Re: [ossec-list] CentOS 7

2015-09-17 Thread Jason 'XenoPhage'; Frisvold
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 9/15/15 10:50 PM, Dillon Korman wrote:
> Hi,
> 
> Is the CentOS 7 version coming soon? I only see 5 and 6. Also, does
> the CentOS version work perfectly with RHEL?

Oh hell, I'll jump on the bandwagon too..  I have a repo here :

http://repo.godshell.com

Based on the atomic stuff, with some of their extras removed.

- -- 
- -------
Jason 'XenoPhage' Frisvold
xenoph...@godshell.com
- ---

“Space,” it says, “is big. Really big. You just won’t believe how
vastly, hugely, mindbogglingly big it is. I mean, you may think it’s
a long way down the road to the chemist’s, but that’s just peanuts to
space.”
- - The Hitchhikers Guide to the Galaxy
-BEGIN PGP SIGNATURE-
Comment: GPGTools - http://gpgtools.org

iEYEARECAAYFAlX7ItsACgkQ8CjzPZyTUTQG6wCgosJBwDK0lm4s1SGvwGBvsZI6
PskAn1ZYZdNgETb72hp8EQvNnT1sEudM
=bPLn
-END PGP SIGNATURE-

-- 

--- 
You received this message because you are subscribed to the Google Groups 
"ossec-list" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to ossec-list+unsubscr...@googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [ossec-list] Regarding installation of OSSEC in Linux systems

2012-11-16 Thread Jason 'XenoPhage'; Frisvold
On Nov 16, 2012, at 7:37 AM, Eero Volotinen  wrote:
> You can also use SELinux with ossec, but it requires some tuning..

Any idea if there's a how-to out there identifying how to do this?

> --
> Eero

-------
Jason 'XenoPhage' Frisvold
xenoph...@godshell.com
---
"Any sufficiently advanced magic is indistinguishable from technology."
- Niven's Inverse of Clarke's Third Law





Re: [ossec-list] OSSEC Symposium Summer 2012, July 12-13, Cupertino, CA

2012-06-05 Thread Jason 'XenoPhage'; Frisvold
Not to be distrustful, but why would trend micro announce this and put the sign 
up page on a non-trend micro domain?  And announce via a gmail address?  I 
smell a scam...

- Friz

On Jun 5, 2012, at 6:48 PM, JB  wrote:

> Trend Micro has announced the first OSSEC Symposium to the open source 
> community. It's a two-day event to be held in Cupertino, California, USA on 
> July 12-13, 2012. The agenda include Trend Micro managers talking about the 
> future direction of OSSEC project, expert OSSEC developers presenting their 
> experience, and fellow OSSEC users sharing their success stories as well as 
> pain points. 
> 
> Your participation can influence the future of OSSEC. 
> Registration is free and lunch will be provided on both days. 
> See http://vichargrave.com/ossec-symposium/ for details. 
> 
> JB Cheng
> OSSEC Project Manager
> Cupertino, CA, USA


Re: [ossec-list] Web Server Trouble

2012-01-24 Thread Jason 'XenoPhage'; Frisvold
On Jan 24, 2012, at 8:37 AM, Joe Gedeon wrote:
> You should look at your logs and see what is triggering the 400's and
> fix that issue if it is a server side issue.

Agreed.  Basically, the web browser is trying to obtain something from the 
server that's just not there.  Thus, 400 errors are triggered.  As a result, 
OSSEC sees a bunch of these fly by and considers it an attack.  It's far better 
to fix the underlying problem than to alter OSSEC to ignore such things.


-----------
Jason 'XenoPhage' Frisvold
xenoph...@godshell.com
---
"Any sufficiently advanced magic is indistinguishable from technology."
- Niven's Inverse of Clarke's Third Law





Re: [ossec-list] Linux Management Server, Windows Agents, streamline config files from manager

2012-01-24 Thread Jason 'XenoPhage'; Frisvold
On Jan 23, 2012, at 7:23 PM, BP9906 wrote:
> Word of advice too. When you make changes to the agent.conf on the
> ossec server, it takes a few minutes to copy down to the agents. Then
> you have to somehow remember to restart all the agents to re-read the
> newly copied agent.conf file. To restart all the agents, you can do
> something like this:
> 
> for i in `/var/ossec/bin/agent_control -l | grep "ID:" | awk '{print
> $2}' | sed 's/.$//'`; do /var/ossec/bin/agent_control -R $i; sleep 2;
> done

Or, if you're into a more automated method, you can do this :

http://blog.godshell.com/blog/archives/291-Helpful-Rules-For-OSSEC.html

---
Jason 'XenoPhage' Frisvold
xenoph...@godshell.com
---
"Any sufficiently advanced magic is indistinguishable from technology."
- Niven's Inverse of Clarke's Third Law





Re: [ossec-list] Web Server Trouble

2012-01-23 Thread Jason 'XenoPhage'; Frisvold
On Jan 23, 2012, at 5:05 PM, Damien Hull wrote:
> I have ossec 2.6 running on Ubuntu 10.04 LTS. This is a web server
> running LAMP
> 
> There are several websites on this server. Every now and then OSSEC
> will block an IP address for accessing a website. This is not an
> attack of any kind. I've had it happen to me. I'll access a website on
> the server and bam, blocked.
> 
> I have it configured to unblock the IP after 10 minutes. I figured
> after 10 minutes a hacker will get tired and move on. I don't want
> this to happen with users of my server.
> 
> Is there a way to configure OSSEC so this doesn't happen? I've never
> taken the time to tweak OSSEC
> 
> NOTE
> The latest alert was for Moodle. I'm guessing a user clicked on
> something and OSSEC didn't like it...


It blocks for a reason.  If you can provide the alert it sent, that would go a 
long way to identifying what it's seeing as bad.  It's probably something 
simple.  I haven't had a chance to fully test Moodle as of yet, but I expect 
there will be a number of items that need to be handled in order to make it all 
run smoothly.  Incidentally, is this Moodle 1 or 2?

---
Jason 'XenoPhage' Frisvold
xenoph...@godshell.com
---
"Any sufficiently advanced magic is indistinguishable from technology."
- Niven's Inverse of Clarke's Third Law





signature.asc
Description: Message signed with OpenPGP using GPGMail


Re: [ossec-list] how to clone

2012-01-18 Thread Jason 'XenoPhage'; Frisvold
On Jan 18, 2012, at 8:34 AM, dan (ddp) wrote:
> In that case it's as simple as `hg clone 
> https://bitbucket.org/dcid/ossec-hids`

Right, right..  Mercurial clone..  I've got git on the brain these days..  :P

---
Jason 'XenoPhage' Frisvold
xenoph...@godshell.com
---
"Any sufficiently advanced magic is indistinguishable from technology."
- Niven's Inverse of Clarke's Third Law





Re: [ossec-list] how to clone

2012-01-17 Thread Jason 'XenoPhage'; Frisvold
On Jan 17, 2012, at 7:07 PM, dan (ddp) wrote:
> What?

It's an old post (January, 2011) from dcid..  I believe they're not 
understanding how to do a git clone.

I believe, however, that this code is in the latest release, so all you need to 
do is get the latest stable release from ossec.net and those features are in 
there.

> On Sun, Jan 15, 2012 at 1:16 PM, satyanarayan mahapatra
>  wrote:
>> Hi
>> 
>> as suggested -http://dcid.me/2011/01/automatically-creating-and-
>> setting-up-the-agent-keys/ hear i clicked on get source on my windows
>> machine after that don't know how to clone with ossec install on
>> Ubuntu
>> 
>> advance thanks for help

---
Jason 'XenoPhage' Frisvold
xenoph...@godshell.com
---
"Any sufficiently advanced magic is indistinguishable from technology."
- Niven's Inverse of Clarke's Third Law





signature.asc
Description: Message signed with OpenPGP using GPGMail


Re: [ossec-list] 2.6 compile error on RHEL3u9

2012-01-11 Thread Jason 'XenoPhage'; Frisvold
On Jan 11, 2012, at 3:34 PM, Swartz, Patrick H wrote:
>   Hi All,
>   I'm need to compile 2.6 on a RHEL3u9 server but it fails at the
> os_auth phase. The following Openssl packages are installed --
> openssl-0.9.7a-33.23, openssl096b-0.9.6b-16.46, and
> openssl-devel-0.9.7a-33.23
> We need the compile to be built with openssl.


RHEL 3.9?  That's a bit old at this point, no?  Redhat end-of-lifed that in 
October of 2010, which means you're not getting security updates anymore..  I'd 
recommend getting onto something newer ..

-------
Jason 'XenoPhage' Frisvold
xenoph...@godshell.com
---
"Any sufficiently advanced magic is indistinguishable from technology."
- Niven's Inverse of Clarke's Third Law





signature.asc
Description: Message signed with OpenPGP using GPGMail


[ossec-list] Whitelisting by server

2012-01-09 Thread Jason 'XenoPhage'; Frisvold
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

white_list is a global option in ossec.conf .. But is there an easy
way to whitelist by server?  For instance, I want to whitelist some
web developer IPs on the web servers, but I don't want them
whitelisted on other servers such as database or storage servers.  I
don't see a very easy way to do this, though..

Thoughts?

- -- 
- -------
Jason 'XenoPhage' Frisvold
xenoph...@godshell.com
- ---

"Any sufficiently advanced magic is indistinguishable from technology.\"
- - Niven's Inverse of Clarke's Third Law
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.18 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iEYEARECAAYFAk8LMhQACgkQO80o6DJ8Uvn0+gCfWZGS1Wu6LZHoK/zO6OviRcp1
ATsAn3ojJ1+LA7PU7x9//X1gMXcO4RI8
=B9hT
-END PGP SIGNATURE-


Re: [ossec-list] OSSEC RPM

2012-01-06 Thread Jason 'XenoPhage'; Frisvold
On Jan 6, 2012, at 1:13 AM, treydock wrote:
> I've created a fork of Jason's SRPM.  Mostly the changes involve
> adding ability to deploy with agent.conf usage and also refining it to
> be almost duplicate to the source install as far as permissions go.

Hrm..  I'm intrigued.  Are there problems with the permissions?

> I'll post here in next few days once it's finished.

Yes, PLEEZE!

> - Trey

---
Jason 'XenoPhage' Frisvold
xenoph...@godshell.com
---
"Any sufficiently advanced magic is indistinguishable from technology."
- Niven's Inverse of Clarke's Third Law





Re: [ossec-list] OSSEC RPM

2012-01-06 Thread Jason 'XenoPhage'; Frisvold
On Jan 6, 2012, at 9:22 AM, dan (ddp) wrote:
> Any idea if ossec-authd works with your rpm?


It's a standard compile, so it's there.  However, I haven't played with that 
yet.  Though I very much want to ..  I would LOVE to find a way to compress 
time so I can do all the things I need to do ..  :P

-------
Jason 'XenoPhage' Frisvold
xenoph...@godshell.com
---
"Any sufficiently advanced magic is indistinguishable from technology."
- Niven's Inverse of Clarke's Third Law





Re: [ossec-list] OSSEC RPM

2012-01-05 Thread Jason 'XenoPhage'; Frisvold
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 01/05/2012 01:21 AM, Joe S wrote:
> That does help. I'm trying to do the same thing.

You can find the SRPM I created on my site :

http://godshell.com/software

- -- 
- ---
Jason 'XenoPhage' Frisvold
xenoph...@godshell.com
- ---

"Any sufficiently advanced magic is indistinguishable from technology.\"
- - Niven's Inverse of Clarke's Third Law
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.18 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iEYEARECAAYFAk8GGTgACgkQO80o6DJ8UvnpugCcD3R0QPGsauqHOmNGwNZrWBFJ
NWsAn1mTnFB8V1FnITfSaCc8TMelXTdI
=Sec2
-END PGP SIGNATURE-


Re: [ossec-list] rpm agent howto set it up to a remote ossec server

2011-11-25 Thread Jason 'XenoPhage'; Frisvold
On Nov 17, 2011, at 3:47 PM, dan (ddp) wrote:
> On Tue, Nov 15, 2011 at 6:27 PM, thing  wrote:
>> Hi,
>> 
>> I just installed the agent and server via rpm to a RHEL6 setup,
>> however when I run the scripts in ~bin to configure the agent on the
>> remote RHEL box it does not ask me for the server IP.
>> 
> 
> We don't currently provide RPMs. Where did you get this one?


RPMs aren't really meant to be interactive, so this sort of this is actually 
expected.  The RPM I built has just a generic config file used for all setups.

---
Jason 'XenoPhage' Frisvold
xenoph...@godshell.com
---
"Any sufficiently advanced magic is indistinguishable from technology."
- Niven's Inverse of Clarke's Third Law





Re: [ossec-list] latest spec file - 2.6?

2011-10-14 Thread Jason 'XenoPhage'; Frisvold
On Oct 14, 2011, at 11:25 AM, Kat wrote:
> Very glad I seemed to spark some interest in getthing the SPEC files
> updated. It just makes for a much nicer/cleaner release for 2.6 since
> the SPEC is very old there and missing compiles of a lot of the newer
> features.

I'm open to suggestions on improvements.  What features are you referring to?

> Thanks to all and if I can help, just let me know.
> 
> -K

-----------
Jason 'XenoPhage' Frisvold
xenoph...@godshell.com
---
"Any sufficiently advanced magic is indistinguishable from technology."
- Niven's Inverse of Clarke's Third Law





Re: [ossec-list] latest spec file - 2.6?

2011-10-12 Thread Jason 'XenoPhage'; Frisvold
On Oct 12, 2011, at 1:59 PM, dan (ddp) wrote:
> I'm the wrong Dan, but PLEASE do this. :)

Yup, meant the magical Mr. Cid.  :)

> I've tweaked the one in your srpm a bit, mostly to remove the patches.
> It seems to compile, but I haven't done any more testing than that.


Sure, I'd be happy to put something together..  Perhaps Trey and I should put 
our heads together..  Anyone else interested?

-------
Jason 'XenoPhage' Frisvold
xenoph...@godshell.com
---
"Any sufficiently advanced magic is indistinguishable from technology."
- Niven's Inverse of Clarke's Third Law





Re: [ossec-list] Integrity check functionality

2011-10-12 Thread Jason 'XenoPhage'; Frisvold
On Oct 12, 2011, at 1:58 PM, dan (ddp) wrote:
> The srpm is yours. I understand the patches are not. I'm pretty sure
> they were accurately labeled.


Cool.  Just want to make sure I'm not getting credit for something I didn't 
do..  :)

-----------
Jason 'XenoPhage' Frisvold
xenoph...@godshell.com
---
"Any sufficiently advanced magic is indistinguishable from technology."
- Niven's Inverse of Clarke's Third Law





Re: [ossec-list] latest spec file - 2.6?

2011-10-12 Thread Jason 'XenoPhage'; Frisvold
On Oct 11, 2011, at 9:19 PM, treydock wrote:
> I have RPMs for CentOS 5 and 6 here, 
> http://itscblog.tamu.edu/ossec-2-6-rpms-for-centos/,
> as well as the SRPMs to customize with.  Jason's SRPM was what made
> mine possible, I only tweaked a few things.

Oh sure.. Like I don't have enough to do..  Now I need to go look and see what 
makes yours so cool..  ;)

Anything major in there?  Something I should add?  Or maybe we all get together 
and make "official" ones for OSSEC and get Dan's blessing?

> - Trey

---
Jason 'XenoPhage' Frisvold
xenoph...@godshell.com
---
"Any sufficiently advanced magic is indistinguishable from technology."
- Niven's Inverse of Clarke's Third Law





Re: [ossec-list] Integrity check functionality

2011-10-12 Thread Jason 'XenoPhage'; Frisvold
On Oct 11, 2011, at 10:56 AM, dan (ddp) wrote:
> Please open an issue for this at 
> https://bitbucket.org/ddpbsd/ossec-hids-testing
> 
> I'm also looking at the patches you have in your rpm. I think some of
> them are already in my testing tree, but definitely not all.


They're not my patches..  Credit where credit is due.  I believe I put the 
author information in the notes..  And if I didn't, then I need to fix that..

-----------
Jason 'XenoPhage' Frisvold
xenoph...@godshell.com
---
"Any sufficiently advanced magic is indistinguishable from technology."
- Niven's Inverse of Clarke's Third Law





Re: [ossec-list] Integrity check functionality

2011-10-11 Thread Jason 'XenoPhage'; Frisvold
On Oct 11, 2011, at 9:25 AM, dan (ddp) wrote:
> It currently does not rotate ossec.log.


Well..  Then it's working as expected.  We should fix that, though..  :)

---
Jason 'XenoPhage' Frisvold
xenoph...@godshell.com
---
"Any sufficiently advanced magic is indistinguishable from technology."
- Niven's Inverse of Clarke's Third Law





Re: [ossec-list] Integrity check functionality

2011-10-10 Thread Jason 'XenoPhage'; Frisvold
On Oct 3, 2011, at 10:47 AM, Daniel Cid wrote:
> Yes, you need monitord. It is the process that will rotate logs and do
> some internal
> maintenance tasks…

Should it be rotating ossec.log as well?

> It shouldn't use too much resources...

-------
Jason 'XenoPhage' Frisvold
xenoph...@godshell.com
---
"Any sufficiently advanced magic is indistinguishable from technology."
- Niven's Inverse of Clarke's Third Law





Re: [ossec-list] latest spec file - 2.6?

2011-10-10 Thread Jason 'XenoPhage'; Frisvold
On Oct 3, 2011, at 9:35 AM, Kat wrote:
> Just curious if anyone has a current spec file for agent and server
> for 2.6? All the ones I am finding are very old. A lot of changes have
> occurred and i don't want to re-invent the wheel if someone else has
> already done the work.

You can find an SRPM on my site :

http://godshell.com/software

It includes a few patches, but starts with pristine source.  It should be easy 
enough to remove the patches if that's what you're after.  It's based on the 
AtomicTurtle spec.

> thanks
> ~k

-------
Jason 'XenoPhage' Frisvold
xenoph...@godshell.com
---
"Any sufficiently advanced magic is indistinguishable from technology."
- Niven's Inverse of Clarke's Third Law





Re: [ossec-list] Third Annual Week of OSSEC

2011-09-28 Thread Jason 'XenoPhage'; Frisvold
On Sep 28, 2011, at 9:01 PM, Michael Starks wrote:
> It's almost that time of year again. October is National Cybersecurity 
> Awareness Month. It's also the third year that we have the opportunity to 
> come together as a community to share some great OSSEC info. This year we 
> have designated Oct 23-29.

Phew..  plenty of time to craft some ideas for posts!

> So, start thinking about those blog posts, how-tos, patches, documentation 
> updates, new features and or any other OSSEC-fu you can contribute. Feel free 
> to get creative. Maybe the OSSEC logo could be morphed into something cool. 
> Everyone has a talent.
> 
> Sharing made OSSEC what it is today and I hope this can be the biggest year 
> yet!


Speaking of cyber security month..  Anyone headed to DerbyCon this weekend?

---
Jason 'XenoPhage' Frisvold
xenoph...@godshell.com
---
"Any sufficiently advanced magic is indistinguishable from technology."
- Niven's Inverse of Clarke's Third Law





Re: [ossec-list] All Agents offline

2011-09-10 Thread Jason 'XenoPhage'; Frisvold
On Sep 10, 2011, at 7:24 PM, dan (ddp) wrote:
> I have a bad python script (ossecctl) that does certain ossec related
> tasks. One of them checks on the status of ossec agents. In nrpe I
> have check_agents setup to run "ossecctl status agents" and if an
> agent is not connected it exits 1 (I think, it's a nagios warning) and
> lists the bad agents.
> I keep meaning to clean it up a bit to be a bit smarter (check a list
> to see if the agent is mobile and is allowed to be disconnected, alert
> at critical after X minutes, etc.). I just haven't gotten around to
> it.
> Another change I keep meaning to make is having it check the agent
> status directly instead of relying on ossec-control.


Any chance you'd share the script?  I've been meaning to learn Python..  :P

---
Jason 'XenoPhage' Frisvold
xenoph...@godshell.com
---
"Any sufficiently advanced magic is indistinguishable from technology."
- Niven's Inverse of Clarke's Third Law





Re: [ossec-list] All Agents offline

2011-09-10 Thread Jason 'XenoPhage'; Frisvold
On Sep 8, 2011, at 2:29 PM, dan (ddp) wrote:
>> 1 - How to monitor this? I have raised the Agent offline alert to a
>> higher level, but I would like some automated monitoring of this
>> state.
> 
> I use nagios.


I'm interested in how you're doing this..  Can you explain further?

-------
Jason 'XenoPhage' Frisvold
xenoph...@godshell.com
---
"Any sufficiently advanced magic is indistinguishable from technology."
- Niven's Inverse of Clarke's Third Law





signature.asc
Description: Message signed with OpenPGP using GPGMail


Re: [ossec-list] Rule not firing properly?

2011-08-17 Thread Jason 'XenoPhage'; Frisvold
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 08/16/2011 05:35 PM, dan (ddp) wrote:
> Are there any entries in the agent's active-responses.log (for any
> AR action, not just this one)? Is AR working? Is execd running?

Yes, the AR attempt for the invalid hostname is in there.  AR, in
general, is working.  Yes, execd is running.  This is the master server,
but also the server where these active responses should be firing.

- -- 
- -------
Jason 'XenoPhage' Frisvold
xenoph...@godshell.com
- ---

"Any sufficiently advanced magic is indistinguishable from technology.\"
- - Niven's Inverse of Clarke's Third Law
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.17 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iEYEARECAAYFAk5Lz8cACgkQO80o6DJ8UvlR3gCgk5lYQvAP7Zj0mnjxk25N0z8v
TCoAnAjXrq2MU0yS2+2UdxxdcRv54lmY
=53Qw
-END PGP SIGNATURE-


Re: [ossec-list] Rule not firing properly?

2011-08-15 Thread Jason 'XenoPhage'; Frisvold
Sorry, apparently the new GPGMail extension I have doesn't quite work right..  
Or I have a setting wrong..  Let's try this again without that enabled...

Hi all,

OSSEC 2.6 on a CentOS 5.6 system.

I was just nailed with an SSH brute force attack which =
apparently lasted a while.  I received a whole bunch of mails from OSSEC =
about it, yet it did nothing to stop it..  I understand why for some of =
the messages, but not others.

For instance, the following triggered an active response, as =
expected, but unfortunately, the attack wasn't stopped because the =
reverse address was invalid.

OSSEC HIDS Notification.
2011 Aug 15 20:53:06

Received From: myserver->/var/log/secure
Rule: 5703 fired (level 10) -> "Possible breakin attempt (high number of =
reverse lookup errors)."
Portion of the log(s):

Aug 15 20:53:05 myserver sshd[23210]: reverse mapping checking =
getaddrinfo for 122-146-120-139.static.sparqnet.net failed - POSSIBLE =
BREAK-IN ATTEMPT!
Aug 15 20:53:01 myserver sshd[23207]: reverse mapping checking =
getaddrinfo for 122-146-120-139.static.sparqnet.net failed - POSSIBLE =
BREAK-IN ATTEMPT!
Aug 15 20:53:01 myserver sshd[23205]: reverse mapping checking =
getaddrinfo for 122-146-120-139.static.sparqnet.net failed - POSSIBLE =
BREAK-IN ATTEMPT!
Aug 15 20:52:57 myserver sshd[23178]: reverse mapping checking =
getaddrinfo for 122-146-120-139.static.sparqnet.net failed - POSSIBLE =
BREAK-IN ATTEMPT!
Aug 15 20:52:57 myserver sshd[23166]: reverse mapping checking =
getaddrinfo for 122-146-120-139.static.sparqnet.net failed - POSSIBLE =
BREAK-IN ATTEMPT!
Aug 15 20:52:54 myserver sshd[23141]: reverse mapping checking =
getaddrinfo for 122-146-120-139.static.sparqnet.net failed - POSSIBLE =
BREAK-IN ATTEMPT!

--END OF NOTIFICATION


[me@ myserver ~]$ host 122-146-120-139.static.sparqnet.net
Host 122-146-120-139.static.sparqnet.net not found: 3(NXDOMAIN)
[me@myserver ~]$=20


Sure, I get it.  Not sure how to prevent that one, though the forward =
address is easily handled by another alert, right?  Apparently not, =
though.  Here's the alert that never triggered an active response :


OSSEC HIDS Notification.
2011 Aug 15 21:02:52

Received From: myserver->/var/log/secure
Rule: 5551 fired (level 10) -> "Multiple failed logins in a small period =
of time."
Portion of the log(s):

Aug 15 21:02:51 myserver sshd[29303]: pam_unix(sshd:auth): =
authentication failure; logname=3D uid=3D0 euid=3D0 tty=3Dssh ruser=3D =
rhost=3D122.146.120.139=20
Aug 15 21:02:51 myserver sshd[29302]: pam_unix(sshd:auth): =
authentication failure; logname=3D uid=3D0 euid=3D0 tty=3Dssh ruser=3D =
rhost=3D122.146.120.139=20
Aug 15 21:02:47 myserver sshd[29220]: pam_unix(sshd:auth): =
authentication failure; logname=3D uid=3D0 euid=3D0 tty=3Dssh ruser=3D =
rhost=3D122.146.120.139=20
Aug 15 21:02:47 myserver sshd[29219]: pam_unix(sshd:auth): =
authentication failure; logname=3D uid=3D0 euid=3D0 tty=3Dssh ruser=3D =
rhost=3D122.146.120.139=20
Aug 15 21:02:43 myserver sshd[29213]: pam_unix(sshd:auth): =
authentication failure; logname=3D uid=3D0 euid=3D0 tty=3Dssh ruser=3D =
rhost=3D122.146.120.139=20
Aug 15 21:02:43 myserver sshd[29212]: pam_unix(sshd:auth): =
authentication failure; logname=3D uid=3D0 euid=3D0 tty=3Dssh ruser=3D =
rhost=3D122.146.120.139=20
Aug 15 21:02:39 myserver sshd[29209]: pam_unix(sshd:auth): =
authentication failure; logname=3D uid=3D0 euid=3D0 tty=3Dssh ruser=3D =
rhost=3D122.146.120.139=20
Aug 15 21:02:39 myserver sshd[29208]: pam_unix(sshd:auth): =
authentication failure; logname=3D uid=3D0 euid=3D0 tty=3Dssh ruser=3D =
rhost=3D122.146.120.139=20

--END OF NOTIFICATION


Nothing in the active response log.  Nothing in the ossec.log=85  Here =
are the last two entries in the ossec.log :

2011/08/15 19:04:35 ossec-syscheckd: INFO: Ending syscheck scan.
2011/08/15 21:09:35 ossec-syscheckd: INFO: Starting syscheck scan.

And a grep of rule 5551 from the active-responses.log :

[root@myserver logs]# grep 5551 active-responses.log
[root@myserver logs]#=20

So what gives?  My active response section in ossec.conf seems to be =
correct :

   
  firewall-drop
  local
  6
  21600
  720,1440,10080
   

I'm at a loss..  Any thoughts?

---
Jason 'XenoPhage' Frisvold
xenoph...@godshell.com
---
"Any sufficiently advanced magic is indistinguishable from technology."
- Niven's Inverse of Clarke's Third Law





PGP.sig
Description: OpenPGP digital signature


[ossec-list] Rule not firing properly?

2011-08-15 Thread Jason 'XenoPhage'; Frisvold


binmRonulI36G.bin
Description: PGP/MIME Versions Identification


PGP.asc
Description: Message encrypted with OpenPGP using GPGMail


Re: [ossec-list] Defcon 19

2011-08-06 Thread Jason 'XenoPhage'; Frisvold
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On Aug 5, 2011, at 7:42 PM, oscar schneider wrote:
> Hey,
> 
> anyone around here on DefCon and like to meet?

I wish...  I'll be at DerbyCon in the fall..  Anyone headed there?

> Cheers,
> 
> oscar

- -------
Jason 'XenoPhage' Frisvold
xenoph...@godshell.com
- ---
"Any sufficiently advanced magic is indistinguishable from technology."
- - Niven's Inverse of Clarke's Third Law



-BEGIN PGP SIGNATURE-
Version: GnuPG/MacGPG2 v2.0.16 (Darwin)

iEYEARECAAYFAk49WZUACgkQ8CjzPZyTUTQK9wCgjsEA02iAjwHpVholdsJrrkWC
snwAn1d8Zb9dsQe0n+8BiEhexjipAJ2S
=JC5z
-END PGP SIGNATURE-


Re: [ossec-list] Re: Monitoring logins via btmp and wtmp

2011-08-03 Thread Jason 'XenoPhage'; Frisvold
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On Aug 1, 2011, at 6:55 PM, Alisha Kloc wrote:
> Unfortunately, we can't make any changes to the HP-UX system, which
> means no cron jobs, no clearing logs, etc. All we're allowed to touch
> is OSSEC agent stuff. Within that, I have some flexibility if I use
> the process monitor to call a simple shell script, which allows
> consecutive commands like you suggested, but anything beyond that
> isn't allowed.
> 
> Sounds like this might not be possible...

What about tmp files?  Run last and spit it out to /tmp/lastlog or something..  
Then have ossec monitor that file.  Any changes should pop out with check_diff.

Or, if you can't do it locally on the hp-ux server, write a script on the ossec 
manager that logs into the hp-ux machine, runs last, and stores that locally on 
the ossec manager.  Then just monitor that log.

> -Alisha

- ---
Jason 'XenoPhage' Frisvold
xenoph...@godshell.com
- ---
"Any sufficiently advanced magic is indistinguishable from technology."
- - Niven's Inverse of Clarke's Third Law



-BEGIN PGP SIGNATURE-
Version: GnuPG/MacGPG2 v2.0.16 (Darwin)

iEYEARECAAYFAk459bwACgkQ8CjzPZyTUTTMMwCcCNjQ3cL0lL+G/byMwIvRj6hE
h3gAniADRO6Fd1JVWJGmJoSPi8Vs7Xw+
=JCh9
-END PGP SIGNATURE-


Re: [ossec-list] Several hundred alerts for "Integrity checksum changed"

2011-08-03 Thread Jason 'XenoPhage'; Frisvold
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On Aug 3, 2011, at 10:41 AM, Chris Phillips wrote:
> Many Thanks Daniel,
> 
> That is just what I needed to hear/read!
> 
> I can see that we do have prelinking turned ON, but not sure it's a "choice" 
> rather than an OS default, so we may end up switching it OFF as I doubt we 
> see any benefits from it.

Prelinking seems to benefit desktop situations more than server situations, 
provided the server is mostly static with respect to the daemons running.  So 
turning it off on a server could result in a few milliseconds of delay on a 
reboot or restart of a service, but overall likely won't cause any issues 
during normal operation.

> Cheers,
> --
> ChrisP
> 
> Chris Phillips
> Service Designer, intY Ltd.
> +44 (0)1454 640 532
> 
> 
> -Original Message-
> From: ossec-list@googlegroups.com [mailto:ossec-list@googlegroups.com] On 
> Behalf Of Daniel Cid
> Sent: 03 August 2011 13:57
> To: ossec-list@googlegroups.com
> Subject: Re: [ossec-list] Several hundred alerts for "Integrity checksum 
> changed"
> 
> Probably because of prelinking... More details here:
> 
> http://www.ossec.net/wiki/Know_How:Check_Sums
> 
> Thanks,
> 
> --
> Daniel B. Cid
> dcid ( at ) ossec.net
> 
> On Wed, Aug 3, 2011 at 9:11 AM, Chris Phillips  
> wrote:
>> Hi All,
>> 
>> Recently, I received about 400+ "Alert Level 7" notifications, for a single 
>> server, all related to "Integrity checksum changed" events.
>> 
>> I am really worried about this, but I can see no reason why it has happened.
>> 
>> The situation has not re-occurred and has not happened on any of the other 
>> servers we have OSSEC installed on.
>> 
>> Can anyone please explain what could cause this?  I am hoping it's some sort 
>> of obscure but OK OSSEC anomaly!
>> 
>> Cheers,
>> --
>> ChrisP (slightly panicky)
>> 
>> 
>> -Original Message-
>> From: OSSEC HIDS
>> Sent: 28 July 2011 08:46
>> To: Chris Phillips
>> Subject: OSSEC Notification (myserver) - Alert level 7
>> 
>> OSSEC HIDS Notification.
>> 2011 Jul 28 08:46:23
>> 
>> Received From: (myserver) >syscheck
>> Rule: 550 fired (level 7) -> "Integrity checksum changed."
>> Portion of the log(s):
>> 
>> Integrity checksum changed for: '/sbin/debugfs'
>> Old md5sum was: 'fd96fc82b74a47577835538ccf6d2adb'
>> New md5sum is : 'c4c01019d7806734e857996adc63cf17'
>> Old sha1sum was: 'c57a92218bd321ff8b27c154e2f5b29185530728'
>> New sha1sum is : '4550b5743fe3368bc1bac683c60c14c232b671e5'
>> 
>> --END OF NOTIFICATION
>> 
> 
> Scanned by MailDefender - managed email security from intY - 
> www.maildefender.net
> 
> Information in this electronic mail is confidential and may be legally 
> privileged.  It is intended solely for the addressee.  Access to this mail by 
> anyone else is unauthorised.  If you are not the intended recipient any use, 
> disclosure, copying or distribution of this message is prohibited and may be 
> unlawful.  When addressed to our customers, any information contained in this 
> message is subject to intY's Terms & Conditions.  Please rely on your own 
> virus scanning and procedures with regard to any attachments to this message.
> 
> Scanned by MailDefender - managed email security from intY - 
> www.maildefender.net
> 

- ---
Jason 'XenoPhage' Frisvold
xenoph...@godshell.com
- ---
"Any sufficiently advanced magic is indistinguishable from technology."
- - Niven's Inverse of Clarke's Third Law



-BEGIN PGP SIGNATURE-
Version: GnuPG/MacGPG2 v2.0.16 (Darwin)

iEYEARECAAYFAk459JwACgkQ8CjzPZyTUTRdwQCeP6Lra2YR2n6sKIQr8NcGFPqq
CD0An1/qMuY6e+fCM50CrAI2aI+1JRT9
=PE0i
-END PGP SIGNATURE-


Re: [ossec-list] OSSEC v2.6 released

2011-07-19 Thread Jason 'XenoPhage'; Frisvold
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On Jul 19, 2011, at 3:31 PM, Daniel Cid wrote:
> Hi lists,
> 
> We are very happy to announce the availability of OSSEC version 2.6.
> 
> This has been a long release cycle, but it is here now with some good
> new features and very stable (thanks to our beta users).
> Our manual for the new version is also live at http://www.ossec.net/doc/ .
> 
> Release notes + new features + contributor list:
> http://www.ossec.net/main/ossec-v2-6-released
> 
> You can download the new version from: http://www.ossec.net/main/downloads/

Congrats all!  I'll have an RPM up shortly for this new release..  :)

> *The GPG key was changed as well. So make sure to download the new one
> before verifying the package.
> 
> 
> Thanks!
> Daniel B. Cid (in name of the OSSEC + Trend team)
> d...@ossec.net

- ---
Jason 'XenoPhage' Frisvold
xenoph...@godshell.com
- ---
"Any sufficiently advanced magic is indistinguishable from technology."
- - Niven's Inverse of Clarke's Third Law



-BEGIN PGP SIGNATURE-
Version: GnuPG/MacGPG2 v2.0.14 (Darwin)

iEYEARECAAYFAk4l9DMACgkQ8CjzPZyTUTQw3QCcCj+DOsSVAkwl07zCRJbod8D4
/vkAnRWtggVM9NUqm4OxBatt2Hh5QAU/
=QoEt
-END PGP SIGNATURE-


Re: [ossec-list] Re: Alert level "0" in rule and frequency

2011-07-07 Thread Jason 'XenoPhage'; Frisvold
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 07/06/2011 08:15 PM, jplee3 wrote:
> One other question I have regarding frequency rules and hierarchy. We
> currently have two frequency rules setup to trigger against a parent
> rule where the difference is the frequencies - one is set to trigger
> when it sees the parent rule triggered 6 or more times in a minute.
> The other is set to trigger when it sees the parent rule triggered 12
> or more times in 5 minutes. The problem is that the 12x in 5min rule
> never triggers. It seems that the 6x per minute rule supersedes it
> always. Is there a way to get the second "upper" threshold rule to
> trigger as well?
> 
> I thought I read somewhere about something like this being
> implemented... like chaining frequency rules. Unfortunately, I don't
> recall where exactly I saw this. Maybe someone can refresh my memory
> and point me in the right direction?

Might this work similar to how the active responses work?  ie, put the
higher trigger before the lower one.  So if the 6x trigger is rule 10005
and the 12x is 10015, then flip the sids putting the 12x first.

> TIA!

- -- 
- ---
Jason 'XenoPhage' Frisvold
xenoph...@godshell.com
- ---
"Any sufficiently advanced magic is indistinguishable from technology."
- - Niven's Inverse of Clarke's Third Law
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.17 (GNU/Linux)
Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org/

iEYEARECAAYFAk4V59AACgkQ8CjzPZyTUTS3sgCeIb1D+odL3NYxbfajoPeak6LL
xN4AnigPguIPFNnWGqbOk+trtfuZmEdV
=Mjh0
-END PGP SIGNATURE-


Re: [ossec-list] Enhanced OSSEC: Agent Config Profiles now supports inheritance/merging

2011-07-07 Thread Jason 'XenoPhage'; Frisvold
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 06/17/2011 12:16 PM, Christopher Moraes wrote:
> Hi everyone,
> 
> Continuing with my enhancements to support agent configuration profiles
> (see thread
> : 
> http://groups.google.com/group/ossec-list/browse_thread/thread/28a76c8180e28a4b),
> I have added the feature that Jason Frisvold suggested i.e. combining of
> profiles.

I've rolled Chris' patches in with the latest version of 2.6 from Daniel
and released an SRPM.  You can find it here (along with some other
software as well) :

https://www.godshell.com/software

Please let me know if you encounter any problems with the site or the RPMS.

Thanks!

- -- 
- -------
Jason 'XenoPhage' Frisvold
xenoph...@godshell.com
- ---
"Any sufficiently advanced magic is indistinguishable from technology."
- - Niven's Inverse of Clarke's Third Law
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.17 (GNU/Linux)
Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org/

iEYEARECAAYFAk4V5fwACgkQ8CjzPZyTUTRsjwCeLP144V+eas7Uv4HBG+mAOHAc
VXoAniUcTjHpljkVn6qNlibfg6BV0Ee5
=HWuu
-END PGP SIGNATURE-


Re: [ossec-list] Re: Any way to disable the netstat components of syscheckd/rootcheck?

2011-07-01 Thread Jason 'XenoPhage'; Frisvold
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 06/20/2011 04:05 PM, Christopher Moraes wrote:
> Hi,
> 
> On Tue, May 17, 2011 at 4:36 PM, Daniel Cid  <mailto:daniel@gmail.com>> wrote:
> 
> Btw, anyone interested in doing a config check for each of those
> functions? So we can disable/enable them via ossec.conf? Good way
> to get started coding on ossec :)
> 
> 
> I made the changes to ossec code to make these checks configurable via
> ossec.conf.   The relevant changeset in my repo is 
> https://bitbucket.org/cmoraes/ossec/changeset/46f14c668cfa

Is there a magic button or CLI command I can run to get HG to spit out a
diff file?  I'm building RPMs of the beta and I'd like to add this in as
a patch to the core ...

Same goes for the agent config profiles ...

Thanks !

> HTH,
> Chris


- -- 
- ---
Jason 'XenoPhage' Frisvold
xenoph...@godshell.com
- ---
"Any sufficiently advanced magic is indistinguishable from technology."
- - Niven's Inverse of Clarke's Third Law
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.17 (GNU/Linux)
Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org/

iEYEARECAAYFAk4OL9gACgkQ8CjzPZyTUTQ59gCgph93ZF4PrWGeEl1eI7Ak5bHw
oFQAmgJhsiFn9lQ2PU00MIrso/gc66lX
=vzua
-END PGP SIGNATURE-


Re: [ossec-list] if_sid vs if_matched_sid

2011-06-28 Thread Jason &#x27;XenoPhage'; Frisvold
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 06/27/2011 05:09 PM, dan (ddp) wrote:
>> Wikis suck. The current documentation can be found at
>> https://bitbucket.org/ddpbsd/ossec-rules
>> It's done in sphinx (with help from paver). Someone else started it,
>> and I don't have a good grasp on how to do anything fancy with it. But
>> I can definitely update the above.
>> Feel free to fork it, modify it, etc. And/or create issues on bitbucket for 
>> me.

I should be savvy enough to figure this out..  :P  hginit.com here I come!

>> dan

- -- 
- ---
Jason 'XenoPhage' Frisvold
xenoph...@godshell.com
- ---
"Any sufficiently advanced magic is indistinguishable from technology."
- - Niven's Inverse of Clarke's Third Law
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.17 (GNU/Linux)
Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org/

iEYEARECAAYFAk4KFQMACgkQ8CjzPZyTUTRDhACgiPgJGYR6gSF57UzMMkLQoFsB
G1oAoI1zJBQihvs8iCIlXql6W1O2oq9o
=N/vS
-END PGP SIGNATURE-


[ossec-list] if_sid vs if_matched_sid

2011-06-27 Thread Jason &#x27;XenoPhage'; Frisvold
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hi all,

I'd like to see the online docs updated to make this more clear.  Can
someone please verify my understanding (original from
http://www.ossec.net/doc/syntax/head_rules.html#options) :

group.rule.if_sid
Matches if the ID has matched once.
Allowed: Any rule id

group.rule.if_matched_sid
Matches if the ID has matched multiple times.  Used for composite rules.
Allowed: Any rule id

If this is correct, who do I need to contact to get the online docs
updated?  Or maybe the online docs should all be moved to the wiki so
the community can update it?

- -- 
- ---
Jason 'XenoPhage' Frisvold
xenoph...@godshell.com
- ---
"Any sufficiently advanced magic is indistinguishable from technology."
- - Niven's Inverse of Clarke's Third Law
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.17 (GNU/Linux)
Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org/

iEYEARECAAYFAk4I0JIACgkQ8CjzPZyTUTQ0KQCeNrV4+Z30ivqj40GbWkdsB27y
RWUAmQFvpQBuhS0WFImE0LOYIYyZnHFv
=2EZS
-END PGP SIGNATURE-


Re: [ossec-list] Re: active-response question on the ossec server Options

2011-06-20 Thread Jason &#x27;XenoPhage'; Frisvold
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On Jun 19, 2011, at 6:09 PM, pierz wrote:
> Yes exactly, regarding the manual, this is the purpose of the
> all statement.
> 
> But agents doesn't block IP if the attack occur on the server.

That seems to be correct.  I haven't tried this myself as of yet.  Too 
chicken..  :P

Do you have any other active response blocks in your config, or just the one 
with location all ?

Are you verifying the lack of block via logs, or by checking iptables directly?

- -----------
Jason 'XenoPhage' Frisvold
xenoph...@godshell.com
- ---
"Any sufficiently advanced magic is indistinguishable from technology."
- - Niven's Inverse of Clarke's Third Law



-BEGIN PGP SIGNATURE-
Version: GnuPG/MacGPG2 v2.0.14 (Darwin)

iEYEARECAAYFAk3/j2gACgkQ8CjzPZyTUTQx+gCePaAsokVgKyfY8AnCZedoDGNb
w/gAn3Q26+Hn3gqMIU9VwB+HUFrZiJE5
=/Qm6
-END PGP SIGNATURE-


Re: [ossec-list] Re: shared config being distributed to ALL hosts

2011-06-15 Thread Jason &#x27;XenoPhage'; Frisvold
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 06/14/2011 10:54 PM, GeorgeY wrote:
> Thanks Dan and Christopher. Most helpful.
> Now to my next question ;), after any changes to agent.conf, the
> automatic "pushing" of the updated agent.conf file is working as
> expected. This is great. However, is the configuration applied
> immediately or it requires a manual restart of the Ossec HIDS service
> on the Windows machines? i tried the agent_control -R  option but

Unfortunately, this is currently an issue with OSSEC.  Of course, you
can also argue that not automatically restarting the agents on a new
config push is a feature..  But regardless, if it's something you're
looking to do, then you may be in luck.

Note : This works for Linux and requires some changes to make it work in
Windows.  I'm not in a Windows environment, so I'm not sure what the
exact changes are.  I can give some hints, though.  :)

The short version is this.  Add the following to your local_rules.xml
file (using an appropriately unique rule id)

   
  syscheck
  agent.conf changed, restarting OSSEC
  /var/ossec/etc/shared/agent.conf
   

What this will do is use syscheck (which you should have configured to
monitor the ossec directory) to watch the agent.conf file (you'll need
to update the location of that file for windows).  If it changes, it
triggers a level 12 alert.  Next, add the following to your ossec.conf
file on the server (above all other active response sections) :

  
restart-ossec
restart-ossec.sh
srcip
no
  

  
restart-ossec
local
15
  

This looks specifically for rule 15 (or whatever rule ID you're
using) and if it fires, launches the restart-ossec command on the
machine that triggered the alert.  You'll need to write a restart-ossec
program for windows, but I imagine you can use powershell or something
like that to make it work.  A restart on the ossec service should do it.

That should get you on the right road.  If you would, please post any
modifications you make back to the list so others can benefit.  I'm
interested in what the restart-ossec.cmd program for windows might look
like.

Enjoy.

- -- 
- ---
Jason 'XenoPhage' Frisvold
xenoph...@godshell.com
- ---
"Any sufficiently advanced magic is indistinguishable from technology."
- - Niven's Inverse of Clarke's Third Law
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.17 (GNU/Linux)
Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org/

iEYEARECAAYFAk347HMACgkQ8CjzPZyTUTQqdACglvHott3QVSMr2rPD6q95Rsl+
f4cAn0z6677aozm+65msiaoPXVO/ZTwK
=aPRc
-END PGP SIGNATURE-


Re: [ossec-list] Enhanced OSSEC to support agent profile configurations

2011-06-15 Thread Jason &#x27;XenoPhage'; Frisvold
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 06/15/2011 08:42 AM, Daniel Cid wrote:
> Not on 2.6, since it has been frozen for the beta already, but
> certainly on 2.7 :)

Then the logical question is..  When's 2.7 getting released?  ;)

> And yes, keep the patches coming.

I'm going to need to learn how to use git so I can start contributing
rules..  :)

> Thanks!

- -- 
- -----------
Jason 'XenoPhage' Frisvold
xenoph...@godshell.com
- ---
"Any sufficiently advanced magic is indistinguishable from technology."
- - Niven's Inverse of Clarke's Third Law
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.17 (GNU/Linux)
Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org/

iEYEARECAAYFAk346c0ACgkQ8CjzPZyTUTSvvACePYA+wzlXIVeqtK45fdFY2gx8
bOQAn1BeRjoMlutKkRluSQryWWwoGWgR
=HZoT
-END PGP SIGNATURE-


Re: [ossec-list] Re: Web Interface parsing with beta 2.6

2011-06-10 Thread Jason &#x27;XenoPhage'; Frisvold
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On Jun 10, 2011, at 2:30 PM, dan (ddp) wrote:
> I'm starting to play with logstash. Before that I played a bit with splunk.
> I mostly use email though.


Hrm..  logstash looks interesting.  I'll have to check it out.. In my spare 
time, of course.. *sigh*

- ---
Jason 'XenoPhage' Frisvold
xenoph...@godshell.com
- ---
"Any sufficiently advanced magic is indistinguishable from technology."
- - Niven's Inverse of Clarke's Third Law



-BEGIN PGP SIGNATURE-
Version: GnuPG/MacGPG2 v2.0.14 (Darwin)

iEYEARECAAYFAk3ybfUACgkQ8CjzPZyTUTQzVwCgn0Z5dfUXC0Yh85ypOsGJA4dP
lkcAni6nNIVHWldTSkXRqWJrgtEpO1Pk
=RDnQ
-END PGP SIGNATURE-


Re: [ossec-list] Anti-DDoS Rule

2011-06-10 Thread Jason &#x27;XenoPhage'; Frisvold
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On Jun 10, 2011, at 2:49 PM, Jeremy Lee wrote:
> Ahhh I think I see now :)
> 
> But wouldn't he want a catch-all of *everything*  that passes through. 31100 
> and 31108 seem to be 'watershed' where alerts will go either way but not both.

Yeah, I'm interested in catching everything, so I was hoping 31100 would be the 
way to go .. 

> You can't do something like this either can you? 31100, 
> 31108 (I vaguely recall asking this and getting a response 
> of "no")

Nope, tried that.  ossec balks ..  *sigh*

- ---
Jason 'XenoPhage' Frisvold
xenoph...@godshell.com
- ---
"Any sufficiently advanced magic is indistinguishable from technology."
- - Niven's Inverse of Clarke's Third Law



-BEGIN PGP SIGNATURE-
Version: GnuPG/MacGPG2 v2.0.14 (Darwin)

iEYEARECAAYFAk3ybTwACgkQ8CjzPZyTUTQa5wCfSqLGVoGh4/SbBX0INEZNJHUR
GXUAn3caDdXJjyf82yaz/JfghmxWaUbr
=6Dr/
-END PGP SIGNATURE-


Re: [ossec-list] Anti-DDoS Rule

2011-06-10 Thread Jason &#x27;XenoPhage'; Frisvold
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 06/08/2011 02:38 PM, Jason 'XenoPhage' Frisvold wrote:
> Hi all,
> 
>   I'm trying to put together a rudimentary anti-DDoS rule in OSSEC and I
> could use a hand ..  Basically, I'm looking to block anyone who
> excessively hits a web server.  This is what I have thus far :
> 
> 
>31100
>
>Excessive access, Temporary block
> 
> 
> This seems to be correct, but I can't get it to trigger with
> ossec-logtest ..  Any tips?

Am I approaching this the wrong way?  Anyone have suggestions on how to
handle this?

- -- 
- ---
Jason 'XenoPhage' Frisvold
xenoph...@godshell.com
- ---
"Any sufficiently advanced magic is indistinguishable from technology."
- - Niven's Inverse of Clarke's Third Law
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.17 (GNU/Linux)
Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org/

iEYEARECAAYFAk3yNAAACgkQ8CjzPZyTUTSbFwCfSJDVL8mV6dDTtS26ud57FlHs
Wm0An3S9bH4zYtjj3hFtfh5iJyTPMCVl
=lDy9
-END PGP SIGNATURE-


Re: [ossec-list] Enhanced OSSEC to support agent profile configurations

2011-06-10 Thread Jason &#x27;XenoPhage'; Frisvold
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 06/10/2011 10:02 AM, Christopher Moraes wrote:
> Could you explain this a little more? 
> 
> Did you mean that agent.conf should support multiple profiles?  If yes,
> then, that is supported.  Inside the managers agent.conf, you can have
> multiple  blocks, each with a different profile name. 
> 
> Or did you mean inheritance of profiles.  E.g. "Linux-DBServer" inherits
> the base "Linux" profile

The latter.  So, on any given machine I can do something like this :


  
10.200.36.157
LinuxOracleDBServer,LinuxWebServer
  


Or


  
10.200.36.157
LinuxOracleDBServer
LinuxWebServer
  



Note : I'm thinking out loud here..  I like being able to use merging to
create profiles for disparate parts and combine them together as needed.


- -- 
- ---
Jason 'XenoPhage' Frisvold
xenoph...@godshell.com
- ---
"Any sufficiently advanced magic is indistinguishable from technology."
- - Niven's Inverse of Clarke's Third Law
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.17 (GNU/Linux)
Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org/

iEYEARECAAYFAk3yM7QACgkQ8CjzPZyTUTS21gCffl7VX4VJieGqlamfhyzgpbW7
3hUAnRdmsL6XlKyGc2+GIE5Wj8wbGf8v
=3xaq
-END PGP SIGNATURE-


Re: [ossec-list] Re: OSSEC 2.6 beta-1 available

2011-06-09 Thread Jason &#x27;XenoPhage'; Frisvold
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 06/08/2011 10:04 PM, treydock wrote:
> Jason I'd be very interested in a SRPM for this release.  I've
> attempted to modify the spec file found in the SRPM from atomic, but
> with limited experience writing spec files it's slow.

I aim to please.

http://www.godshell.com/software

This was initially built by modifying the atomic RPM.  I haven't kept up
with what changes I've made since then, though.

As always, at your own risk.

> Thanks
> - Trey

- -- 
- ---
Jason 'XenoPhage' Frisvold
xenoph...@godshell.com
- ---
"Any sufficiently advanced magic is indistinguishable from technology."
- - Niven's Inverse of Clarke's Third Law
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.17 (GNU/Linux)
Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org/

iEYEARECAAYFAk3w7V0ACgkQ8CjzPZyTUTR3jwCfXR9hwxnqzMsiweZxmVwzL/3w
OnIAnAr5A40HtppzoZUs5q1IDsckYtrU
=eBMs
-END PGP SIGNATURE-


Re: [ossec-list] Active Responses triggered but no events logged

2011-06-09 Thread Jason &#x27;XenoPhage'; Frisvold
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 06/09/2011 12:54 AM, treydock wrote:
> Looking at Rule #5706 this is Level 6 so it correctly triggered an
> active response.  However I'm concerned as to why OSSEC didn't log an
> alert or anything besides the active-response.

What more are you expecting?  It logged the active response that was
triggered..  ?

> Thanks
> - Trey


- -- 
- -----------
Jason 'XenoPhage' Frisvold
xenoph...@godshell.com
- ---
"Any sufficiently advanced magic is indistinguishable from technology."
- - Niven's Inverse of Clarke's Third Law
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.17 (GNU/Linux)
Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org/

iEYEARECAAYFAk3w5o4ACgkQ8CjzPZyTUTTXcQCfX/FNVyTT85QheUhaOCVKONhD
CH0AmgINMAVq/KrrQ9aiz0Xsm820HNm1
=gZCr
-END PGP SIGNATURE-


[ossec-list] Anti-DDoS Rule

2011-06-08 Thread Jason &#x27;XenoPhage'; Frisvold
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hi all,

I'm trying to put together a rudimentary anti-DDoS rule in OSSEC and I
could use a hand ..  Basically, I'm looking to block anyone who
excessively hits a web server.  This is what I have thus far :


   31100
   
   Excessive access, Temporary block


This seems to be correct, but I can't get it to trigger with
ossec-logtest ..  Any tips?

Thanks,

- -- 
- -------
Jason 'XenoPhage' Frisvold
xenoph...@godshell.com
- ---
"Any sufficiently advanced magic is indistinguishable from technology."
- - Niven's Inverse of Clarke's Third Law
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.17 (GNU/Linux)
Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org/

iEYEARECAAYFAk3vwbEACgkQ8CjzPZyTUTQqtACgj8Ljlxnsdj9+Asy6y7Dr8zBN
xhEAn3vQ21eiqKTN9YuX40wUmwrb1KgY
=uLr0
-END PGP SIGNATURE-


Re: [ossec-list] OSSEC 2.6 beta-1 available

2011-06-07 Thread Jason &#x27;XenoPhage'; Frisvold
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On Jun 7, 2011, at 12:26 PM, Daniel Cid wrote:
> Hi list,
> 
> The beta version of OSSEC 2.6 is available and waiting for testers :)
> More information (including new features,
> download link, etc) here:
> 
> http://dcid.me/2011/06/ossec-2-6-beta-1-available/
> 
> Please help out if you can.

I've wrapped this all up in a nice SRPM that I can make available if anyone is 
interested.

Daniel,

After installing and restarting, I'm seeing this :

Killing ossec-monitord .. 
Killing ossec-logcollector .. 
Killing ossec-remoted .. 
Killing ossec-syscheckd .. 
Killing ossec-analysisd .. 
Killing ossec-maild .. 
Killing ossec-execd .. 
OSSEC HIDS v2.6 Stopped
Starting OSSEC HIDS v2.6 (by Trend Micro Inc.)...
127
Started ossec-maild...
Started ossec-execd...
Started ossec-analysisd...
Started ossec-logcollector...
Started ossec-remoted...
Started ossec-syscheckd...
Started ossec-monitord...
Completed.

What's the 127 mean?  Leftover debug?


> Thanks,

- ---
Jason 'XenoPhage' Frisvold
xenoph...@godshell.com
- ---
"Any sufficiently advanced magic is indistinguishable from technology."
- - Niven's Inverse of Clarke's Third Law



-BEGIN PGP SIGNATURE-
Version: GnuPG/MacGPG2 v2.0.14 (Darwin)

iEYEARECAAYFAk3ueqUACgkQ8CjzPZyTUTTshwCfUZx0pUCcg6EKAM8ViXMzvVV9
mFQAn290NGUDAlb+NhJo3UnjN0Mlc0Y2
=vqGV
-END PGP SIGNATURE-


Re: [ossec-list] Installation and use without root access?

2011-04-16 Thread Jason &#x27;XenoPhage'; Frisvold
On Apr 14, 2011, at 1:15 PM, sempai wrote:
> Hello,
> 
> I'm in a position where it would be advantageous to run ossec-hids as
> a server by an unprivileged user.
> 
> Has anyone already gone down this road before and written
> documentation or shared their installation details?

Wouldn't running as an unprivileged user significantly reduce the functionality?

-------
Jason 'XenoPhage' Frisvold
xenoph...@godshell.com
---
"Any sufficiently advanced magic is indistinguishable from technology."
- Niven's Inverse of Clarke's Third Law





Re: [ossec-list] OSSEC server won't bind to 1514/UDP...

2011-03-24 Thread Jason &#x27;XenoPhage'; Frisvold
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 03/23/2011 10:54 AM, Eric Hansen wrote:
> Yeaup; 770 with root:ossec, and I used install.sh to install OSSEC.  I
> know I also can't install Safe Squid either on Arch Linux (it won't
> generate a full serial key), so I'm wondering if it just might be a lost
> cause.  I can continue looking into it as well, but I'm not sure what
> else to do.

I may have to install arch just to figure this out...  I wish I had an
answer for you.  Anyone else running Arch?

> When your work speaks for itself, don’t interrupt.
> – Henry J. Kaiser
> 
> 
> On Wed, Mar 23, 2011 at 9:25 AM, Jason 'XenoPhage' Frisvold
> mailto:xenoph...@godshell.com>> wrote:
> 
> On 03/22/2011 11:10 PM, Eric Hansen wrote:
>> Lol, the only thing I'm beginning to wonder is that Arch Linux,
> for one
>> reason or another, isn't liking OSSEC.  Correct, the server cannot
> bind
>> to 1514/UDP (the agent has the port open just fine trying to
> connect to
>> the server).  My OSSEC is installed in /var/ossec, the default path.
>>  The shared is located in /var/ossec/etc/shared, and it's
> ossec:ossec w/
>> permission 770.
> 
> And the files within the shared directory are root:ossec with 770
> permissions?
> 
> I'm not sure why Arch wouldn't like OSSEC..  I know arch has some
> peculiar (at least to me) ways of doing things, but I thought that was
> just my own unfamiliarity with the system.  You used install.sh to set
> up the server, yes?
> 

- -- 
- ---
Jason 'XenoPhage' Frisvold
xenoph...@godshell.com
- ---
"Any sufficiently advanced magic is indistinguishable from technology."
- - Niven's Inverse of Clarke's Third Law
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.16 (GNU/Linux)
Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org/

iEYEARECAAYFAk2LiAUACgkQ8CjzPZyTUTT0twCdEP0gqGW6ifXoZT0oXAkUtqHi
nRMAniD3byV+9t22R/bMDZnx4nOIGl/k
=GR7r
-END PGP SIGNATURE-


Re: [ossec-list] OSSEC server won't bind to 1514/UDP...

2011-03-23 Thread Jason &#x27;XenoPhage'; Frisvold
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 03/22/2011 11:10 PM, Eric Hansen wrote:
> Lol, the only thing I'm beginning to wonder is that Arch Linux, for one
> reason or another, isn't liking OSSEC.  Correct, the server cannot bind
> to 1514/UDP (the agent has the port open just fine trying to connect to
> the server).  My OSSEC is installed in /var/ossec, the default path.
>  The shared is located in /var/ossec/etc/shared, and it's ossec:ossec w/
> permission 770.

And the files within the shared directory are root:ossec with 770
permissions?

I'm not sure why Arch wouldn't like OSSEC..  I know arch has some
peculiar (at least to me) ways of doing things, but I thought that was
just my own unfamiliarity with the system.  You used install.sh to set
up the server, yes?

- -- 
- ---
Jason 'XenoPhage' Frisvold
xenoph...@godshell.com
- ---
"Any sufficiently advanced magic is indistinguishable from technology."
- - Niven's Inverse of Clarke's Third Law
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.16 (GNU/Linux)
Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org/

iEYEARECAAYFAk2J9K0ACgkQ8CjzPZyTUTRzCACgmoNCN1NQTH5zquIBw1EIt5DU
TwgAoJK4yVyYlfsVkPTPg/CMZhfSpzi5
=Y23S
-END PGP SIGNATURE-


Re: [ossec-list] OSSEC server won't bind to 1514/UDP...

2011-03-22 Thread Jason &#x27;XenoPhage'; Frisvold
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 03/21/2011 05:29 PM, Eric Hansen wrote:
> Nah, I'm using Arch Linux which doesn't include anything beyond the
> core files needed for Bash and Linux, and I really dislike (to put it
> nicely) SELinux.

You know, if you want help, you're really going to have to have one of
the problems I'm describing so we can fix it..  ;)

Ok..  Let me re-iterate so I understand the problem..  Your server (not
agent) won't bind to port 1514/UDP.  Is that correct?

The error you see in the logs : "ERROR: Unable to create merged file:
'/etc/shared/merged.mg'." is on the server, correct?  What are the
permissions on the /etc/shared ... wait..  /etc/shared?  Did you
relocate the ossec install?  That should be /var/ossec/etc/shared ...
Where is OSSEC installed?

What are the permissions on the shared directory (wherever it is) ?  It
appears that remoted isn't running, perhaps because of directory
permissions problems.  On my install, the shared directory is owned by
ossec.ossec and has permissions of 770 .

- -- 
- ---
Jason 'XenoPhage' Frisvold
xenoph...@godshell.com
- ---
"Any sufficiently advanced magic is indistinguishable from technology."
- - Niven's Inverse of Clarke's Third Law
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.16 (GNU/Linux)
Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org/

iEYEARECAAYFAk2IuLwACgkQ8CjzPZyTUTRpiQCeOtGypM3UaEKSbWEYNDL4kRCH
OOQAn2GfNN4vn6p90jsLdG4snjmNctzk
=/UMv
-END PGP SIGNATURE-


Re: [ossec-list] OSSEC server won't bind to 1514/UDP...

2011-03-21 Thread Jason &#x27;XenoPhage'; Frisvold
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 03/18/2011 11:43 PM, Eric Hansen wrote:
> That I did.

Are you running selinux, perchance?

> When your work speaks for itself, don’t interrupt.
> – Henry J. Kaiser


- -- 
- -------
Jason 'XenoPhage' Frisvold
xenoph...@godshell.com
- ---
"Any sufficiently advanced magic is indistinguishable from technology."
- - Niven's Inverse of Clarke's Third Law
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.16 (GNU/Linux)
Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org/

iEYEARECAAYFAk2HvRsACgkQ8CjzPZyTUTR77gCgmg6Uq8qXva7lF2LnWZyZKAQv
DvEAoJkx7GX+MBehuQIJq/X60y4MYnnn
=zwM6
-END PGP SIGNATURE-


Re: [ossec-list] ossec-logtest error

2011-03-21 Thread Jason &#x27;XenoPhage'; Frisvold
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 03/21/2011 07:19 AM, Branimir Pačar wrote:
> Hi all,
> 
> 2011/03/21 12:03:36 ossec-analysisd(1226): ERROR: Error reading XML file
> 'etc/decoder.xml': XML ERR: Element not closed: ; (line 1635).

What's on line 1635?

> When I look in decoder.xml there is nothing ?suspicious? in line 1635.
> only similiar thing close to that is trend-osce decoder

That decoder matches what I have ...

> After I've commented entire decoder, ossec-logtest passes this phase but
> next thing is that it shows following error:

Odd..  What you pasted in matches, character for character, what I have
in my decoder.

> 2011/03/21 12:10:40 ossec-analysisd: Invalid option 'compiled_rule' for
> rule '31108'.
> 
> 2011/03/21 12:10:40 ossec-testrule(1220): ERROR: Error loading the
> rules: 'web_rules.xml'.
> 
> Can anyone suggest me what to do so i could use ossec-logtest?

It sounds like something didn't compile right..  You shouldn't be
getting errors like this.  Unfortunately, I haven't used AIX in forever,
so I'm not 100% sure what would be different here that would cause this.
 Have you tried a different server and/or reinstalling?

> Regards,
> Branimir


- -- 
- ---
Jason 'XenoPhage' Frisvold
xenoph...@godshell.com
- ---
"Any sufficiently advanced magic is indistinguishable from technology."
- - Niven's Inverse of Clarke's Third Law
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.16 (GNU/Linux)
Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org/

iEYEARECAAYFAk2Hjj4ACgkQ8CjzPZyTUTTCJgCfSgomPheBT6vts4ywKUklcdtr
HyMAoKlO318HFnnlQBDpPvOuCK/DIeZJ
=zn5E
-END PGP SIGNATURE-


Re: [ossec-list] OSSEC server won't bind to 1514/UDP...

2011-03-18 Thread Jason &#x27;XenoPhage'; Frisvold
On Mar 18, 2011, at 10:20 AM, Eric Hansen wrote:
> 
> First, I'd like to say that I've been doing a lot of Goggling around and 
> tried a lot of things to no avail.

Did you register the client on the server using manage_agents?  And did you 
then copy the key to the client and install it using manage_agent?


-------
Jason 'XenoPhage' Frisvold
xenoph...@godshell.com
---
"Any sufficiently advanced magic is indistinguishable from technology."
- Niven's Inverse of Clarke's Third Law






Re: [ossec-list] 404 Not Found

2011-03-15 Thread Jason &#x27;XenoPhage'; Frisvold
On Mar 15, 2011, at 10:18 AM, Gurtaj Singh wrote:
> Yea Jason thats exactly what i heard about the wui.(its unsupported and
> stuff)
> Thanks for letting me know about splunk, I'll try it out.
> :)


They just released version 4.2 today apparently..  I've been playing around 
with it for a bit and it looks pretty nice.  The ossec plugin was already 
updated for it.

-----------
Jason 'XenoPhage' Frisvold
xenoph...@godshell.com
---
"Any sufficiently advanced magic is indistinguishable from technology."
- Niven's Inverse of Clarke's Third Law





Re: [ossec-list] Re: Deletion of log data

2011-03-14 Thread Jason &#x27;XenoPhage'; Frisvold
On Mar 7, 2011, at 2:31 PM, Nate Woodward wrote:
> I'll give this a try, but assuming the rule does work (it's one of the 
> rules that ships with OSSEC, after all), how do I make sure log 
> tampering will be detected no matter what? The OSSEC book says the time 
> between syschecks has a minimum frequency of an hour, and I can't 
> exactly ask crackers to only tamper with my logs X minutes after the top 
> of the hour.


I don't believe these are syscheck rules, but are, instead, rules for the 
ossec.log file.  They reference rule 500 which is a log message decoded as 
ossec.  syscheck rules specifically reference syscheck in the rules themselves.

-------
Jason 'XenoPhage' Frisvold
xenoph...@godshell.com
---
"Any sufficiently advanced magic is indistinguishable from technology."
- Niven's Inverse of Clarke's Third Law





Re: [ossec-list] 404 Not Found

2011-03-14 Thread Jason &#x27;XenoPhage'; Frisvold
On Mar 7, 2011, at 3:15 PM, Gurtaj Singh wrote:
> and as to why i want to use it --REASON is my employer wants a GUI :(

Can I recommend looking at Splunk?  The free version of splunk is generally 
more than enough to handle a fairly high number of OSSEC agents.  The OSSEC-wui 
doesn't seem to be well supported or updated at this point.  Splunk with the 
free OSSEC splunk plugin works wonderfully.

I wonder if it's worth removing the wui altogether from the OSSEC site or at 
least marking it as unsupported.

-------
Jason 'XenoPhage' Frisvold
xenoph...@godshell.com
---
"Any sufficiently advanced magic is indistinguishable from technology."
- Niven's Inverse of Clarke's Third Law





Re: [ossec-list] Maybe a false positive with rule 510

2011-03-14 Thread Jason &#x27;XenoPhage'; Frisvold
On Mar 4, 2011, at 2:30 PM, dan (ddp) wrote:
> I haven't done much research into this, but my guess would be that
> this is a false positive.
> /dev/shm seems to be some strange shared memory access.
> lsof is claiming that those files are deleted (type = DEL).
> 
> My best guess would be that this is some kind of strange interaction
> between /dev/shm, the clustering stuff, and OSSEC's checks. I'd hit up
> support at redhat to see if they have any thoughts on the matter.


This happens when a file is deleted underneath an OSSEC rootkit scan.  I've 
seen it a few times and every time it happens it's the same explanation.

---
Jason 'XenoPhage' Frisvold
xenoph...@godshell.com
---
"Any sufficiently advanced magic is indistinguishable from technology."
- Niven's Inverse of Clarke's Third Law





Re: [ossec-list] How to check active response has been activated ornot ??

2011-03-14 Thread Jason &#x27;XenoPhage'; Frisvold
On Mar 3, 2011, at 9:37 PM, dan (ddp) wrote:
> Hi Tanishk,
> I don't mean to setup syscheck to watch it, I mean to use it as a
> localfile source:
> 
>  syslog
>  /var/ossec/logs/active-response.log
> 
> 
> You'll have to write a rule for it, but that shouldn't be too hard.

Allow me to assist.  I don't believe I'm the original author of this, but it 
works..  :)

First, the decoder (put this in /var/ossec/etc/local_decoder.xml)



 
 ^Mon|^Tue|^Wed|^Thu|^Fri|^Sat|^Sun
 
  \S+\s+\d+ \d\d:\d\d:\d\d \S+ \d+ 
/var/ossec/active-response/bin/(\S+) (\S+) - (\S+) (\d+.\d+) \d+
 action, status, srcip, id



And now the rules (I don't follow the recommended rule numbering, I have my own 
scheme.  Adjust accordingly)







   
  ar_log
  active_response_notification
  firewall-drop.sh
  add
  Active response firewall-drop.sh was run, host 
blocked
   

   
  ar_log
  active_response_notification
  firewall-drop.sh
  delete
  Active response firewall-drop.sh was run, host 
unblocked
   

   
  ar_log
  active_response_notification
  host-deny.sh
  add
  Active response host-deny.sh was run, host added to 
hosts.deny
   

   
  ar_log
  active_response_notification
  host-deny.sh
  delete
  Active response host-deny.sh was run, host removed from 
hosts.deny
   
 




> On Thu, Mar 3, 2011 at 9:33 PM, Tanishk Lakhaani  
> wrote:
>> Hi dan,
>> Configuring ossec to watch the active response.log file will fire an alert 
>> w.r.t Integrity Checksum Changed Event w.r.t active response.log file. But 
>> what I am looking foirward is, that I get the actual active response log on 
>> my email, (email alerting is configured).
>> 
>> 
>> Regards
>> Tanishk Lakhaani
>> Sent from BlackBerry® on Airtel
>> 
>> -Original Message-
>> From: "dan (ddp)" 
>> Sender: ossec-list@googlegroups.com
>> Date: Wed, 2 Mar 2011 15:38:36
>> To: 
>> Reply-To: ossec-list@googlegroups.com
>> Subject: Re: [ossec-list] How to check active response has been activated or
>>  not ??
>> 
>> Check the active-response.log file (on the system that runs the active
>> response).
>> You can configure OSSEC to watch the active-response.log file and fire
>> off an email/alert when a new entry is added. It's simple to do, and
>> helps solve the notification problem.
>> 
>> On Wed, Mar 2, 2011 at 2:18 PM, Tanishk Lakhaani  
>> wrote:
>> 



---
Jason 'XenoPhage' Frisvold
xenoph...@godshell.com
---
"Any sufficiently advanced magic is indistinguishable from technology."
- Niven's Inverse of Clarke's Third Law





Re: [ossec-list] ossec centralized configuration

2011-03-14 Thread Jason &#x27;XenoPhage'; Frisvold
On Mar 3, 2011, at 12:30 PM, satish patel wrote:
> Look like my managment server pushed agent.conf to client after
> restart agent i got follwoing error "No file configured to monitor"  I
> did specify each and every log files in agents.conf
> 
> Starting OSSEC HIDS v2.5.1 (by Trend Micro Inc.)...
> Started ossec-execd...
> Started ossec-agentd...
> 2011/03/03 09:30:38 ossec-logcollector(1905): INFO: No file configured
> to monitor.
> Started ossec-logcollector...
> 2011/03/03 09:30:38 ossec-syscheckd(1702): INFO: No directory provided
> for syscheck to monitor.
> 2011/03/03 09:30:38 ossec-syscheckd: WARN: Syscheck disabled.
> Started ossec-syscheckd...
> Completed.


You may see this on a new client (agent) install, especially if you modify the 
client ossec.conf to only contain the IP of the server.  I handle this by 
starting the client, waiting a few moments, and then restarting the client.  
Typically the agent.conf is sent from the server to the client within the first 
few seconds so a restart causes the client to properly see the agent.conf file 
and act accordingly.

---
Jason 'XenoPhage' Frisvold
xenoph...@godshell.com
---
"Any sufficiently advanced magic is indistinguishable from technology."
- Niven's Inverse of Clarke's Third Law





Re: [ossec-list] ossec centralized configuration

2011-03-14 Thread Jason &#x27;XenoPhage'; Frisvold
On Mar 3, 2011, at 11:52 AM, satish patel wrote:
> Added: This document need to specify which side its talking about
> client/server (agent/manager)
> http://www.ossec.net/main/manual/centralized-config/
> 
> There is no keyword regarding this is agents side config or manager side ?

In this particular document, all commands and configuration edits are on the 
server side.  The exception being "Restart the agent" which, obviously, must 
happen on the agent.  Or, I suppose you could use agent_control on the server 
side as well, now that I think about it.

> -Satish



-------
Jason 'XenoPhage' Frisvold
xenoph...@godshell.com
---
"Any sufficiently advanced magic is indistinguishable from technology."
- Niven's Inverse of Clarke's Third Law





Re: [ossec-list] ossec centralized configuration

2011-03-14 Thread Jason &#x27;XenoPhage'; Frisvold
On Mar 3, 2011, at 12:04 PM, satish patel wrote:
> This boy did a great job in documentation of centralized
> configuration. We would like this kind of doc on ossec.net website.
> 
> http://blog.godshell.com/blog/archives/274-WoO-Day-3-Meet-the-agent.htmla


Wow, uh, thanks.  I tried to make everything as concise as I could to make it 
more readable.  I'll see if I can take a look at the OSSEC manual itself and 
try to make it more readable.

-------
Jason 'XenoPhage' Frisvold
xenoph...@godshell.com
---
"Any sufficiently advanced magic is indistinguishable from technology."
- Niven's Inverse of Clarke's Third Law





Re: [ossec-list] Local_rules.xml ... public repository ?

2011-03-09 Thread Jason &#x27;XenoPhage'; Frisvold
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 02/25/2011 02:11 PM, dan (ddp) wrote:
> People have shared rules on this list, the dev list, the IRC channel,
> and probably other methods.
> 
> Does anyone think an ossec-rules mailing list would be useful?

Yes, definitely.  I still find a centralized rules repository to be
useful, though, and I think OSSEC should have an official one, whether
that's run by OSSEC or by a community member.

- -- 
- -------
Jason 'XenoPhage' Frisvold
xenoph...@godshell.com
- ---
"Any sufficiently advanced magic is indistinguishable from technology."
- - Niven's Inverse of Clarke's Third Law
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.16 (GNU/Linux)
Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org/

iEYEARECAAYFAk13tigACgkQ8CjzPZyTUTRmIACbByvU78312pxoal+AWKK/BnpS
5bEAoIyesAayCLq72NJiyLjtnUJXqx4N
=jSb1
-END PGP SIGNATURE-


Re: [ossec-list] syscheck alert information

2011-02-28 Thread Jason &#x27;XenoPhage'; Frisvold
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On Feb 28, 2011, at 3:13 PM, dan (ddp) wrote:
> It isn't possible at the moment. There are some things I want improved
> in the syscheck stuff, but no timelines, promises, hints, ipads, or
> guarantees.

Well, I'm sure there's a wishlist somewhere..  :)  As long as it's on there and 
the right people have the wishlist, I'll be satisfied.

> dan

- -------
Jason 'XenoPhage' Frisvold
xenoph...@godshell.com
- ---
"Any sufficiently advanced magic is indistinguishable from technology."
- - Niven's Inverse of Clarke's Third Law



-BEGIN PGP SIGNATURE-
Version: GnuPG/MacGPG2 v2.0.14 (Darwin)

iEYEARECAAYFAk1sYmoACgkQ8CjzPZyTUTR7wACfbFq6jlg2h2Xgu81LHkb5q9wQ
0F8An24nRc6Ffb0OZjwUpXjg/Wnh3gQc
=N79+
-END PGP SIGNATURE-


[ossec-list] syscheck alert information

2011-02-28 Thread Jason &#x27;XenoPhage'; Frisvold
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hi all,

Quick question.  Is there a way to get OSSEC to send a bit more
information with a syscheck alert?  It would be nice if OSSEC sent
previously known information as well as what the new information is.
For instance, file size, mtime, ctime, and permissions.

Does any of this functionality exist currently?  (A quick search
doesn't turn anything up)  Or perhaps is it something that can be added
for 2.6 or 2.7 ?

Thanks,

- -- 
- ---
Jason 'XenoPhage' Frisvold
xenoph...@godshell.com
- ---
"Any sufficiently advanced magic is indistinguishable from technology."
- - Niven's Inverse of Clarke's Third Law
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.16 (GNU/Linux)
Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org/

iEYEARECAAYFAk1rw8sACgkQ8CjzPZyTUTRjQQCdEBeKY8c8FnRtKUEDFEv8Cmm9
J3wAmgJw2ASV2U9kFP0e+24NVCCCTj8K
=uHYe
-END PGP SIGNATURE-


Re: [ossec-list] active response in central management?

2011-02-25 Thread Jason &#x27;XenoPhage'; Frisvold
On Feb 24, 2011, at 2:33 PM, "dan (ddp)"  wrote:
>> 
>>  yes
>> 
>> 
> 
> This disabled AR on that agent.

This is in the agent.conf, right?  I had been disabling specific agents by 
creating an active response at the top of my ossec.conf with that agent_id 
identified.  This looks MUCH easier and doesn't require a restart of my main 
OSSEC server..

- Jason

Re: [ossec-list] File and folder monitoring

2011-02-23 Thread Jason &#x27;XenoPhage'; Frisvold
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 02/23/2011 01:12 PM, Chad Hammond wrote:
> How do I setup file and folder monitoring on a directory?
>  
> Any help with this would be greatly appreciated.

Add a syscheck section to your ossec.conf and/or agent.conf file :

   
  7200

  no
  yes

  /etc
   


>Chad Hammond

- -- 
- ---
Jason 'XenoPhage' Frisvold
xenoph...@godshell.com
- ---
"Any sufficiently advanced magic is indistinguishable from technology."
- - Niven's Inverse of Clarke's Third Law
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.16 (GNU/Linux)
Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org/

iEYEARECAAYFAk1lVzAACgkQ8CjzPZyTUTQ1NgCgpcXbhIpIvSRYT0yfnMqF1tzB
nkMAoKL1DDux85mdiM/RQfl9fuk5jisV
=IQFp
-END PGP SIGNATURE-


Re: [ossec-list] Re: high availability solution

2011-01-21 Thread Jason &#x27;XenoPhage'; Frisvold
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On Jan 12, 2011, at 12:44 PM, Daniel Cid wrote:
> Yes, and it has worked well for me.
> 
> One caveat is that the rids (message ids) will have to be
> exchanged/synced between each manager in the
> HA. A simple solution is to disable the id check, so it should just
> work without any sync...

I was planning on syncing the RIDs ..  The RIDs shouldn't change unless a new 
agent is added, right?

What's the security impact of disabling the RIDs?  What does that open me up 
for?

> Daniel B. Cid

Thanks,


- -------
Jason 'XenoPhage' Frisvold
xenoph...@godshell.com
- ---
"Any sufficiently advanced magic is indistinguishable from technology."
- - Niven's Inverse of Clarke's Third Law



-BEGIN PGP SIGNATURE-
Version: GnuPG/MacGPG2 v2.0.14 (Darwin)

iEYEARECAAYFAk06TlwACgkQ8CjzPZyTUTRJVwCcCESUSZOaqlv9ERfDLGXMa/0R
7xEAn2Ud2WvHEHO79mq2odb6wDm6Z1JF
=I1RZ
-END PGP SIGNATURE-


Re: [ossec-list] ossec agent and logs

2011-01-21 Thread Jason &#x27;XenoPhage'; Frisvold
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On Jan 11, 2011, at 1:21 PM, Netsyphon wrote:
> Splunk is nice but I had troubles getting it to work with the ossec plugin, 
> may try again. It's also somewhat cost prohibitive since it's doing only a 
> small portion of what it's needed for compared to ossec.  I agree on the 
> snare comparison, it's not practical for the security minded. 


Unless you have a huge number of OSSEC clients, I think the free version of 
splunk handles everything just fine.  You lose some features such as automated 
reporting and the ability to create users, but it works really well.

- -------
Jason 'XenoPhage' Frisvold
xenoph...@godshell.com
- ---
"Any sufficiently advanced magic is indistinguishable from technology."
- - Niven's Inverse of Clarke's Third Law



-BEGIN PGP SIGNATURE-
Version: GnuPG/MacGPG2 v2.0.14 (Darwin)

iEYEARECAAYFAk06UAUACgkQ8CjzPZyTUTSlSwCeNBD/WP+yghJe2YUs99EauikT
j24AnAlI0J93efkho3DeIHhbMofzvlKX
=5vqi
-END PGP SIGNATURE-


Re: [ossec-list] Re: ossec agent and logs

2011-01-21 Thread Jason &#x27;XenoPhage'; Frisvold
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On Jan 13, 2011, at 2:09 PM, dan (ddp) wrote:
> I'm not disagreeing with you because I haven't done any testing, but
> according to splunk the light forwarder shouldn't use more than about
> 25MB of ram and 256kb of network.
> The trainer also mentioned he had helped with an installation where a
> splunk LF was installed on every desktop/laptop in the organization.
> Seemed like a neat idea, but knowing the machine I use at work even
> with the resource limits it could be a bit much.


You don't necessarily need to use the light forwarder, though.  You can always 
use push the data to splunk using something like rsyslog or syslog-ng.  The 
biggest difference here is that the spiunk will give you the ability to do SSL.

There was also mention of a new light forwarder coming "soon" that will really 
be a light installation.  Right now the light forwarder is a full splunk 
install with just a few items turned on.  This new forwarder, I believe they're 
calliing it the ultra light forwarder, will be stripped down to the bare 
minimum.

- ---
Jason 'XenoPhage' Frisvold
xenoph...@godshell.com
- ---
"Any sufficiently advanced magic is indistinguishable from technology."
- - Niven's Inverse of Clarke's Third Law



-BEGIN PGP SIGNATURE-
Version: GnuPG/MacGPG2 v2.0.14 (Darwin)

iEYEARECAAYFAk06T0cACgkQ8CjzPZyTUTQm1QCfdJ6nYjf/cvpugTb6q9pyp3Rp
srQAn1nzJNSJV7X74ACSYpsGCC8MrGq1
=SOOT
-END PGP SIGNATURE-


Re: [ossec-list] OSSEC in the Enterprise

2011-01-21 Thread Jason &#x27;XenoPhage'; Frisvold
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On Jan 10, 2011, at 11:07 AM, ItsMikeE wrote:
> On a different (but related) note, has anyone set up a a second OSSEC server, 
> to provide enterprise-level resilience?


This is something I want to do in the near future before I get too far along in 
my deployment.

- ---
Jason 'XenoPhage' Frisvold
xenoph...@godshell.com
- ---
"Any sufficiently advanced magic is indistinguishable from technology."
- - Niven's Inverse of Clarke's Third Law



-BEGIN PGP SIGNATURE-
Version: GnuPG/MacGPG2 v2.0.14 (Darwin)

iEYEARECAAYFAk06SYkACgkQ8CjzPZyTUTQ9NACgnvzvheLL/Aemf3iTgxguPxNo
tNYAn1SzeQkub7pZAg3R/w7CBcZTNEEp
=quIg
-END PGP SIGNATURE-


Re: [ossec-list] Error in destination mail with agent created with IP address = any

2011-01-06 Thread Jason &#x27;XenoPhage'; Frisvold
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 12/21/2010 01:52 PM, dan (ddp) wrote:
>  Or are you saying that an event from agent1 is showing up in an email
> that mentioned agent2 in the subject?

The latter happens to me all the time.  It's a bit disconcerting,
actually.  I believe the "fix" was to disable email grouping, but that
just results in more email.  :)

- -- 
- -----------
Jason 'XenoPhage' Frisvold
xenoph...@godshell.com
- ---
"Any sufficiently advanced magic is indistinguishable from technology."
- - Niven's Inverse of Clarke's Third Law
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.16 (GNU/Linux)
Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org/

iEYEARECAAYFAk0mHdsACgkQ8CjzPZyTUTTj/wCfYnz9fm2zqkboIUZVYSMIlUaa
DWsAn133Js22MNlqgKfE+4LT+hDzlh37
=512T
-END PGP SIGNATURE-


Re: [ossec-list] Different active response dutations for each level

2011-01-06 Thread Jason &#x27;XenoPhage'; Frisvold
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 12/15/2010 02:57 PM, dan (ddp) wrote:
> Give it a shot. Might work.
> 
> I'd think you would need to put the higher level ARs at the top
> though, since 6 means 6+.
> Haven't investigated that though, so I could be way off.

Yes, the higher level has to come first.  I'm using this in production
already.  :)

- -- 
- -----------
Jason 'XenoPhage' Frisvold
xenoph...@godshell.com
- ---
"Any sufficiently advanced magic is indistinguishable from technology."
- - Niven's Inverse of Clarke's Third Law
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.16 (GNU/Linux)
Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org/

iEYEARECAAYFAk0mBnsACgkQ8CjzPZyTUTQvVgCfbALGR296nxIFa773ti2ucwPy
lh4An2Mbgj/Ta0vt0e189jmCxSkF2o82
=1lr/
-END PGP SIGNATURE-


Re: [ossec-list] Consolidate active-response.logs

2010-12-31 Thread Jason &#x27;XenoPhage'; Frisvold
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On Dec 30, 2010, at 7:44 PM, dan (ddp) wrote:
> Have ossec read the active-response.log file?
> 
> 
>  syslog
>  /var/ossec/logs/active-response.log 
> 
> 
> It's not elegant, but should work.


You!  With your inescapable logic!

...

Thanks.  :)  I should have thought of that...  :P

- -------
Jason 'XenoPhage' Frisvold
xenoph...@godshell.com
- ---
"Any sufficiently advanced magic is indistinguishable from technology."
- - Niven's Inverse of Clarke's Third Law



-BEGIN PGP SIGNATURE-
Version: GnuPG/MacGPG2 v2.0.14 (Darwin)

iEYEARECAAYFAk0eInIACgkQ8CjzPZyTUTTDoQCfWMur9kTtorfLI5YXzF/SNJtM
qLQAn0UvoQAWZVDUvD8eMqaTED9JyFY9
=S+qG
-END PGP SIGNATURE-


Re: [ossec-list] Consolidate active-response.logs

2010-12-30 Thread Jason &#x27;XenoPhage'; Frisvold
On Dec 30, 2010, at 4:55 PM, Saket  wrote:

> Hi,
> 
> Is there a way to consolidate all the active-response.log file from
> all the agents?
> 
> It is difficult to access each agents active-response.log, I am
> presuming there is a way to consolidate all the active-response.log in
> the server.
> 
> I know the alert logs can be sent to a syslog server, Is it possible
> to send the active-response logs aswell ?

I'd like to second this. I know I can use something like rsyslog to send this 
data, but as I'm already using ossec to send the normal logs, it would be nice 
to send the response log as well. 

> Thanks,
> Saket


[ossec-list] Happy Holidays!

2010-12-25 Thread Jason &#x27;XenoPhage'; Frisvold
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

For those that celebrate, and even those that don't!  Happy Holidays all!

Thanks for all of the support you provided when I was rolling out OSSEC for the 
first time and all the support you continue to provide as I continue to expand 
my OSSEC knowledge!

- ---
Jason 'XenoPhage' Frisvold
xenoph...@godshell.com
- ---
"Any sufficiently advanced magic is indistinguishable from technology."
- - Niven's Inverse of Clarke's Third Law



-BEGIN PGP SIGNATURE-
Version: GnuPG/MacGPG2 v2.0.14 (Darwin)

iEYEARECAAYFAk0WT2YACgkQ8CjzPZyTUTQZBwCfagZBnvvatanlg43D4vuRIn78
0wQAn1jW0NPdt6cHE63/3FDWpeIUJI8U
=qrnH
-END PGP SIGNATURE-


Re: [ossec-list] Strange Alert

2010-12-08 Thread Jason &#x27;XenoPhage'; Frisvold
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On Dec 7, 2010, at 5:03 PM, dan (ddp) wrote:
> It's an OSSEC keep-alive message. It's not supposed to be in the logs,
> but it is. It's fixed in the latest snapshot.

Yeah, sorry about the noise..  I noticed another thread about this..  I should 
read before posting. :)


- -----------
Jason 'XenoPhage' Frisvold
xenoph...@godshell.com
- ---
"Any sufficiently advanced magic is indistinguishable from technology."
- - Niven's Inverse of Clarke's Third Law



-BEGIN PGP SIGNATURE-
Version: GnuPG/MacGPG2 v2.0.14 (Darwin)

iEYEARECAAYFAkz/0RwACgkQ8CjzPZyTUTRzGACfber8274NkwK39uXtUDzuBoVK
kE4An1jCkYH5hOLr8TsKu7XJVtZcfW7/
=50ss
-END PGP SIGNATURE-


[ossec-list] Strange Alert

2010-12-07 Thread Jason &#x27;XenoPhage'; Frisvold
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

I received the following notification from ossec today and I have no idea what 
it is.  I've truncated the output for security reasons since it looks like it 
*might* be some sort of encoded string.  Any idea what this is?

OSSEC HIDS Notification.
2010 Dec 07 09:22:47

Received From: (myServer) 192.168.0.1->ossec-keepalive
Rule: 1002 fired (level 2) -> "Unknown problem somewhere in the system."
Portion of the log(s):

- --MARK--: *I&ccQ?



- --END OF NOTIFICATION

- -----------
Jason 'XenoPhage' Frisvold
xenoph...@godshell.com
- ---
"Any sufficiently advanced magic is indistinguishable from technology."
- - Niven's Inverse of Clarke's Third Law



-BEGIN PGP SIGNATURE-
Version: GnuPG/MacGPG2 v2.0.14 (Darwin)

iEYEARECAAYFAkz+rPwACgkQ8CjzPZyTUTQCCgCgn61LT9l/dVNXvNH3zcGRJ1Z6
7IsAoI9l9llPws8CJW877cmJVLtIVH+n
=83Nw
-END PGP SIGNATURE-


Re: [ossec-list] Active response against external harware.

2010-12-01 Thread Jason &#x27;XenoPhage'; Frisvold
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 11/29/2010 02:31 PM, dan (ddp) wrote:
> Since the SSH keys probably wouldn't have a passphrase to use them,
> it's basically just as risky as having the password (IMHO).

Slightly less overall risk as you don't expose a password that might be
used elsewhere..  Or give a clue as to how you construct your passwords.

- -- 
- -----------
Jason 'XenoPhage' Frisvold
xenoph...@godshell.com
- ---
"Any sufficiently advanced magic is indistinguishable from technology."
- - Niven's Inverse of Clarke's Third Law
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.16 (GNU/Linux)
Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org/

iEYEARECAAYFAkz2hsoACgkQ8CjzPZyTUTQm3ACfUtjC6EAUfT3KGcXps/AB3BfF
nk0AnjH20D+hghSUDydje2zgz0O9Wc5o
=f/bm
-END PGP SIGNATURE-


Re: [ossec-list] First time this user logged in this system Question

2010-11-20 Thread Jason &#x27;XenoPhage'; Frisvold
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On Nov 20, 2010, at 1:49 AM, Mike Smith wrote:
> Hello,
> 
> Is there any way that I can have OSSEC, alert each time a user logs
> into a computer, and not the first time, like the default action.
> 
> Because I think this is a great feature and would like to get it to
> work all of the time and not just the first time.  So if I wanted to
> add this feature, where would I configure it.

Untested, but if you add this to local_rules.xml and restart the server, this 
should do it :


  authentication_success
  alert_by_email
  authentication_success
  User logged in.



> Thanks,
> 
> -M



- -------
Jason 'XenoPhage' Frisvold
xenoph...@godshell.com
- ---
"Any sufficiently advanced magic is indistinguishable from technology."
- - Niven's Inverse of Clarke's Third Law



-BEGIN PGP SIGNATURE-
Version: GnuPG/MacGPG2 v2.0.14 (Darwin)

iEYEARECAAYFAkzoNtYACgkQ8CjzPZyTUTRRcgCeKaG8uAXVy6pAyGk9ghvWJr5g
AzYAnjUXS51xY5T5dzCXbVjECkF9TjJw
=B/4U
-END PGP SIGNATURE-


Re: [ossec-list] Daily Report have blank body, data is part of subject line

2010-11-19 Thread Jason &#x27;XenoPhage'; Frisvold
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On Nov 19, 2010, at 2:23 PM, dan (ddp) wrote:
> I wonder why these mail servers handle the traffic so differently.
> 
> On the "does not work" list we have:
> exim4
> Exchange
> 
> Anyone else having issues want to chime in?
> 
> I've tried it with OpenBSD's smtpd, and probably sendmail. So those
> will be the start of a "does work" list. Anyone want to contribute to
> this list?


qmail works fine as well.

- ---
Jason 'XenoPhage' Frisvold
xenoph...@godshell.com
- ---
"Any sufficiently advanced magic is indistinguishable from technology."
- - Niven's Inverse of Clarke's Third Law



-BEGIN PGP SIGNATURE-
Version: GnuPG/MacGPG2 v2.0.14 (Darwin)

iEYEARECAAYFAkznQdUACgkQ8CjzPZyTUTTslwCbBp68j0QdlTQUE1eTe8ZkSGHe
cFAAoJzwDFhFEguc+nIVvB5pkHAs4z51
=gMW7
-END PGP SIGNATURE-


Re: [ossec-list] Re: Bug report for OSSEC 2.5.1 ("ftpd-mac-failure" decoder in decoder.xml)

2010-10-31 Thread Jason &#x27;XenoPhage'; Frisvold
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On Oct 28, 2010, at 3:08 PM, blacklight wrote:
> The syslog message was generated on a Linux 2.6 machine serving as an
> OSSEC agent host. The Linux 2.6 machine is running Fedora Core 5.

Isn't FC5 a tad old?

> I worked with this host because it is accessible from the outside and
> it was being bombed with FTP login requests from a single, unknown
> external IP.
> 
> I expect that this solution works out for all out hosts because we are
> pretty much standardized on Linux 2.6 - both Fedora Core 5 and Centos
> 5 - if we were not standardized, I'd go crazy :)

Your fix works, sort of.  It appears that this line :

 [(\d+.\d+.\d+.\d+)]$

Expects something along the lines of :

[123.123.123.123]

while your log message doesn't have the square brackets, are there other 
instances that would?  If the rule is switched to use (\S+) instead, then srcip 
will have extra characters in it that will cause the active response to fail.  
Instead, try this :

 (\d+.\d+.\d+.\d+)

This will match the first IP address after the prematch.  It should catch the 
log entries you have provided as well as those that may have square brackets.

- -------
Jason 'XenoPhage' Frisvold
xenoph...@godshell.com
- ---
"Any sufficiently advanced magic is indistinguishable from technology."
- - Niven's Inverse of Clarke's Third Law



-BEGIN PGP SIGNATURE-
Version: GnuPG/MacGPG2 v2.0.14 (Darwin)

iEYEARECAAYFAkzOLCEACgkQ8CjzPZyTUTRgmgCdEwDiGbaLs/hRSxCFRgM7sWFR
zeQAn2JmDCtXFcHyG3vQOMM7Sd0OCvDW
=TlMq
-END PGP SIGNATURE-


Re: [ossec-list] Handling directory traversal false positives

2010-10-26 Thread Jason &#x27;XenoPhage'; Frisvold
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 10/26/2010 02:29 PM, dan (ddp) wrote:
> The only thing I can think of is to watch the logs and implement
> ignore rules for the legitimate stuff you come across. Be as specific
> as possible.

Ouch ..  So much for sanity..

Well, no one said security was easy, right?

- -- 
- -------
Jason 'XenoPhage' Frisvold
xenoph...@godshell.com
- ---
"Any sufficiently advanced magic is indistinguishable from technology."
- - Niven's Inverse of Clarke's Third Law
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.14 (GNU/Linux)
Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org/

iEYEARECAAYFAkzHL94ACgkQ8CjzPZyTUTRPjgCbBpNyx9PwXmoskNzJStRy62kA
fVIAn3pGsbzSwOWVAjA1dwtV9v9HFYEU
=k8aq
-END PGP SIGNATURE-


Re: [ossec-list] Handling directory traversal false positives

2010-10-25 Thread Jason &#x27;XenoPhage'; Frisvold
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On Oct 21, 2010, at 8:15 PM, Jason 'XenoPhage' Frisvold wrote:
> I find myself struggling with how to handle directory traversal false 
> positives.  The following happily triggers rule 31104 and active response 
> blocks the IP.
> 
> 204.41.5.50 - - [21/Oct/2010:08:43:53 -0400] "GET /../index.html HTTP/1.1" 
> 400 303 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1)"
> 
> The problem is that, unfortunately, this is actually legit..  While I wish I 
> could control poor web coding, I cannot..  *sigh*
> 
> I can put an ignore in, but that would hamper detecting an actual traversal 
> attack.  I can think of a few ways to alter it so it detects two or more 
> directories being traversed, but I can think of a few ways to defeat that 
> too..  So, how do I handle this?
> 
> Thanks,


One more time.. Anyone have any thoughts on this?  I'm not sure where to head 
with this one...  Anyone else having this problem?

- ---
Jason 'XenoPhage' Frisvold
xenoph...@godshell.com
- ---
"Any sufficiently advanced magic is indistinguishable from technology."
- - Niven's Inverse of Clarke's Third Law



-BEGIN PGP SIGNATURE-
Version: GnuPG/MacGPG2 v2.0.14 (Darwin)

iEYEARECAAYFAkzGRXoACgkQ8CjzPZyTUTQr6wCdFz7GuioTc4caZQlBZxwoUlMp
qyEAn2Lr+SrFHvtlANs5Qh73jkJYVLlB
=jOdT
-END PGP SIGNATURE-


Re: [ossec-list] Re: Queue '/var/ossec/queue/ossec/queue' not accessible: 'Connection refused' - on agent

2010-10-25 Thread Jason &#x27;XenoPhage'; Frisvold
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 10/25/2010 09:45 AM, ItsMikeE wrote:
> Turned out to be caused by group ownership of etc/client.keys file.
> Somehow it had been set to root:root. Switched to root:ossec and OSSEC
> started up as normal.

If it helps, I have some bare-bones RPM packages here :

http://www.godshell.com/software

> Thanks for your help

- -- 
- ---
Jason 'XenoPhage' Frisvold
xenoph...@godshell.com
- ---
"Any sufficiently advanced magic is indistinguishable from technology."
- - Niven's Inverse of Clarke's Third Law
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.14 (GNU/Linux)
Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org/

iEYEARECAAYFAkzFvdkACgkQ8CjzPZyTUTRvegCfeECmhbz2D2qPGySKt9Aza/qJ
m5cAn1intCT/Gjm236xCt3xjAhzHSwPx
=umHe
-END PGP SIGNATURE-


Re: [ossec-list] Day 7: Making it happen: who, what, when and how?

2010-10-23 Thread Jason &#x27;XenoPhage'; Frisvold
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On Oct 23, 2010, at 10:44 PM, dan (ddp) wrote:
> A rules style guide would be something I'd definitely be interested in
> helping out with. I'll be writing a bunch of (non-Windows ;) rules
> myself, so keeping them consistent would be nice.

I'll second this one..  I want to release the rules I have, as well as rules I 
come up with moving forward, but having some sort of "style guide" would be 
helpful..

> I'll continue working on my WIP rules, hopefully growing the
> applications list a bit. I've also got a few ideas for the code, so
> learning C is on my list of things to do in my spare time.

What is this "spare time" you speak of..

- ---
Jason 'XenoPhage' Frisvold
xenoph...@godshell.com
- ---
"Any sufficiently advanced magic is indistinguishable from technology."
- - Niven's Inverse of Clarke's Third Law



-BEGIN PGP SIGNATURE-
Version: GnuPG/MacGPG2 v2.0.14 (Darwin)

iEYEARECAAYFAkzDpOMACgkQ8CjzPZyTUTSAgwCfSSFAYVvwHFk/VWxKVL7iczuX
FqwAn2tNHLWbl2sEBObPoNsWXsQoT+bf
=9jPt
-END PGP SIGNATURE-


Re: [ossec-list] 2WoO Day 7: Supporting New Applications the Right Way

2010-10-23 Thread Jason &#x27;XenoPhage'; Frisvold
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On Oct 23, 2010, at 11:33 AM, Michael Starks wrote:
> http://www.immutablesecurity.com/index.php/2010/10/23/2woo-day-7-supporting-new-applications-the-right-way/


Err..  better late than never?

Day 7 - Tidbits  :  
http://blog.godshell.com/blog/archives/278-WoO-Day-7-Tidbits.html

- ---
Jason 'XenoPhage' Frisvold
xenoph...@godshell.com
- ---
"Any sufficiently advanced magic is indistinguishable from technology."
- - Niven's Inverse of Clarke's Third Law



-BEGIN PGP SIGNATURE-
Version: GnuPG/MacGPG2 v2.0.14 (Darwin)

iEYEARECAAYFAkzDk8kACgkQ8CjzPZyTUTQ/cQCeKXNm8o2PsNPY9kFM3VYFVHqB
hpMAoIl23+43+fqcLF+k84pthdyZE4o9
=NlFG
-END PGP SIGNATURE-


Re: [ossec-list] Email alerting options

2010-10-23 Thread Jason &#x27;XenoPhage'; Frisvold
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On Oct 23, 2010, at 1:38 AM, jplee3 wrote:
> I have a couple questions:
> 
> 1) Is there a way to suppress the body of the OSSEC log so that it
> doesn't necessarily appear in the email? I'm setting up alerting via
> SMS but the long log messages causes the SMS to get cut off.

There is an sms format option you can use, though I'm not sure what it does to 
the message, exactly.  You can find info here :

http://www.ossec.net/doc/manual/output/granular-email-output.html

> 2) Do the "" levels in the ossec.conf affect whether emails go
> out if using the "" option? I have the alert levels set
> to the default (1=log and 7=email). I was testing out one of the rules
> and set the alert level to "6" and no emails were sent when it
> tripped. I changed it to alert level "10" and got an email doing that
> though. My understanding was that the email_alert option should be
> independent of the  setting.

The email setting determines what level alerts are sent via email.  So, the 
default setting of 7 means that an alert of level 7 or more is sent via email.  
This is why your level 6 alert did not get emailed.  It should have ended up in 
the log, however.

> TIA!

- ---
Jason 'XenoPhage' Frisvold
xenoph...@godshell.com
- ---
"Any sufficiently advanced magic is indistinguishable from technology."
- - Niven's Inverse of Clarke's Third Law



-BEGIN PGP SIGNATURE-
Version: GnuPG/MacGPG2 v2.0.14 (Darwin)

iEYEARECAAYFAkzC7U8ACgkQ8CjzPZyTUTSO/ACfUqTWMfD0RhZFsCwTzLjg1fzF
V9AAnikOD8eviR/DyB6TsxFQUtsROVLf
=YPmH
-END PGP SIGNATURE-


Re: [ossec-list] 2WoO Day 6: Running Multiple Instances on One Box

2010-10-22 Thread Jason &#x27;XenoPhage'; Frisvold
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 10/22/2010 08:26 AM, Michael Starks wrote:
> http://www.immutablesecurity.com/index.php/2010/10/22/2woo-day-6-running-multiple-instances-on-one-box/

Day 6 - Layin' Down The Law -
http://blog.godshell.com/blog/archives/277-WoO-Day-6-Layin-Down-The-Law.html

- -- 
- ---
Jason 'XenoPhage' Frisvold
xenoph...@godshell.com
- ---
"Any sufficiently advanced magic is indistinguishable from technology."
- - Niven's Inverse of Clarke's Third Law
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.14 (GNU/Linux)
Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org/

iEYEARECAAYFAkzBia8ACgkQ8CjzPZyTUTSTSACfencck05DEr/MrqQTC1DCRS1K
HyQAoKROYwRipkdkG39dli5b6GQIy3s5
=hi5R
-END PGP SIGNATURE-


[ossec-list] Handling directory traversal false positives

2010-10-21 Thread Jason &#x27;XenoPhage'; Frisvold
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

I find myself struggling with how to handle directory traversal false 
positives.  The following happily triggers rule 31104 and active response 
blocks the IP.

204.41.5.50 - - [21/Oct/2010:08:43:53 -0400] "GET /../index.html HTTP/1.1" 400 
303 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1)"

The problem is that, unfortunately, this is actually legit..  While I wish I 
could control poor web coding, I cannot..  *sigh*

I can put an ignore in, but that would hamper detecting an actual traversal 
attack.  I can think of a few ways to alter it so it detects two or more 
directories being traversed, but I can think of a few ways to defeat that too.. 
 So, how do I handle this?

Thanks,

- -----------
Jason 'XenoPhage' Frisvold
xenoph...@godshell.com
- ---
"Any sufficiently advanced magic is indistinguishable from technology."
- - Niven's Inverse of Clarke's Third Law



-BEGIN PGP SIGNATURE-
Version: GnuPG/MacGPG2 v2.0.14 (Darwin)

iEYEARECAAYFAkzA17kACgkQ8CjzPZyTUTQW9gCeNB5GVSD/wU7C/JgWzNk9kc6B
BlUAoKSI2wfIw9aIH8v1Gz1yrBHO0TH3
=73u2
-END PGP SIGNATURE-


Re: [ossec-list] Day 4: What bugs you: problems, challenges and room for improvement.

2010-10-21 Thread Jason &#x27;XenoPhage'; Frisvold
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On Oct 21, 2010, at 9:41 AM, dan (ddp) wrote:
> Depends on your definition of "free." ;)


Touche ...  :)

- -------
Jason 'XenoPhage' Frisvold
xenoph...@godshell.com
- ---
"Any sufficiently advanced magic is indistinguishable from technology."
- - Niven's Inverse of Clarke's Third Law



-BEGIN PGP SIGNATURE-
Version: GnuPG/MacGPG2 v2.0.14 (Darwin)

iEYEARECAAYFAkzAzCAACgkQ8CjzPZyTUTSk3ACeNNWqY1b6mNgIXLpBiHr6TluT
g5cAnj5cwoUTk2E+XxtSLgP92HiHmh6b
=XKgA
-END PGP SIGNATURE-


Re: [ossec-list] I may have missed this resent subject

2010-10-21 Thread Jason &#x27;XenoPhage'; Frisvold
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On Oct 21, 2010, at 2:01 PM,  wrote:
> Anyone: After upgrading my management Servers to 2.5.1  I'm getting, after I 
> restart the agents 
>  
>   2010/10/21 13:56:04 ossec-testrule: INFO: Reading local decoder file.
>  
> Any information on this would be great.

I believe this just means it's loading the local decoder file..  What version 
were you running previously?

> Thank You Christian

- -------
Jason 'XenoPhage' Frisvold
xenoph...@godshell.com
- ---
"Any sufficiently advanced magic is indistinguishable from technology."
- - Niven's Inverse of Clarke's Third Law



-BEGIN PGP SIGNATURE-
Version: GnuPG/MacGPG2 v2.0.14 (Darwin)

iEYEARECAAYFAkzAgZQACgkQ8CjzPZyTUTQo0ACgiiv/njBVlCcQ9hpqVnbPdZfj
3V4An0joMmo2pQ8Kabf/VuLGHTmX942c
=YydX
-END PGP SIGNATURE-


Re: [ossec-list] Day 4: What bugs you: problems, challenges and room for improvement.

2010-10-21 Thread Jason &#x27;XenoPhage'; Frisvold
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 10/20/2010 07:15 PM, Michael Starks wrote:
> I agree completely. But just so you are aware, OSSEC integrates nicely
> with Splunk for a non-free solution.

Non-free if you want more than 500 Megs per day and some of the fancier
features..  There is a free version of splunk that works with plugins..

- -- 
- ---
Jason 'XenoPhage' Frisvold
xenoph...@godshell.com
- ---
"Any sufficiently advanced magic is indistinguishable from technology."
- - Niven's Inverse of Clarke's Third Law
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.14 (GNU/Linux)
Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org/

iEYEARECAAYFAkzAPSAACgkQ8CjzPZyTUTQfAwCgklHBC6E77ICaWkzz1i/9p0uH
L7AAoJQn2TbmdI6pwlbLyr+FIbFOhwIs
=41fW
-END PGP SIGNATURE-


Re: [ossec-list] Day 4: What bugs you: problems, challenges and room for improvement.

2010-10-21 Thread Jason &#x27;XenoPhage'; Frisvold
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 10/20/2010 06:01 PM, Shane Warner wrote:
> Not sure what platform you're on, but we build an RPM package and set
> any important configuration files up with the config(noreplace)
> directive to prevent them from being overwritten on updates.

Wouldn't that prevent installation of new versions of the rules?

- -- 
- -------
Jason 'XenoPhage' Frisvold
xenoph...@godshell.com
- ---
"Any sufficiently advanced magic is indistinguishable from technology."
- - Niven's Inverse of Clarke's Third Law
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.14 (GNU/Linux)
Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org/

iEYEARECAAYFAkzAPOIACgkQ8CjzPZyTUTSdewCfRbwaXJgqSyxvTVzj/IZ4+Ai2
fy4An0+VDzww9TbrIqcJ4DydLQMnHBJs
=gKZ/
-END PGP SIGNATURE-


Re: [ossec-list] 2WoO Day 5: Taming File Integrity Alerts

2010-10-21 Thread Jason &#x27;XenoPhage'; Frisvold
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 10/21/2010 08:36 AM, Michael Starks wrote:
> For those that get bombarded with alerts when patching:
> 
> http://www.immutablesecurity.com/index.php/2010/10/21/2woo-taming-syscheck/

Decoders Unite!  All about decoders -
http://blog.godshell.com/blog/archives/276-WoO-Day-5-Decoders-Unite!.html

- -- 
- -------
Jason 'XenoPhage' Frisvold
xenoph...@godshell.com
- ---
"Any sufficiently advanced magic is indistinguishable from technology."
- - Niven's Inverse of Clarke's Third Law
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.14 (GNU/Linux)
Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org/

iEYEARECAAYFAkzAOlsACgkQ8CjzPZyTUTTinACaAqJ4K08p07+SD8VLpKQMeQsH
LB8An0aUduFem+NifCrOEuGjMXUDWYpw
=RSE2
-END PGP SIGNATURE-


Re: [ossec-list] Day 4: What bugs you: problems, challenges and room for improvement.

2010-10-20 Thread Jason &#x27;XenoPhage'; Frisvold
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 10/20/2010 02:10 PM, Derek Morris wrote:
>  I would have to say the Upgrade process. I have to do a diff on
> numerous rules files that i have edited and takes quite a bit of pain
> staking work to complete.

Really?  I simply created additional files for my modified rules.  So
where ossec ships with, say, firewall_rules.xml, I created
firewall_rules_local.xml.  An upgrade won't override that.

Additionally, I've ensured (somewhat) that I have not used any of the
rule IDs that are currently reserved.  I'm aware that the official line
is that local rules should use the range 10-10, but I chose to
merely add 10 to any ruleset range I'm modifying.  So, if I have to
make a change to, say, rule 31101 to ignore a monitoring station, I
create a rule in the range of 131100-131199 and override that rule.
Just use an if_sid to make sure it's an override.

Another assumption here is that the numbering in the rules doesn't
change..  I don't believe that will be the case without extremely large,
blinking, sound-activated disclaimers by the developers.  And even then,
I'm pretty sure they'll try to avoid that.


- -- 
- ---
Jason 'XenoPhage' Frisvold
xenoph...@godshell.com
- ---
"Any sufficiently advanced magic is indistinguishable from technology."
- - Niven's Inverse of Clarke's Third Law
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.14 (GNU/Linux)
Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org/

iEYEARECAAYFAky/VNAACgkQ8CjzPZyTUTSj8ACfVyFtH5RXjO4CTdtQ4zSzN8GS
xQAAnRziQh4F9NbQZE1OEd059wHBTPG3
=ByCX
-END PGP SIGNATURE-


Re: [ossec-list] 2WoO Day 3: Abusing OSSEC–the Cou ntermeasures

2010-10-19 Thread Jason &#x27;XenoPhage'; Frisvold
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 10/19/2010 08:25 AM, Michael Starks wrote:
> http://www.immutablesecurity.com/index.php/2010/10/19/2woo-day-3-abusing-ossec-the-countermeasures/

And over at the Godshell blog, Meet The Agent ...

http://blog.godshell.com/blog/archives/274-WoO-Day-3-Meet-the-agent.html

Feel free to leave comments, I crave feedback!  :)

- -- 
- ---
Jason 'XenoPhage' Frisvold
xenoph...@godshell.com
- ---
"Any sufficiently advanced magic is indistinguishable from technology."
- - Niven's Inverse of Clarke's Third Law
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.14 (GNU/Linux)
Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org/

iEYEARECAAYFAky9nHwACgkQ8CjzPZyTUTQteACfcT3XZT0mnz8J7wo8raSD+bSs
TCsAnjQ8+ZaRFb9sU4W0Of8WA4pRQvkJ
=/ana
-END PGP SIGNATURE-


Re: [ossec-list] 2WoO Day 2: Tell your story. How has OSSEC helped you?

2010-10-18 Thread Jason &#x27;XenoPhage'; Frisvold
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 10/18/2010 08:35 AM, Michael Starks wrote:
> This is the day we get to recount our experiences of how OSSEC has saved
> the day, or just saved us some scratch. People coming by later on who
> read these will get a sense for OSSEC and if it can work in their
> environment. What say you?

Last year at this time I was running Osiris and depending on Logwatch
for most of my log analysis.  Osiris is a solid product, but,
unfortunately, it hasn't been updated in some time.  Likewise, Logwatch
is also a solid product, but depending on it for complete log analysis
is cumbersome, at best.  And finally, fail2ban was being used to detect
various attacks and block them.  Fail2ban is still a pretty decent
product and I heartily recommend it if OSSEC is to much for your needs.

OSSEC helped to solve both of these problems and even added additional
features that I have found to be incredibly useful.  Now I can centrally
manage all of my machines, ensure integrity via hashing, and respond to
a wide array of events.  The flexibility of OSSEC allows me to trigger
on virtually any event and respond with whatever I can express in a script.

As I learn more about OSSEC, I'm sure I'll unlock even more capability
that I'm not even aware of yet.  This is becoming one of the more
powerful tools in my security belt and I'm excited to see what comes next.

- -- 
- -------
Jason 'XenoPhage' Frisvold
xenoph...@godshell.com
- ---
"Any sufficiently advanced magic is indistinguishable from technology."
- - Niven's Inverse of Clarke's Third Law
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.14 (GNU/Linux)
Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org/

iEYEARECAAYFAky8YpIACgkQ8CjzPZyTUTSjBQCfU6CktgMZi429b7YWbDi+6Hzd
2XQAn0A95nqcwYce+Wu4TP6bzQb5QSoh
=2SNm
-END PGP SIGNATURE-


Re: [ossec-list] 2WoO Day 2: Abusing OSSEC

2010-10-18 Thread Jason &#x27;XenoPhage'; Frisvold
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 10/18/2010 08:33 AM, Michael Starks wrote:
> http://www.immutablesecurity.com/index.php/2010/10/18/2woo-day-2-abusing-ossec/

Any my contribution for the day is here :

http://blog.godshell.com/blog/archives/273-WoO-Day-2-In-The-Beginning-html

- -- 
- ---
Jason 'XenoPhage' Frisvold
xenoph...@godshell.com
- ---
"Any sufficiently advanced magic is indistinguishable from technology."
- - Niven's Inverse of Clarke's Third Law
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.14 (GNU/Linux)
Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org/

iEYEARECAAYFAky8XQ0ACgkQ8CjzPZyTUTSXywCgpjDrbEqhlDKtCVDy6VJbkwUk
+OIAoJDWC6EDafz6MXv5Skfo5Dt09ciP
=kdgo
-END PGP SIGNATURE-


  1   2   >