For the following logs:
May  7 09:50:46 Server su(pam_unix)[17639]: authentication failure;
logname=username uid=500 euid=0 tty=pts/0 ruser=username rhost=
user=root
May  7 09:53:29 server su: pam_unix(su-l:auth): authentication
failure; logname=username uid=504 euid=0 tty=pts/0 ruser=username
rhost=  user=root

the following rules give the same output:
<!-- Catch and treat su events logged by PAM on CentOS/RHEL -->
  <rule id="100002" level="0" noalert="1">
    <if_sid>5500</if_sid>
  </rule>

  <rule id="100003" level="9">
    <if_sid>100002</if_sid>
    <match>authentication fail</match>
    <description>SU session to root attempted.</description>
    <group>authentication_failure,</group>
  </rule>

  <rule id="100004" level="9">
    <if_sid>100002</if_sid>
    <match>session opened</match>
    <description>SU session to root openned.</description>
    <group>authentication_success,</group>
  </rule>

  <rule id="100005" level="9">
    <if_sid>100002</if_sid>
    <match>session closed</match>
    <description>SU session to root closed.</description>
    <group>authentication_success,</group>
  </rule>

  <rule id="100006" level="0" noalert="1">
    <program_name>su(pam_unix)</program_name>
    <match>authentication</match>
    <description>su collection</description>
  </rule>

  <!--May  7 09:50:46 Server su(pam_unix)[17639]: authentication
failure; logname=username uid=500 euid=0 tty=pts/0 ruser=username
rhost=  user=root-->
  <rule id="100007" level="10">
    <if_sid>100006</if_sid>
    <match>failure</match>
    <description>blahblah</description>
  </rule>


# /var/ossec/bin/ossec-logtest -D . -c etc/ossec.conf
2010/05/11 19:30:41 ossec-testrule: INFO: Started (pid: 28267).
ossec-testrule: Type one log per line.

May  7 09:50:46 Server su(pam_unix)[17639]: authentication failure;
logname=username uid=500 euid=0 tty=pts/0 ruser=username rhost=
user=root


**Phase 1: Completed pre-decoding.
       full event: 'May  7 09:50:46 Server su(pam_unix)[17639]:
authentication failure; logname=username uid=500 euid=0 tty=pts/0
ruser=username rhost=  user=root'
       hostname: 'Server'
       program_name: 'su(pam_unix)'
       log: 'authentication failure; logname=username uid=500 euid=0
tty=pts/0 ruser=username rhost=  user=root'

**Phase 2: Completed decoding.
       decoder: 'pam'

**Phase 3: Completed filtering (rules).
       Rule id: '100003'
       Level: '9'
       Description: 'SU session to root attempted.'
**Alert to be generated.


May  7 09:53:29 server su: pam_unix(su-l:auth): authentication
failure; logname=username uid=504 euid=0 tty=pts/0 ruser=username
rhost=  user=root


**Phase 1: Completed pre-decoding.
       full event: 'May  7 09:53:29 server su: pam_unix(su-l:auth):
authentication failure; logname=username uid=504 euid=0 tty=pts/0
ruser=username rhost=  user=root'
       hostname: 'server'
       program_name: 'su'
       log: 'pam_unix(su-l:auth): authentication failure;
logname=username uid=504 euid=0 tty=pts/0 ruser=username rhost=
user=root'

**Phase 2: Completed decoding.
       decoder: 'pam'

**Phase 3: Completed filtering (rules).
       Rule id: '100003'
       Level: '9'
       Description: 'SU session to root attempted.'
**Alert to be generated.





On Tue, May 11, 2010 at 2:53 PM, Nicholas Ritter <[email protected]> wrote:
> The matching does not seem to work regardless of what I put it in.
>

Reply via email to