Hi, in the agent you must to enable active-response:
<active-response><disabled>no</disabled></active-response> Then, restart the agent, generate the 100101 rule, and check out the *active-response.log* of the agent. I hope it helps. On Tuesday, July 4, 2017 at 4:26:27 AM UTC+2, Tunguyen wrote: > > I've checked the ossec.conf on server side and agent side, those are all > the same as yours > Here is the agent side: > <active-response> > <repeated_offenders>20,40,60</repeated_offenders> > </active-response> > > And the server side is same as above, except that i add > <repeated_offenders> like this: > <active-response> > <command> firewall-drop </ command> > <location> all </ location> > <rules_id> 100101 </ rules_id> > <time-out> 600 </ timeout> > <repeated_offenders>20,40,60</repeated_offenders> > </ active-response> > > But the response still doesn't work. > Hmm active-response used to work well, but after a day without changing > anything, it doesn't work anymore :( > > On Monday, July 3, 2017 at 5:20:35 PM UTC+7, Fredrik Hilmersson wrote: >> >> Sorry for the 'spam' hehe, just checked my configuration once more and >> the active response section you refer to is that the original response >> setting? Make sure to have the following within your ossec.conf (server >> side): >> >> <active-response> >> >> <!-- Firewall Drop response. Block the IP for >> >> - 600 seconds on the firewall (iptables, >> >> - ipfilter, etc). >> >> --> >> >> <command>firewall-drop</command> >> >> <location>all</location> >> >> <level>6</level> >> >> <timeout>600</timeout> >> >> <repeated_offenders>30,60,120,240,480</repeated_offenders> >> >> </active-response> >> >> <active-response> >> >> <command>firewall-drop</command> >> >> <location>all</location> >> >> <rules_id>100101</rules_id> >> >> </active-response> >> >> >> >> >> Den måndag 3 juli 2017 kl. 12:15:08 UTC+2 skrev Fredrik Hilmersson: >>> >>> ossec.conf on the AGENT side, forgot to mention! >>> >>> Den måndag 3 juli 2017 kl. 12:14:30 UTC+2 skrev Fredrik Hilmersson: >>>> >>>> Hey, I had a similar issue with the active response not working as >>>> intended. The way I solved it was to add the following to the ossec.conf >>>> >>>> <ossec_config> >>>> >>>> <client> >>>> >>>> <server-ip>ossec-server</server-ip> >>>> >>>> </client> >>>> >>>> <active-response> >>>> >>>> <repeated_offenders>30,60,120,240,480</repeated_offenders> >>>> >>>> </active-response> >>>> >>>> <global> >>>> >>>> <email_notification>no</email_notification> >>>> >>>> </global> >>>> >>>> kind regards, >>>> Fredrik >>>> >>>> Den måndag 3 juli 2017 kl. 12:05:36 UTC+2 skrev Tunguyen: >>>>> >>>>> My rule fired, i received alert emails too. But active-response >>>>> doesn't work. >>>>> >>>>> Here is my active-response config in ossec.conf: >>>>> >>>>> <active-response> >>>>> <command>firewall-drop</command> >>>>> <location>all</location> >>>>> <rules_id>100101</rules_id> >>>>> <timeout>600</timeout> >>>>> </active-response> >>>>> >>>>> Here is my email alert: >>>>> >>>>> Received From: ubuntu-server->/var/log/nginx/access.log Rule: 100101 >>>>> fired (level 9) -> “Multiple access in a short time from same IP” Portion >>>>> of the log(s): >>>>> >>>>> 118.70.116.148 – tu_nguyen [03/Jul/2017:16:46:27 +0700] “GET / >>>>> HTTP/1.1” 200 396 “-” “Mozilla/5.0 (Windows NT 10.0; Win64; x64) >>>>> AppleWebKit/537.36 (KHTML, like Gecko) Chrome/59.0.3071.115 >>>>> Safari/537.36” >>>>> >>>>> 118.70.116.148 – tu_nguyen [03/Jul/2017:16:46:26 +0700] “GET / >>>>> HTTP/1.1” 200 396 “-” “Mozilla/5.0 (Windows NT 10.0; Win64; x64) >>>>> AppleWebKit/537.36 (KHTML, like Gecko) Chrome/59.0.3071.115 >>>>> Safari/537.36” >>>>> >>>>> 118.70.116.148 – tu_nguyen [03/Jul/2017:16:46:25 +0700] “GET / >>>>> HTTP/1.1” 200 396 “-” “Mozilla/5.0 (Windows NT 10.0; Win64; x64) >>>>> AppleWebKit/537.36 (KHTML, like Gecko) Chrome/59.0.3071.115 >>>>> Safari/537.36” >>>>> >>>>> 118.70.116.148 – tu_nguyen [03/Jul/2017:16:46:25 +0700] “GET / >>>>> HTTP/1.1” 200 396 “-” “Mozilla/5.0 (Windows NT 10.0; Win64; x64) >>>>> AppleWebKit/537.36 (KHTML, like Gecko) Chrome/59.0.3071.115 >>>>> Safari/537.36” >>>>> >>>>> 118.70.116.148 – tu_nguyen [03/Jul/2017:16:46:24 +0700] “GET / >>>>> HTTP/1.1” 200 396 “-” “Mozilla/5.0 (Windows NT 10.0; Win64; x64) >>>>> AppleWebKit/537.36 (KHTML, like Gecko) Chrome/59.0.3071.115 >>>>> Safari/537.36” >>>>> >>>>> 118.70.116.148 – tu_nguyen [03/Jul/2017:16:46:23 +0700] “GET / >>>>> HTTP/1.1” 200 396 “-” “Mozilla/5.0 (Windows NT 10.0; Win64; x64) >>>>> AppleWebKit/537.36 (KHTML, like Gecko) Chrome/59.0.3071.115 >>>>> Safari/537.36” >>>>> >>>>> 118.70.116.148 – tu_nguyen [03/Jul/2017:16:46:23 +0700] “GET / >>>>> HTTP/1.1” 200 396 “-” “Mozilla/5.0 (Windows NT 10.0; Win64; x64) >>>>> AppleWebKit/537.36 (KHTML, like Gecko) Chrome/59.0.3071.115 Safari/537.36” >>>>> >>>>> >>>>> After receiving this alert message, my IP hasn't been blocked and I >>>>> still can send bunch of requests to the server. And when i checked >>>>> /var/ossec/logs/active-responses.log, it was empty. No IP has been block. >>>>> Can someone explain please? >>>>> >>>> -- --- You received this message because you are subscribed to the Google Groups "ossec-list" group. To unsubscribe from this group and stop receiving emails from it, send an email to ossec-list+unsubscr...@googlegroups.com. For more options, visit https://groups.google.com/d/optout.