I have discovered a serious problem with the subject rules. here is the result
running ossec-logtest:

-- 
Dennis Golden2010/01/21 09:49:16 ossec-testrule: INFO: Started (pid: 20196).
ossec-testrule: Type one log per line.



**Phase 1: Completed pre-decoding.
       full event: 'Jan 20 21:45:23 dg-linux2 sshd[29397]: reverse mapping
checking getaddrinfo for 115.118.6.19.static-ttsl-hyderabad.vsnl.net.in
[115.118.6.19] failed - POSSIBLE BREAK-IN ATTEMPT!'
       hostname: 'dg-linux2'
       program_name: 'sshd'
       log: 'reverse mapping checking getaddrinfo for
115.118.6.19.static-ttsl-hyderabad.vsnl.net.in [115.118.6.19] failed - POSSIBLE
BREAK-IN ATTEMPT!'

**Phase 2: Completed decoding.
       decoder: 'sshd'
       srcip: '115.118.6.19.static-ttsl-hyderabad.vsnl.net.in'

**Phase 3: Completed filtering (rules).
       Rule id: '5702'
       Level: '5'
       Description: 'Reverse lookup error (bad ISP or attack).'
**Alert to be generated.

Needless to say that if active response tries to use the address that has
already failed it will also fail; therefore, the attack can continue forever.

Dennis
--
Golden Consulting Services, Inc.

Reply via email to