On Fri, Aug 19, 2016 at 5:17 AM, Jesus Linares <je...@wazuh.com> wrote: > Hi, > > there is no "agentID" tag for rules. It seems that in your case, the > hostname is the same that the agent name, so it could work. But, remember > that some events have the hostname field empty. > > Usually, it is better to use the field srcip to ignore rules due to is > unique and it is more difficult to spoof (anyone can change the hostname of > his machine). > > In case you need it, you could create a decoder to extract the IP of your > logs. >
This Pull Request grabs the IP address from the provided logs: https://github.com/ossec/ossec-hids/pull/924 > Regards. > > > On Thursday, August 18, 2016 at 5:52:11 PM UTC+2, Cliftyman wrote: >> >> I just realized I use <hostname> to reference the agent name in most all >> of my rules (and 95% of them work). Am I using that incorrectly? Isn't >> there a rule field to reference the name of the sending agent... perhaps >> <agentID> or something of that nature? >> >> >>> Totally forgot about the logtest utility... thanks much on making me >>> aware of that! >>> >>> It looks like I could using the hostname type and specify the source IP >>> inside of <hostname></hostname> in my rule and the suppression rule will >>> work. Will try that now. >>> >>> >>> >>> On Thursday, August 18, 2016 at 8:30:59 AM UTC-5, dan (ddpbsd) wrote: >>>> >>>> On Thu, Aug 18, 2016 at 9:09 AM, Cliftyman <clif...@gmail.com> wrote: >>>> > I'm confused about how to use the rule types built into the OSSEC log >>>> > rule >>>> > syntax. >>>> > >>>> > I have a localfile declared in my /var/ossec/etc/shared/agent.conf.... >>>> > >>>> > agent_config name="centrallogger"> >>>> > <localfile> >>>> > <location>/var/log/LOC/*.log</location> >>>> > <log_format>syslog</log_format> >>>> > </localfile> >>>> > </agent_config> >>>> > >>>> > This is a central logging "catchall" server that I send multiple >>>> > systems >>>> > logs to and I run an OSSEC agent on that syslog server to watch all >>>> > the >>>> > logs. So all .log files in /var/log/LOC on server1 should be syslog >>>> > format.... I'm receiving alerts from these logs just fine. Alerts >>>> > come >>>> > from "centrallogger" but the first line states the location so I know >>>> > which >>>> > server the alert is referencing. There are some scripting errors on >>>> > one of >>>> > the servers sending logs to "centrallogger" and I want to filter them >>>> > out. >>>> > So I wrote a rule in local.rules on my OSSEC server that included a >>>> > <srcip> >>>> > declaration: >>>> > >>>> > <rule id="100073" level="0"> >>>> > <if_sid>5720</if_sid> >>>> > <srcip>192.168.1.5</srcip> >>>> >>>> Using the logs below, I get this with ossec-logtest: >>>> ossec-testrule: Type one log per line. >>>> >>>> Aug 18 07:30:25 192.168.1.5 sshd[20247]: [ID 800047 auth.notice] >>>> Failed none for root from 192.168.1.1 port 36942 ssh2 >>>> >>>> >>>> **Phase 1: Completed pre-decoding. >>>> full event: 'Aug 18 07:30:25 192.168.1.5 sshd[20247]: [ID >>>> 800047 auth.notice] Failed none for root from 192.168.1.1 port 36942 >>>> ssh2 ' >>>> hostname: '192.168.1.5' >>>> program_name: 'sshd' >>>> log: 'Failed none for root from 192.168.1.1 port 36942 ssh2 ' >>>> >>>> **Phase 2: Completed decoding. >>>> decoder: 'sshd' >>>> >>>> **Phase 3: Completed filtering (rules). >>>> Rule id: '5716' >>>> Level: '5' >>>> Description: 'SSHD authentication failed.' >>>> **Alert to be generated. >>>> >>>> So srcip isn't being decoded. >>>> >>>> > <hostname>centrallogger</hostname> >>>> > <description>scripted maint failing on interconnect >>>> > links</description> >>>> > </rule> >>>> > >>>> > To suppress the alert I was receiving below......... >>>> > >>>> > OSSEC HIDS Notification. >>>> > >>>> > 2016 Aug 18 08:36:29 >>>> > >>>> > >>>> > >>>> > Received From: (centrallogger) >>>> > 10.147.130.0->/var/log/LOC/loggedserver1.log >>>> > >>>> > Rule: 5720 fired (level 10) -> "Multiple SSHD authentication >>>> > failures." >>>> > >>>> > Portion of the log(s): >>>> > >>>> > >>>> > >>>> > Aug 18 07:30:25 192.168.1.5 sshd[20247]: [ID 800047 auth.notice] >>>> > Failed none >>>> > for root from 192.168.1.1 port 36942 ssh2 >>>> > Aug 18 07:30:24 192.168.1.5 sshd[20227]: [ID 800047 auth.notice] >>>> > Failed none >>>> > for root from 192.168.1.1 port 36941 ssh2 >>>> > Aug 18 07:30:23 192.168.1.5 sshd[20205]: [ID 800047 auth.notice] >>>> > Failed none >>>> > for root from 192.168.1.1 port 36939 ssh2 >>>> > >>>> > And the suppression is not working. I've also attempted a <match> on >>>> > ASCII >>>> > text "Failed none for root". I've historically had issues getting >>>> > matching >>>> > to work in log messages and I'm wondering if this has something to do >>>> > with >>>> > using a wildcard, or if my syslog log format decoder is not working >>>> > properly? If I'm using <srcip> OSSEC has to recognize where the SRCIP >>>> > is in >>>> > the syslog string? >>>> > >>>> > >>>> > -- >>>> > >>>> > --- >>>> > You received this message because you are subscribed to the Google >>>> > Groups >>>> > "ossec-list" group. >>>> > To unsubscribe from this group and stop receiving emails from it, send >>>> > an >>>> > email to ossec-list+...@googlegroups.com. >>>> > For more options, visit https://groups.google.com/d/optout. > > -- > > --- > You received this message because you are subscribed to the Google Groups > "ossec-list" group. > To unsubscribe from this group and stop receiving emails from it, send an > email to ossec-list+unsubscr...@googlegroups.com. > For more options, visit https://groups.google.com/d/optout. -- --- You received this message because you are subscribed to the Google Groups "ossec-list" group. To unsubscribe from this group and stop receiving emails from it, send an email to ossec-list+unsubscr...@googlegroups.com. For more options, visit https://groups.google.com/d/optout.