I have ossec agents running on several machines, but only one of them
("agent 001") is set in the server's ossec.config to allow active response.
The <active-response> section in my server's ossec.config is pasted at the
bottom of this message, since someone is sure to ask for it otherwise.
This appeared to have been working fine. However, recently "agent 001"
began blocking traffic from "agent 002." I was able to quickly resolve this
by adding a <white_list> entry. When I started looking at logs to find out
exactly what rule "agent 002" had triggered, I found that "agent 002" was
nowhere in ossec's alert or active-response logs as a source IP sending
traffic to "agent 001." Where "agent 002" did appear in the logs, having
triggered an alert, it was because a problem in apache on that server had
caused it to appear to be attacking itself, triggering a level 6 rule
multiple times.
So here is my question: *Am I missing something, or is active response,
although firing only on "agent 001," responding to alerts generated on
"agent 002"?* Having "agent 002" whitelisted should prevent today's
problem, but I don't want iptables on "agent 001" blocking addresses that
don't need to be blocked. I will greatly appreciate any clarity you can
offer.
<active-response>
<disabled>no</disabled>
<command>firewall-drop</command>
<location>defined-agent</location>
<agent_id>001</agent_id>
<level>6</level>
<timeout>600</timeout>
</active-response>