Hi...

Sorry for the delay...

First of all, thank you for your help. But there must be smth I don't
understand : I've added a rule that works with ossec-logtest, but I
can't see any alerts in the ossec logs. What's wrong ?

For information, when using ossec-logtest, I got the message :

**Phase 3: Completed filtering (rules).
       Rule id: '500001'
       Level: '10'
       Description: 'Casper badness'
**Alert to be generated.

But nothing in the logs, and no active response (though I guess that a
10-level alert should fire the host-deny response). Again, thank you
for your help !

On 4 juil, 21:36, "dan (ddp)" <[email protected]> wrote:
> On Sun, Jul 4, 2010 at 10:50 AM, Janiko <[email protected]> wrote:
> > Hi,
>
> > I'm using ossec, I never had to add a custom rule until now, so I need
> > help from the community.
>
> > I (and I guess I'm not alone...) need to block a specific kind of http
> > request, that looks like this :
>
> > 87.229.22.22 - - [04/Jul/2010:18:44:53 +0400] "POST /blog-perso%20%20/
> > contact.php HTTP/1.1" 404 1449 "-" "Casper Bot Search"
> > 87.229.22.22 - - [04/Jul/2010:18:44:53 +0400] "POST /blog-perso%20%20/
> > contact.php HTTP/1.1" 404 1449 "-" "Casper Bot Search"
> > 87.229.22.22 - - [04/Jul/2010:18:44:53 +0400] "POST /blog-perso%20%20/
> > contact.php HTTP/1.1" 404 1449 "-" "Casper Bot Search"
> > 87.229.22.22 - - [04/Jul/2010:18:44:53 +0400] "POST /blog-perso%20%20/
> > contact.php HTTP/1.1" 404 1449 "-" "Casper Bot Search"
>
> > In fact, the only specific thing about this kind of request (except
> > flooding servers) is the referrer "Casper Bot Search". So what could
> > be the rule to stop that (I only know that this rule should be added
> > in local_rules.xml).
>
> > Thank you in advance for your help !
>
> > - Janiko
>
> -------Before the rule is added---------
> # ./ossec-logtest
> 2010/07/04 15:31:30 ossec-testrule: INFO: Started (pid: 7691).
> ossec-testrule: Type one log per line.
>
> 87.229.22.22 - - [04/Jul/2010:18:44:53 +0400] "POST
> /blog-perso%20%20/contact.php HTTP/1.1" 404 1449 "-" "Casper Bot
> Search"
>
> **Phase 1: Completed pre-decoding.
>        full event: '87.229.22.22 - - [04/Jul/2010:18:44:53 +0400]
> "POST /blog-perso%20%20/contact.php HTTP/1.1" 404 1449 "-" "Casper Bot
> Search"'
>        hostname: 'ix'
>        program_name: '(null)'
>        log: '87.229.22.22 - - [04/Jul/2010:18:44:53 +0400] "POST
> /blog-perso%20%20/contact.php HTTP/1.1" 404 1449 "-" "Casper Bot
> Search"'
>
> **Phase 2: Completed decoding.
>        decoder: 'web-accesslog'
>        srcip: '87.229.22.22'
>        url: '/blog-perso%20%20/contact.php'
>        id: '404'
>
> **Phase 3: Completed filtering (rules).
>        Rule id: '31101'
>        Level: '5'
>        Description: 'Web server 400 error code.'
> **Alert to be generated.
>
> ------rule-------
>   <rule id="500001" level="10">
>     <if_sid>31101</if_sid>
>     <match>Casper Bot Search</match>
>     <description>Casper badness</description>
>   </rule>
>
> ------after adding the rule------
> # ./ossec-logtest
> 2010/07/04 15:34:33 ossec-testrule: INFO: Started (pid: 12157).
> ossec-testrule: Type one log per line.
>
> 87.229.22.22 - - [04/Jul/2010:18:44:53 +0400] "POST
> /blog-perso%20%20/contact.php HTTP/1.1" 404 1449 "-" "Casper Bot
> Search"
>
> **Phase 1: Completed pre-decoding.
>        full event: '87.229.22.22 - - [04/Jul/2010:18:44:53 +0400]
> "POST /blog-perso%20%20/contact.php HTTP/1.1" 404 1449 "-" "Casper Bot
> Search"'
>        hostname: 'ix'
>        program_name: '(null)'
>        log: '87.229.22.22 - - [04/Jul/2010:18:44:53 +0400] "POST
> /blog-perso%20%20/contact.php HTTP/1.1" 404 1449 "-" "Casper Bot
> Search"'
>
> **Phase 2: Completed decoding.
>        decoder: 'web-accesslog'
>        srcip: '87.229.22.22'
>        url: '/blog-perso%20%20/contact.php'
>        id: '404'
>
> **Phase 3: Completed filtering (rules).
>        Rule id: '500001'
>        Level: '10'
>        Description: 'Casper badness'
> **Alert to be generated.
>
> You may have to adjust the rule a bit. To do the blocking, add an
> active response that blocks the srcip returned by this rule.

Reply via email to