Here is the listings fom the active responses.log
Thu Oct 12 11:35:00 MDT 2006 /var/ossec/active-response/bin/host-
deny.sh add - -
Thu Oct 12 11:51:08 MDT 2006 /var/ossec/active-response/bin/host-
deny.sh delete - -
Thu Oct 12 16:44:50 MDT 2006 /var/ossec/active-response/bin/host-
deny.sh add - -
Thu Oct 12 16:55:54 MDT 2006 /var/ossec/active-response/bin/host-
deny.sh delete - -
Thu Oct 12 20:49:07 MDT 2006 /var/ossec/active-response/bin/host-
deny.sh add - -
Mon Oct 16 15:17:45 MDT 2006 /var/ossec/active-response/bin/host-
deny.sh delete - -
######
Config
######
<rules>
<include>rules_config.xml</include>
<include>pam_rules.xml</include>
<include>sshd_rules.xml</include>
<include>telnetd_rules.xml</include>
<include>syslog_rules.xml</include>
<include>arpwatch_rules.xml</include>
<include>pix_rules.xml</include>
<include>named_rules.xml</include>
<include>smbd_rules.xml</include>
<include>vsftpd_rules.xml</include>
<include>pure-ftpd_rules.xml</include>
<include>proftpd_rules.xml</include>
<include>hordeimp_rules.xml</include>
<include>vpopmail_rules.xml</include>
<include>web_rules.xml</include>
<include>apache_rules.xml</include>
<include>ids_rules.xml</include>
<include>squid_rules.xml</include>
<include>firewall_rules.xml</include>
<include>netscreenfw_rules.xml</include>
<include>postfix_rules.xml</include>
<include>sendmail_rules.xml</include>
<include>imapd_rules.xml</include>
<include>mailscanner_rules.xml</include>
<include>racoon_rules.xml</include>
<include>spamd_rules.xml</include>
<include>msauth_rules.xml</include>
<!-- <include>policy_rules.xml</include> -->
<include>attack_rules.xml</include>
<include>local_rules.xml</include>
<include>ossec_rules.xml</include>
</rules>
<syscheck>
<!-- Frequency that syscheck is executed - default every 2 hours
-->
<frequency>3600</frequency>
<!-- Directories to check (perform all possible verifications) -->
<directories check_all="yes">/etc,/usr/bin,/usr/sbin</directories>
<directories check_all="yes">/bin,/sbin</directories>
<!-- Files/directories to ignore -->
<ignore>/etc/mtab</ignore>
<ignore>/etc/mnttab</ignore>
<ignore>/etc/hosts.deny</ignore>
<ignore>/etc/mail/statistics</ignore>
<ignore>/etc/random-seed</ignore>
<ignore>/etc/adjtime</ignore>
<ignore>/etc/httpd/logs</ignore>
<ignore>/etc/utmpx</ignore>
<ignore>/etc/wtmpx</ignore>
<!-- Windows files to ignore -->
<ignore>C:\WINDOWS/System32/LogFiles</ignore>
<ignore>C:\WINDOWS/WindowsUpdate.log</ignore>
<ignore>C:\WINDOWS/system32/wbem/Logs</ignore>
<ignore>C:\WINDOWS/Prefetch</ignore>
<ignore>C:\WINDOWS/PCHEALTH/HELPCTR/DataColl</ignore>
<ignore>C:\WINDOWS/SoftwareDistribution/DataStore</ignore>
<ignore>C:\WINDOWS/SoftwareDistribution/ReportingEvents.log</
ignore>
<ignore>C:\WINDOWS/Temp</ignore>
<ignore>C:\WINDOWS/system32/config/systemprofile/Local Settings</
ignore>
<ignore>C:\WINDOWS/system32/config</ignore>
</syscheck>
<rootcheck>
<rootkit_files>/var/ossec/etc/shared/rootkit_files.txt</
rootkit_files>
<rootkit_trojans>/var/ossec/etc/shared/rootkit_trojans.txt</
rootkit_trojans>
</rootcheck>
<command>
<name>host-deny</name>
<executable>host-deny.sh</executable>
<expect>scrip</expect>
<timeout_allowed>yes</timeout_allowed>
</command>
<active-response>
<!-- This response is going to execute the host-deny
- command for every event that fires a rule with
- level (severity) >= 10.
- The IP is going to be blocked for 30 seconds.
-->
<command>host-deny</command>
<location>local</location>
<level>10</level>
<timeout>86400</timeout>
</active-response>
<alerts>
<log_alert_level>1</log_alert_level>
<email_alert_level>7</email_alert_level>
</alerts>
<!-- Files to monitor (localfiles) -->
<localfile>
<log_format>syslog</log_format>
<location>/var/log/messages</location>
</localfile>
<localfile>
<log_format>syslog</log_format>
<location>/var/log/secure</location>
</localfile>
<localfile>
<log_format>syslog</log_format>
<location>/var/log/maillog</location>
</localfile>
</ossec_config>
On Oct 18, 2006, at 4:34 PM, Daniel Cid wrote:
>
> Hi Leif,
>
> If you are seeing the file being touched, it is because ossec is
> acessing it.
> However, by default, ossec will remove the block after 10 minutes. You
> mentioned you change the timeout to 24 hours, can you show us your
> ossec.conf file? In addition to that, ossec logs all responses at
> /var/ossec/active-response/ossec-hids-responses.log . Do you see
> any entry in there? Is there anything at /var/ossec/logs/ossec.log
> that indicates an error ?
>
> Thanks,
>
> --
> Daniel B. Cid
> dcid ( at ) ossec.net
>
> On 10/18/06, Leif Kennedy <[EMAIL PROTECTED]> wrote:
>>
>> Hello,
>> I have have version 0.9.2 of Ossec and am having issues with address
>> not being added to hosts.deny when an active response is triggered.
>> I have the active respnse setup to fire the host.deny command at
>> level 10
>> I am seeing the /etc/hosts.deny file being touched at that time but
>> no entries are being added.
>> I have the timeout set for 24 hrs
>> Any help would be appreciated
>> Received From: *->/var/log/secure
>> Rule: 5712 fired (level 10) -> "SSHD brute force trying to get access
>> to the system."
>> Portion of the log(s):
>>
>> sshd[17033]: Failed password for invalid user admin from ::ffff:
>> 82.77.140.41 port 62783 ssh2
>> sshd[17033]: Invalid user admin from ::ffff:82.77.140.41
>> sshd[17031]: Failed password for invalid user fluffy from ::ffff:
>> 82.77.140.41 port 62619 ssh2
>> sshd[17031]: Invalid user fluffy from ::ffff:82.77.140.41
>> sshd[17029]: Failed password for invalid user slasher from ::ffff:
>> 82.77.140.41 port 62485 ssh2
>> sshd[17029]: Invalid user slasher from ::ffff:82.77.140.41
>> sshd[17025]: Failed password for invalid user sifak from ::ffff:
>> 82.77.140.41 port 62357 ssh2
>>
>>