I have a recently new setup - within the last week.
It is now sending the alert on the brute force FTP login attempt, which I asked 
about early.
The Active Response also seems to be working to add an entry to the server 
routing table with a gateway address set to the same address as the interface 
on the server.

But a few seconds after the null route was added automatically, I was still 
able to login via FTP from the IP I was using with the multiple bad logins.

So, it seems as though OSSec is doing what I'm expecting it to do, but I'm not 
blocked from logging in still.

I was thinking this could be because of having multiple IP addresses on the 
NIC, but even when using IP address specifically when trying to login (the same 
IP address that had the route entry added), it still lets me then login from 
the source ip that I'm thinking should be blocked.

Any ideas on why I can still login?
The route entry added is similar to:

Network Destination | Netmask | Gateway | Interface | Metric
10.100.100.10 | 255.255.255.255 | 192.168.20.10 | 192.168.20.10 | 1

where 10.100.100.10 is an internal host, going through a PIX to the Windows IIS 
server on a DMZ. Windows IIS server has the OSSec agent.
192.168.20.10 is the IIS interface and the IP address OSSec knows about.

But even when this null route is set, I can ftp from the 10.100.100.10 server 
to the 192.168.20.10 server and get successfully logged in.

TIA for any help,

Greg

Reply via email to