Hi, 

You need to set the "frequency" attribute in rule 5712 to "1", this 
attribute set the number of time (+2) that a rule needs to match to fire an 
alert, by default the 5712 will show an alert when the 5710 appears at 
least 8 times, changing to "1" will fire at 3th attempt. Please check 
http://ossec-docs.readthedocs.io/en/latest/syntax/head_rules.html

I hope it helps.

Regards

On Wednesday, June 28, 2017 at 11:06:44 PM UTC-4, az...@51ecommerce.com 
wrote:
>
> HI,
>
> I set the email notify level to 3, and try to login into serverA through 
> ssh, It's work, I receive the email alert.
>
> Thank you!
>
> And I've other question, I want block the user ip when the user login 
> failed more then 3 times with ssh, then block the ip of user, I use 5712, 
> but it did not work, I've try to login failed more then 10, it still do not 
> block me.
> here is my active-response in ossec.conf
>
> <active-response>
>
>         <disabled>no</disabled>
>
>         <command>firewall-drop</command>
>
>         <location>local</location>
>
>         <rules_id>5712</rules_id>
>
>         <level>8</level>
>
>         <timeout>120</timeout>
>
>         <repeated_offenders>60,120,180</repeated_offenders>
>
>   </active-response>
>
>
> here is my 5710 and 5712 rule defines
>
>   <rule id="5710" level="5">
>
>     <if_sid>5700</if_sid>
>
>     <match>illegal user|invalid user</match>
>
>     <description>sshd: Attempt to login using a non-existent 
> user</description>
>
>     
> <group>invalid_login,authentication_failed,pci_dss_10.2.4,pci_dss_10.2.5,pci_dss_10.6.1,</group>
>
>   </rule>
>
>
>   <rule id="5711" level="0">
>
>     <if_sid>5700</if_sid>
>
>     <match>authentication failure; logname= uid=0 euid=0 tty=ssh|</match>
>
>     <match>input_userauth_request: invalid user|</match>
>
>     <match>PAM: User not known to the underlying authentication module for 
> illegal user|</match>
>
>     <match>error retrieving information about user</match>
>
>     <description>sshd: Useless/Duplicated SSHD message without a 
> user/ip.</description>
>
>   </rule>
>
>
>   <rule id="5712" level="10" frequency="6" timeframe="120" ignore="60">
>
>     <if_matched_sid>5710</if_matched_sid>
>
>     <description>sshd: brute force trying to get access to </description>
>
>     <description>the system.</description>
>
>     <same_source_ip />
>
>     
> <group>authentication_failures,pci_dss_11.4,pci_dss_10.2.4,pci_dss_10.2.5,</group>
>
>   </rule>
>
> On Thursday, June 29, 2017 at 2:19:23 AM UTC+8, migue...@wazuh.com wrote:
>>
>> Hi,
>>
>> The email notification is triggered when an alert reach or overpass the 
>> level defined in <email_alert_level> (by default is set to level 7), 
>> setting this option to level 3 will send you email notifications for 
>> successful logins attempts.
>>
>> *<email_alert_level> option reference:* 
>> http://ossec-docs.readthedocs.io/en/latest/syntax/head_ossec_config.alerts.html#element-email_alert_level
>> *Rules clasification:* 
>> http://ossec-docs.readthedocs.io/en/latest/manual/rules-decoders/rule-levels.html.
>>
>> I hope this could help you
>>
>> Best regards.
>>
>> On Wednesday, June 28, 2017 at 2:03:23 PM UTC-4, az...@51ecommerce.com 
>> wrote:
>>>
>>> hello, 
>>> I've setup the ossec server and agent in my serverS(server) and 
>>> serverA(agent), but when I login into serverA, I have not receive the email 
>>> alert, but if I change something in serverA, I can receive the email alert. 
>>> So, my question is: how to make a email alert when some one login into 
>>> system, like ssh, or ftp
>>>
>>

-- 

--- 
You received this message because you are subscribed to the Google Groups 
"ossec-list" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to ossec-list+unsubscr...@googlegroups.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to