On Mon, Mar 5, 2012 at 1:04 PM, dan (ddp) <[email protected]> wrote:
> On Mon, Mar 5, 2012 at 6:09 AM, C. L. Martinez <[email protected]> wrote:
>> On Mon, Mar 5, 2012 at 11:49 AM, dan (ddp) <[email protected]> wrote:
>>> I should probably mention that I think the -a flag for ossec-logtest
>>> will give you OSSEC alert log output. Redirect that to a file or
>>> possibly to ossec-reportd, and you should probably get what you're
>>> after.
>>>
>>
>> Thanks Dan. It is correct, cp.logs is in ossec alert format. For example:
>>
>> ** Alert 1330945041.114: - firewall,
>> 2012 Mar 05 10:57:21 ossecsrv->stdin
>> Rule: 100100 (level 2) -> 'CheckPoint Firewall-1 rules grouped.'
>> Src IP: 192.168.1.7
>> Dst IP: 192.168.2.3
>> Dst Port: domain-udp
>> "113" "26Feb2012" "23:59:04" "bond0.30" "CHCKPNT1" "Log" "Drop"
>> "domain-udp" "47082" "192.168.1.7" "192.168.2.3" "udp" "82" ""
>> "82-Standard" "" "inzone: Internal; outzone: Internal; service_id:
>> domain-udp" "VPN-1 Power/UTM" "" ""
>>
>> doesn't trigger alert 100101 instead of 100100 ...
>
> It doesn't trigger 100101 because action isn't decoded.
Uhhmmm .. wait a minute. Action is decoded using these decoders:
<decoder name="custom-checkpoint-fw">
<prematch>"\d+" "\d+\w+\d+" "\d+:\d+:\d+" "(\S+)" "FW-INT-CHCKPNT1"</prematch>
</decoder>
<decoder name="custom-checkpoint-fw-tcp-udp-icmp">
<parent>custom-checkpoint-fw</parent>
<regex offset="after_parent">"\w+" "(\w+)" "(\S+)" "\S+" "(\S+)"
"(\S+)" "(\w+)" "\S+" "" "(\S+)"</regex>
<order>action,dstport,srcip,dstip,protocol,extra_data</order>
</decoder>
<decoder name="custom-checkpoint-fw-tcp-udp-icmp">
<parent>custom-checkpoint-fw</parent>
<regex offset="after_regex">"\w+" "(\w+)" "" "" "(\S+)" "(\S+)"
"(\w+)" "" "" "" "" "(\.+)"</regex>
<order>action,srcip,dstip,protocol,extra_data</order>
</decoder>
<decoder name="custom-checkpoint-fw-tcp-udp-icmp">
<parent>custom-checkpoint-fw</parent>
<regex offset="after_regex">"\w+" "(\w+)" "\S+" "\S+" "(\S+)"
"(\S+)" "(\w+)" "" "" "" "" "(\.+)"</regex>
<order>action,srcip,dstip,protocol,extra_data</order>
</decoder>
for example:
**Phase 1: Completed pre-decoding.
full event: '"629" "26Feb2012" "23:59:21" "bond0.30" "CHCKPNT1"
"Log" "Drop" "http" "4419" "192.168.1.15"
"trafficconverter-sinkhole.sie.isc.org" "tcp" "106" "" "106-Standard"
"" "service_id: http" "VPN-1 Power/UTM" "" ""'
hostname: 'ossecsrv'
program_name: '(null)'
log: '"629" "26Feb2012" "23:59:21" "bond0.30" "CHCKPNT1" "Log"
"Drop" "http" "4419" "192.168.1.15"
"trafficconverter-sinkhole.sie.isc.org" "tcp" "106" "" "106-Standard"
"" "service_id: http" "VPN-1 Power/UTM" "" ""'
**Phase 2: Completed decoding.
decoder: 'custom-checkpoint-fw'
action: 'Drop'
dstport: 'http'
srcip: '192.168.1.15'
dstip: 'trafficconverter-sinkhole.sie.isc.org'
proto: 'tcp'
extra_data: '106-Standard'
**Rule debugging:
Trying rule: 1 - Generic template for all syslog rules.
*Rule 1 matched.
*Trying child rules.
Trying rule: 100100 - CheckPoint Firewall-1 rules grouped.
*Rule 100100 matched.
*Trying child rules.
Trying rule: 100101 - CheckPoint Firewall-1 action event.
**Phase 3: Completed filtering (rules).
Rule id: '100100'
Level: '0'
Description: 'CheckPoint Firewall-1 rules grouped.'
Or do I need to decode log in rules file too??