisd: INFO: Connected to
>>>> '/queue/alerts/ar'
>>>> > (active-response queue)
>>>> > 2015/10/15 14:29:40 ossec-analysisd: INFO: Connected to
>>>> > '/queue/alerts/execq' (exec queue)
>>>> > 2015/10/15 14:29:42 ossec-syscheckd: INFO: Started (pid: 32527).
>>>> > 2015/10/15 14:29:42 ossec-rootcheck: INFO: Started (pid: 32527).
>>>> >
>>>> > Any ideas what could be the cause of the server not accepting
>>>> connections?
>>>> > The same setup, same config is running fine on the intel ubuntu.
>>>> >
>>>>
>>>> You didn't give us much to go on. Did you create a new key for this
>>>> agent?
>>>> Did you install it?
>>>> Did you restart the OSSEC processes after adding the key?
>>>> Are you sure there's no firewall on the OSSEC manager blocking the
>>>> traffic?
>>>> Are there any logs from the manager's ossec.log file that might hint
>>>> at the problem?
>>>>
>>>> > Brgs
>>>> > Daniel
>>>> >
>>>> > --
>>>> >
>>>> > ---
>>>> > You received this message because you are subscribed to the Google
>>>> Groups
>>>> > "ossec-list" group.
>>>> > To unsubscribe from this group and stop receiving emails from it,
>>>> send an
>>>> > email to ossec-list+...@googlegroups.com.
>>>> > For more options, visit https://groups.google.com/d/optout.
>>>>
>>> --
>
> ---
> You received this message because you are subscribed to the Google Groups
> "ossec-list" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to ossec-list+unsubscr...@googlegroups.com.
> For more options, visit https://groups.google.com/d/optout.
>

-- 

--- 
You received this message because you are subscribed to the Google Groups 
"ossec-list" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to ossec-list+unsubscr...@googlegroups.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to