Am 31.07.2012 17:56, schrieb dan (ddp):
On Tue, Jul 31, 2012 at 11:49 AM, ChristianB
<[email protected]>  wrote:
Hello all,

I now have my local installation of OSSEC working and integrated with my
running services. So far it's working really good. There is still one thing
that is not really working. I set up email notifications for active response
rules in my ossec.conf like this:
<email_alerts>
     <email_to>[email protected]</email_to>
     <rule_id>601, 602</rule_id>
     <do_not_delay />
     <do_not_group />
</email_alerts>

I also tried using the<rule_group>  tag but this also didn't work. Every
other notification is correctly send (ossec start and everything above level
7). For the meantime I want to have all active_response action send to me
immediately to finetune the system.

And before you ask. Yes I checked with analogi that there where indeed
alerts triggering rules 601 and 602. I also have a minimal local_rules.xml
(Listen ports warning and load average warning) and an extended ar_log
decoder in my local_decoder.xml (added German weekdays to the regex).

Regards
Christian
What is your email_alert_level set to? 601 is only a level 3, so if
it's set higher than that you shouldn't expect email notification.
email_alert_level is set to 7. But I don't really want to lower this just get 
the ar notifications on top. I thought that for individual email notifications 
this alert level is ignored. As it is a global setting I will overwrite the 
rules in question and set the level to 7 for the meantime.

I added this to my rules/local_rules.xml file:

<group name="ossec,">
  <rule id="601" level="7" overwrite="yes">
    <if_sid>600</if_sid>
    <action>firewall-drop.sh</action>
    <status>add</status>
<description>Host Blocked by firewall-drop.sh Active Response</description>
    <group>active_response,</group>
  </rule>

  <rule id="602" level="7" overwrite="yes">
    <if_sid>600</if_sid>
    <action>firewall-drop.sh</action>
    <status>delete</status>
<description>Host Unblocked by firewall-drop.sh Active Response</description>
    <group>active_response,</group>
  </rule>
</group>

And this had some sideeffects you should know about. Rule 601 was triggered by rule 3306 last night resulting in:

-----------------------------------------------------------------------
** Alert 1343766114.30760: mail  - ossec,active_response,
2012 Jul 31 22:21:54 SERVER->/var/local/ossec/logs/active-responses.log
Rule: 601 (level 7) -> 'Host Blocked by firewall-drop.sh Active Response'
Src IP: 118.161.77.138
Di 31. Jul 22:21:52 CEST 2012 /var/local/ossec/active-response/bin/firewall-drop.sh add - 118.161.77.138 1343766112.29613 3306

** Alert 1343766744.31117: mail  - ossec,active_response,
2012 Jul 31 22:32:24 SERVER->/var/local/ossec/logs/active-responses.log
Rule: 602 (level 7) -> 'Host Unblocked by firewall-drop.sh Active Response'
Src IP: 118.161.77.138
Di 31. Jul 22:32:24 CEST 2012 /var/local/ossec/active-response/bin/firewall-drop.sh delete - 118.161.77.138 1343766112.29613 3306
-----------------------------------------------------------------------

Everything fine till here, but now it's getting weird. The unblocking for rule 3306 triggered a new block because of rule 602. And this repeats every 10 minutes (the configured intervall for blocking)

-----------------------------------------------------------------------
** Alert 1343766746.31479: mail  - ossec,active_response,
2012 Jul 31 22:32:26 SERVER->/var/local/ossec/logs/active-responses.log
Rule: 601 (level 7) -> 'Host Blocked by firewall-drop.sh Active Response'
Src IP: 118.161.77.138
Di 31. Jul 22:32:24 CEST 2012 /var/local/ossec/active-response/bin/firewall-drop.sh add - 118.161.77.138 1343766744.31117 602

** Alert 1343767377.32437: mail  - ossec,active_response,
2012 Jul 31 22:42:57 SERVER->/var/local/ossec/logs/active-responses.log
Rule: 602 (level 7) -> 'Host Unblocked by firewall-drop.sh Active Response'
Src IP: 118.161.77.138
Di 31. Jul 22:42:57 CEST 2012 /var/local/ossec/active-response/bin/firewall-drop.sh delete - 118.161.77.138 1343766744.31117 602

** Alert 1343767379.32798: mail  - ossec,active_response,
2012 Jul 31 22:42:59 SERVER->/var/local/ossec/logs/active-responses.log
Rule: 601 (level 7) -> 'Host Blocked by firewall-drop.sh Active Response'
Src IP: 118.161.77.138
Di 31. Jul 22:42:57 CEST 2012 /var/local/ossec/active-response/bin/firewall-drop.sh add - 118.161.77.138 1343767377.32437 602

** Alert 1343768010.33154: mail  - ossec,active_response,
2012 Jul 31 22:53:30 SERVER->/var/local/ossec/logs/active-responses.log
Rule: 602 (level 7) -> 'Host Unblocked by firewall-drop.sh Active Response'
Src IP: 118.161.77.138
Di 31. Jul 22:53:30 CEST 2012 /var/local/ossec/active-response/bin/firewall-drop.sh delete - 118.161.77.138 1343767377.32437 602

** Alert 1343768012.33515: mail  - ossec,active_response,
2012 Jul 31 22:53:32 SERVER->/var/local/ossec/logs/active-responses.log
Rule: 601 (level 7) -> 'Host Blocked by firewall-drop.sh Active Response'
Src IP: 118.161.77.138
-----------------------------------------------------------------------

I then commented out the rule 602 overwrite in local_rules.xml and this endless flood of alerts was stopped. Just posting so you know this didn't really work as expected. I still think that individual email notifications should not be influenced by email_alert_level. Maybe someone can pass this to the developers.

Regards
Christian

Reply via email to