On Mon, 2009-10-26 at 17:08 -0700, Victor wrote:
> Hi all,
> I'm trying out OSSEC for the first time and was pleasantly surprised
> by how easy it is to use and set up.  However, I've come across a
> problem I'm not sure how to address - I run linux-vserver, and because
> of this, OSSEC sends a lot of these alerts:
> 
> Received From: (lab07.lab) 192.168.2.107->rootcheck
> Rule: 510 fired (level 7) -> "Host-based anomaly detection event
> (rootcheck)."
> Portion of the log(s):
> 
> Port '33916'(tcp) hidden. Kernel-level rootkit or trojaned version of
> netstat.
> 
> I found a previous post, and the answer back then was just to disable
> rootkit detection:
> http://www.mail-archive.com/[email protected]/msg00011.html
> 
> Is this still the only way to get around this netstat error in OSSEC?
> 
> Thanks,
> Victor
Hello, Victor.  If I recall correctly, that error is simply a
consequence of the way VServer guests work (although I'm quite rusty on
the details).  We disabled it with a rule which reads:

  <!--We will need a rule in /usr/local/ossec/rules/local_rules.xml to
disregard
  netstat hidden port alerts on vserver guests as follows.  Subsequent
  vserver guests will each need a hostname entry: -->
    <rule id="100005" level="0">
     <if_sid>510</if_sid>
     <hostname>name1</hostname>
     <hostname>name2</hostname>
     <hostname>name3</hostname>
     <regex>tcp.*hidden.*netstat</regex>
     <description>Stop netstat rootkit alerts
     on vserver guests</description>
    </rule>

In our case, we decided to do all OSSEC monitoring from the VServer
host.  The only service we wanted to activate was rootkit which I
believe also comes in a standalone version.  Unfortunately, in our
version of the kernel (needed to deal with a critical iSCSI bug),
rootkit causes kernel panics so we are not using it.  Hope this helps -
John
-- 
John A. Sullivan III
Open Source Development Corporation
+1 207-985-7880
[email protected]

http://www.spiritualoutreach.com
Making Christianity intelligible to secular society

Reply via email to