Hello,

I have spent some time trying to eliminate noise from Snort logs (in 
particular, two events which are ok on a given server), but without a 
success.
Googling, reading manuals and experimenting didn't help much. Even enabling 
all debugs in /var/ossec/etc/internal_
options.conf didn't gave me any obvious clues to solution.

The problem is, that local rules exactly for Snort events fire very well 
and does the intended action only while running ossec-logtest tool.
When the OSSEC service is started normally, the local rule is not fired any 
more.

Could there be a problem with snort log format? In fact, it shouldn't, 
since if there were a problem with multiline format of snort alert file, 
there wouldn't be any osscec alert from snort file at all. But the point 
is, that standard alerts are there - only my custom alert is ignored.

I tried to do the similar thing with alerts from sshd, and in this case 
everything works as expected.

Two custom rules are as follows:

<group name="ids,">

  <rule id="100001" level="4">
    <if_sid>20100,20101</if_sid>
    <decoded_as>snort</decoded_as>
    <!-- [119:15:1] (http_inspect) OVERSIZE REQUEST-URI DIRECTORY
       - [119:16:1] (http_inspect) OVERSIZE CHUNK ENCODING
    -->
    <id>119:15:1|119:16:1</id>
    <description>Lower the level for some (http_inspect) 
events.</description>
  </rule>

</group> <!-- IDS -->

<group name="sshd,">

  <rule id="100099" level="5">
    <if_sid>5710</if_sid>
    <decoded_as>sshd</decoded_as>
    <description>IVARSG: rule intercepted, works fine!!!!.</description>
  </rule>

</group> <!-- IDS -->

Rule 100099 fires in both scenario - logtest and when ossec run as service, 
however, rule 100001 fires only when tested with logtest (rule while rule 
20101 also fires in both scenarios).

Could someone please suggest some solution?


See attached detailed info as suggested in "How do I troubleshoot ossec?" 
section (ip addresses and hostname is modified a little).

Thanks in advance for your time and help,
Ivars

-- 

--- 
You received this message because you are subscribed to the Google Groups 
"ossec-list" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
For more options, visit https://groups.google.com/groups/opt_out.


hostname:/var/ossec# /var/ossec/bin/ossec-analysisd -V

OSSEC HIDS v2.7 - Trend Micro Inc.

This program is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License (version 2) as
published by the Free Software Foundation. For more details, go to
http://www.ossec.net/main/license/


hostname:/var/ossec# cat /etc/ossec-init.conf
DIRECTORY="/var/ossec"
VERSION="v2.7"
DATE="Thu Jan 31 10:38:22 EET 2013"
TYPE="local"


hostname:/var/ossec# cat /var/ossec/etc/ossec.conf
<ossec_config>
  <global>
    <email_notification>yes</email_notification>
    <email_to>[email protected]</email_to>
    <smtp_server>localhost</smtp_server>
    <email_from>[email protected]</email_from>
  </global>

  <rules>
    <include>rules_config.xml</include>
    <include>pam_rules.xml</include>
    <include>sshd_rules.xml</include>
    <include>telnetd_rules.xml</include>
    <include>syslog_rules.xml</include>
    <include>arpwatch_rules.xml</include>
    <include>symantec-av_rules.xml</include>
    <include>symantec-ws_rules.xml</include>
    <include>pix_rules.xml</include>
    <include>named_rules.xml</include>
    <include>smbd_rules.xml</include>
    <include>vsftpd_rules.xml</include>
    <include>pure-ftpd_rules.xml</include>
    <include>proftpd_rules.xml</include>
    <include>ms_ftpd_rules.xml</include>
    <include>ftpd_rules.xml</include>
    <include>hordeimp_rules.xml</include>
    <include>roundcube_rules.xml</include>
    <include>wordpress_rules.xml</include>
    <include>cimserver_rules.xml</include>
    <include>vpopmail_rules.xml</include>
    <include>vmpop3d_rules.xml</include>
    <include>courier_rules.xml</include>
    <include>web_rules.xml</include>
    <include>web_appsec_rules.xml</include>
    <include>apache_rules.xml</include>
    <include>nginx_rules.xml</include>
    <include>php_rules.xml</include>
    <include>mysql_rules.xml</include>
    <include>postgresql_rules.xml</include>
    <include>ids_rules.xml</include>
    <include>squid_rules.xml</include>
    <include>firewall_rules.xml</include>
    <include>cisco-ios_rules.xml</include>
    <include>netscreenfw_rules.xml</include>
    <include>sonicwall_rules.xml</include>
    <include>postfix_rules.xml</include>
    <include>sendmail_rules.xml</include>
    <include>imapd_rules.xml</include>
    <include>mailscanner_rules.xml</include>
    <include>dovecot_rules.xml</include>
    <include>ms-exchange_rules.xml</include>
    <include>racoon_rules.xml</include>
    <include>vpn_concentrator_rules.xml</include>
    <include>spamd_rules.xml</include>
    <include>msauth_rules.xml</include>
    <include>mcafee_av_rules.xml</include>
    <include>trend-osce_rules.xml</include>
    <include>ms-se_rules.xml</include>
    <!-- <include>policy_rules.xml</include> -->
    <include>zeus_rules.xml</include>
    <include>solaris_bsm_rules.xml</include>
    <include>vmware_rules.xml</include>
    <include>ms_dhcp_rules.xml</include>
    <include>asterisk_rules.xml</include>
    <include>ossec_rules.xml</include>
    <include>attack_rules.xml</include>
    <include>openbsd_rules.xml</include>
    <include>clam_av_rules.xml</include>
    <include>bro-ids_rules.xml</include>
    <include>dropbear_rules.xml</include>
    <include>local_rules.xml</include>
  </rules>

  <syscheck>
    <!-- Frequency that syscheck is executed - default to every 22 hours -->
    <frequency>79200</frequency>

    <!-- Directories to check  (perform all possible verifications) -->
    <directories check_all="yes">/etc,/usr/bin,/usr/sbin</directories>
    <directories check_all="yes">/bin,/sbin</directories>

    <!-- Files/directories to ignore -->
    <ignore>/etc/mtab</ignore>
    <ignore>/etc/mnttab</ignore>
    <ignore>/etc/hosts.deny</ignore>
    <ignore>/etc/mail/statistics</ignore>
    <ignore>/etc/random-seed</ignore>
    <ignore>/etc/adjtime</ignore>
    <ignore>/etc/httpd/logs</ignore>
    <ignore>/etc/utmpx</ignore>
    <ignore>/etc/wtmpx</ignore>
    <ignore>/etc/cups/certs</ignore>
    <ignore>/etc/dumpdates</ignore>
    <ignore>/etc/svc/volatile</ignore>

  </syscheck>

  <rootcheck>
    <rootkit_files>/var/ossec/etc/shared/rootkit_files.txt</rootkit_files>
    <rootkit_trojans>/var/ossec/etc/shared/rootkit_trojans.txt</rootkit_trojans>
    <system_audit>/var/ossec/etc/shared/system_audit_rcl.txt</system_audit>
    <system_audit>/var/ossec/etc/shared/cis_debian_linux_rcl.txt</system_audit>
    <system_audit>/var/ossec/etc/shared/cis_rhel_linux_rcl.txt</system_audit>
    <system_audit>/var/ossec/etc/shared/cis_rhel5_linux_rcl.txt</system_audit>
  </rootcheck>

  <global>
    <white_list>127.0.0.1</white_list>
    <white_list>^localhost.localdomain$</white_list>
    <white_list>194.999.999.999</white_list>
    <white_list>194.999.999.998</white_list>
  </global>

  <alerts>
    <log_alert_level>1</log_alert_level>
    <email_alert_level>6</email_alert_level>
  </alerts>

  <command>
    <name>host-deny</name>
    <executable>host-deny.sh</executable>
    <expect>srcip</expect>
    <timeout_allowed>yes</timeout_allowed>
  </command>

  <command>
    <name>firewall-drop</name>
    <executable>firewall-drop.sh</executable>
    <expect>srcip</expect>
    <timeout_allowed>yes</timeout_allowed>
  </command>

  <command>
    <name>disable-account</name>
    <executable>disable-account.sh</executable>
    <expect>user</expect>
    <timeout_allowed>yes</timeout_allowed>
  </command>

  <command>
    <name>restart-ossec</name>
    <executable>restart-ossec.sh</executable>
    <expect></expect>
  </command>


  <command>
    <name>route-null</name>
    <executable>route-null.sh</executable>
    <expect>srcip</expect>
    <timeout_allowed>yes</timeout_allowed>
  </command>


  <!-- Active Response Config -->
  <active-response>
    <!-- This response is going to execute the host-deny
       - command for every event that fires a rule with
       - level (severity) >= 6.
       - The IP is going to be blocked for  600 seconds.
      -->
    <command>host-deny</command>
    <location>local</location>
    <level>6</level>
    <timeout>600</timeout>
  </active-response>

  <active-response>
    <!-- Firewall Drop response. Block the IP for
       - 600 seconds on the firewall (iptables,
       - ipfilter, etc).
      -->
    <command>firewall-drop</command>
    <location>local</location>
    <level>6</level>
    <timeout>600</timeout>
  </active-response>

  <!-- Files to monitor (localfiles) -->

  <localfile>
    <log_format>syslog</log_format>
    <location>/var/log/messages</location>
  </localfile>

  <localfile>
    <log_format>syslog</log_format>
    <location>/var/log/auth.log</location>
  </localfile>

  <localfile>
    <log_format>syslog</log_format>
    <location>/var/log/syslog</location>
  </localfile>

  <localfile>
    <log_format>syslog</log_format>
    <location>/var/log/mail.info</location>
  </localfile>

  <localfile>
    <log_format>syslog</log_format>
    <location>/var/log/dpkg.log</location>
  </localfile>

  <localfile>
    <log_format>snort-full</log_format>
    <location>/var/log/snort/alert</location>
  </localfile>



  <localfile>
    <log_format>apache</log_format>
    <location>/var/log/apache2/default/error.log</location>
  </localfile>
  <localfile>
    <log_format>apache</log_format>
    <location>/var/log/apache2/default/access.log</location>
  </localfile>


  <localfile>
    <log_format>command</log_format>
    <command>df -h</command>
  </localfile>

  <localfile>
    <log_format>full_command</log_format>
    <command>netstat -tan |grep LISTEN |grep -v 127.0.0.1 | sort</command>
  </localfile>

  <localfile>
    <log_format>full_command</log_format>
    <command>last -n 5</command>
  </localfile>
</ossec_config>



hostname:/var/ossec# cat /var/ossec/logs/ossec.log
2013/02/06 11:55:02 ossec-testrule: INFO: Reading local decoder file.
2013/02/06 11:55:02 ossec-testrule: INFO: Started (pid: 21855).
2013/02/06 11:55:02 ossec-execd: INFO: Started (pid: 21876).
2013/02/06 11:55:02 ossec-analysisd: INFO: Reading local decoder file.
2013/02/06 11:55:02 ossec-analysisd: INFO: Reading rules file: 
'rules_config.xml'
2013/02/06 11:55:02 ossec-analysisd: INFO: Reading rules file: 'pam_rules.xml'
2013/02/06 11:55:02 ossec-analysisd: INFO: Reading rules file: 'sshd_rules.xml'
2013/02/06 11:55:02 ossec-analysisd: INFO: Reading rules file: 
'telnetd_rules.xml'
2013/02/06 11:55:02 ossec-analysisd: INFO: Reading rules file: 
'syslog_rules.xml'
2013/02/06 11:55:02 ossec-analysisd: INFO: Reading rules file: 
'arpwatch_rules.xml'
2013/02/06 11:55:02 ossec-analysisd: INFO: Reading rules file: 
'symantec-av_rules.xml'
2013/02/06 11:55:02 ossec-analysisd: INFO: Reading rules file: 
'symantec-ws_rules.xml'
2013/02/06 11:55:02 ossec-analysisd: INFO: Reading rules file: 'pix_rules.xml'
2013/02/06 11:55:02 ossec-analysisd: INFO: Reading rules file: 'named_rules.xml'
2013/02/06 11:55:02 ossec-analysisd: INFO: Reading rules file: 'smbd_rules.xml'
2013/02/06 11:55:02 ossec-analysisd: INFO: Reading rules file: 
'vsftpd_rules.xml'
2013/02/06 11:55:02 ossec-analysisd: INFO: Reading rules file: 
'pure-ftpd_rules.xml'
2013/02/06 11:55:02 ossec-analysisd: INFO: Reading rules file: 
'proftpd_rules.xml'
2013/02/06 11:55:02 ossec-analysisd: INFO: Reading rules file: 
'ms_ftpd_rules.xml'
2013/02/06 11:55:02 ossec-analysisd: INFO: Reading rules file: 'ftpd_rules.xml'
2013/02/06 11:55:02 ossec-analysisd: INFO: Reading rules file: 
'hordeimp_rules.xml'
2013/02/06 11:55:02 ossec-analysisd: INFO: Reading rules file: 
'roundcube_rules.xml'
2013/02/06 11:55:02 ossec-analysisd: INFO: Reading rules file: 
'wordpress_rules.xml'
2013/02/06 11:55:02 ossec-analysisd: INFO: Reading rules file: 
'cimserver_rules.xml'
2013/02/06 11:55:02 ossec-analysisd: INFO: Reading rules file: 
'vpopmail_rules.xml'
2013/02/06 11:55:02 ossec-analysisd: INFO: Reading rules file: 
'vmpop3d_rules.xml'
2013/02/06 11:55:02 ossec-analysisd: INFO: Reading rules file: 
'courier_rules.xml'
2013/02/06 11:55:02 ossec-analysisd: INFO: Reading rules file: 'web_rules.xml'
2013/02/06 11:55:02 ossec-analysisd: INFO: Reading rules file: 
'web_appsec_rules.xml'
2013/02/06 11:55:02 ossec-analysisd: INFO: Reading rules file: 
'apache_rules.xml'
2013/02/06 11:55:02 ossec-analysisd: INFO: Reading rules file: 'nginx_rules.xml'
2013/02/06 11:55:02 ossec-analysisd: INFO: Reading rules file: 'php_rules.xml'
2013/02/06 11:55:02 ossec-analysisd: INFO: Reading rules file: 'mysql_rules.xml'
2013/02/06 11:55:02 ossec-analysisd: INFO: Reading rules file: 
'postgresql_rules.xml'
2013/02/06 11:55:02 ossec-analysisd: INFO: Reading rules file: 'ids_rules.xml'
2013/02/06 11:55:02 ossec-analysisd: INFO: Reading rules file: 'squid_rules.xml'
2013/02/06 11:55:02 ossec-analysisd: INFO: Reading rules file: 
'firewall_rules.xml'
2013/02/06 11:55:02 ossec-analysisd: INFO: Reading rules file: 
'cisco-ios_rules.xml'
2013/02/06 11:55:02 ossec-analysisd: INFO: Reading rules file: 
'netscreenfw_rules.xml'
2013/02/06 11:55:02 ossec-analysisd: INFO: Reading rules file: 
'sonicwall_rules.xml'
2013/02/06 11:55:02 ossec-analysisd: INFO: Reading rules file: 
'postfix_rules.xml'
2013/02/06 11:55:02 ossec-analysisd: INFO: Reading rules file: 
'sendmail_rules.xml'
2013/02/06 11:55:02 ossec-analysisd: INFO: Reading rules file: 'imapd_rules.xml'
2013/02/06 11:55:02 ossec-analysisd: INFO: Reading rules file: 
'mailscanner_rules.xml'
2013/02/06 11:55:02 ossec-analysisd: INFO: Reading rules file: 
'dovecot_rules.xml'
2013/02/06 11:55:02 ossec-analysisd: INFO: Reading rules file: 
'ms-exchange_rules.xml'
2013/02/06 11:55:02 ossec-analysisd: INFO: Reading rules file: 
'racoon_rules.xml'
2013/02/06 11:55:02 ossec-analysisd: INFO: Reading rules file: 
'vpn_concentrator_rules.xml'
2013/02/06 11:55:02 ossec-analysisd: INFO: Reading rules file: 'spamd_rules.xml'
2013/02/06 11:55:02 ossec-analysisd: INFO: Reading rules file: 
'msauth_rules.xml'
2013/02/06 11:55:02 ossec-analysisd: INFO: Reading rules file: 
'mcafee_av_rules.xml'
2013/02/06 11:55:02 ossec-analysisd: INFO: Reading rules file: 
'trend-osce_rules.xml'
2013/02/06 11:55:02 ossec-analysisd: INFO: Reading rules file: 'ms-se_rules.xml'
2013/02/06 11:55:02 ossec-analysisd: INFO: Reading rules file: 'zeus_rules.xml'
2013/02/06 11:55:02 ossec-analysisd: INFO: Reading rules file: 
'solaris_bsm_rules.xml'
2013/02/06 11:55:02 ossec-analysisd: INFO: Reading rules file: 
'vmware_rules.xml'
2013/02/06 11:55:02 ossec-analysisd: INFO: Reading rules file: 
'ms_dhcp_rules.xml'
2013/02/06 11:55:02 ossec-analysisd: INFO: Reading rules file: 
'asterisk_rules.xml'
2013/02/06 11:55:02 ossec-analysisd: INFO: Reading rules file: 'ossec_rules.xml'
2013/02/06 11:55:02 ossec-analysisd: INFO: Reading rules file: 
'attack_rules.xml'
2013/02/06 11:55:02 ossec-analysisd: INFO: Reading rules file: 
'openbsd_rules.xml'
2013/02/06 11:55:02 ossec-analysisd: INFO: Reading rules file: 
'clam_av_rules.xml'
2013/02/06 11:55:02 ossec-analysisd: INFO: Reading rules file: 
'bro-ids_rules.xml'
2013/02/06 11:55:02 ossec-analysisd: INFO: Reading rules file: 
'dropbear_rules.xml'
2013/02/06 11:55:02 ossec-analysisd: INFO: Reading rules file: 'local_rules.xml'
2013/02/06 11:55:02 ossec-analysisd: INFO: Total rules enabled: '1291'
2013/02/06 11:55:02 ossec-analysisd: INFO: Ignoring file: '/etc/mtab'
2013/02/06 11:55:02 ossec-analysisd: INFO: Ignoring file: '/etc/mnttab'
2013/02/06 11:55:02 ossec-analysisd: INFO: Ignoring file: '/etc/hosts.deny'
2013/02/06 11:55:02 ossec-analysisd: INFO: Ignoring file: '/etc/mail/statistics'
2013/02/06 11:55:02 ossec-analysisd: INFO: Ignoring file: '/etc/random-seed'
2013/02/06 11:55:02 ossec-analysisd: INFO: Ignoring file: '/etc/adjtime'
2013/02/06 11:55:02 ossec-analysisd: INFO: Ignoring file: '/etc/httpd/logs'
2013/02/06 11:55:02 ossec-analysisd: INFO: Ignoring file: '/etc/utmpx'
2013/02/06 11:55:02 ossec-analysisd: INFO: Ignoring file: '/etc/wtmpx'
2013/02/06 11:55:02 ossec-analysisd: INFO: Ignoring file: '/etc/cups/certs'
2013/02/06 11:55:02 ossec-analysisd: INFO: Ignoring file: '/etc/dumpdates'
2013/02/06 11:55:02 ossec-analysisd: INFO: Ignoring file: '/etc/svc/volatile'
2013/02/06 11:55:07 ossec-syscheckd: INFO: Started (pid: 21891).
2013/02/06 11:55:07 ossec-rootcheck: INFO: Started (pid: 21891).
2013/02/06 11:55:07 ossec-syscheckd: INFO: Monitoring directory: '/etc'.
2013/02/06 11:55:07 ossec-syscheckd: INFO: Monitoring directory: '/usr/bin'.
2013/02/06 11:55:07 ossec-syscheckd: INFO: Monitoring directory: '/usr/sbin'.
2013/02/06 11:55:07 ossec-syscheckd: INFO: Monitoring directory: '/bin'.
2013/02/06 11:55:07 ossec-syscheckd: INFO: Monitoring directory: '/sbin'.
2013/02/06 11:55:08 ossec-logcollector(1950): INFO: Analyzing file: 
'/var/log/messages'.
2013/02/06 11:55:08 ossec-logcollector(1950): INFO: Analyzing file: 
'/var/log/auth.log'.
2013/02/06 11:55:08 ossec-logcollector(1950): INFO: Analyzing file: 
'/var/log/syslog'.
2013/02/06 11:55:08 ossec-logcollector(1950): INFO: Analyzing file: 
'/var/log/mail.info'.
2013/02/06 11:55:08 ossec-logcollector(1950): INFO: Analyzing file: 
'/var/log/dpkg.log'.
2013/02/06 11:55:08 ossec-logcollector(1950): INFO: Analyzing file: 
'/var/log/snort/alert'.
2013/02/06 11:55:08 ossec-logcollector(1950): INFO: Analyzing file: 
'/var/log/apache2/default/error.log'.
2013/02/06 11:55:08 ossec-logcollector(1950): INFO: Analyzing file: 
'/var/log/apache2/default/access.log'.
2013/02/06 11:55:08 ossec-logcollector: INFO: Monitoring output of 
command(360): df -h
2013/02/06 11:55:08 ossec-logcollector: INFO: Monitoring full output of 
command(360): netstat -tan |grep LISTEN |grep -v 127.0.0.1 | sort
2013/02/06 11:55:08 ossec-logcollector: INFO: Monitoring full output of 
command(360): last -n 5
2013/02/06 11:55:08 ossec-logcollector: INFO: Started (pid: 21884).
2013/02/06 11:56:09 ossec-syscheckd: INFO: Starting syscheck scan (forwarding 
database).
2013/02/06 11:56:09 ossec-syscheckd: INFO: Starting syscheck database 
(pre-scan).
2013/02/06 11:58:05 ossec-testrule: INFO: Reading local decoder file.
2013/02/06 11:58:05 ossec-testrule: INFO: Started (pid: 22005).


hostname:/var/ossec# tail -n20 /var/log/snort/alert

[**] [119:15:1] (http_inspect) OVERSIZE REQUEST-URI DIRECTORY [**]
[Priority: 3]
02/06-11:55:49.787890 159.999.999.999:30462 -> 89.999.999.999:80
TCP TTL:121 TOS:0x0 ID:15553 IpLen:20 DgmLen:1500 DF
***A**** Seq: 0x471E860  Ack: 0x513034D4  Win: 0xF3C  TcpLen: 20

[**] [119:16:1] (http_inspect) OVERSIZE CHUNK ENCODING [**]
[Priority: 3]
02/06-11:57:07.186371 80.999.999.999:55739 -> 89.999.999.999:80
TCP TTL:118 TOS:0x0 ID:19937 IpLen:20 DgmLen:1500 DF
***A**** Seq: 0x6AEA760E  Ack: 0x8EECD1F9  Win: 0x4029  TcpLen: 20

[**] [119:16:1] (http_inspect) OVERSIZE CHUNK ENCODING [**]
[Priority: 3]
02/06-12:02:23.572923 80.999.999.999:53850 -> 89.999.999.999:80
TCP TTL:118 TOS:0x0 ID:27948 IpLen:20 DgmLen:1500 DF
***A**** Seq: 0xD13E38B  Ack: 0xBE736F85  Win: 0x4029  TcpLen: 20



hostname:/var/ossec# tail -n20 /var/ossec/logs/alerts/alerts.log
** Alert 1360144513.15441: mail  - ossec,
2013 Feb 06 11:55:13 hostname->ossec-monitord
Rule: 502 (level 3) -> 'Ossec server started.'
ossec: Ossec started.

** Alert 1360144550.15600: mail  - ids,
2013 Feb 06 11:55:50 hostname->/var/log/snort/alert
Rule: 20101 (level 6) -> 'IDS event.'
[**] [119:15:1] (http_inspect) OVERSIZE REQUEST-URI DIRECTORY [**]

** Alert 1360144628.15799: mail  - ids,
2013 Feb 06 11:57:08 hostname->/var/log/snort/alert
Rule: 20101 (level 6) -> 'IDS event.'
[**] [119:16:1] (http_inspect) OVERSIZE CHUNK ENCODING [**]

** Alert 1360144944.15991: mail  - ids,
2013 Feb 06 12:02:24 hostname->/var/log/snort/alert
Rule: 20101 (level 6) -> 'IDS event.'
[**] [119:16:1] (http_inspect) OVERSIZE CHUNK ENCODING [**]



hostname:/var/ossec# /var/ossec/bin/ossec-logtest
2013/02/06 11:58:05 ossec-testrule: INFO: Reading local decoder file.
2013/02/06 11:58:05 ossec-testrule: INFO: Started (pid: 22005).
ossec-testrule: Type one log per line.

[**] [119:15:1] (http_inspect) OVERSIZE REQUEST-URI DIRECTORY [**] [Priority: 
3] 02/06-11:55:49.787890 159.999.999.999:30462 -> 89.999.999.999:80 TCP TTL:121 
TOS:0x0 ID:15553 IpLen:20 DgmLen:1500 DF ***A**** Seq: 0x471E860  Ack: 
0x513034D4  Win: 0xF3C  TcpLen: 20


**Phase 1: Completed pre-decoding.
       full event: '[**] [119:15:1] (http_inspect) OVERSIZE REQUEST-URI 
DIRECTORY [**] [Priority: 3] 02/06-11:55:49.787890 159.999.999.999:30462 -> 
89.999.999.999:80 TCP TTL:121 TOS:0x0 ID:15553 IpLen:20 DgmLen:1500 DF ***A**** 
Seq: 0x471E860  Ack: 0x513034D4  Win: 0xF3C  TcpLen: 20'
       hostname: 'hostname'
       program_name: '(null)'
       log: '[**] [119:15:1] (http_inspect) OVERSIZE REQUEST-URI DIRECTORY [**] 
[Priority: 3] 02/06-11:55:49.787890 159.999.999.999:30462 -> 89.999.999.999:80 
TCP TTL:121 TOS:0x0 ID:15553 IpLen:20 DgmLen:1500 DF ***A**** Seq: 0x471E860  
Ack: 0x513034D4  Win: 0xF3C  TcpLen: 20'

**Phase 2: Completed decoding.
       decoder: 'snort'
       id: '119:15:1'
       srcip: '159.999.999.999'
       dstip: '89.999.999.999'

**Phase 3: Completed filtering (rules).
       Rule id: '100001'
       Level: '4'
       Description: 'Lower the level for some (http_inspect) events.'
**Alert to be generated.


hostname:/var/ossec# cat /var/ossec/rules/local_rules.xml

<!-- Modify it at your will. -->

<group name="ids,">

  <rule id="100001" level="4">
    <if_sid>20100,20101</if_sid>
    <decoded_as>snort</decoded_as>
    <!-- [119:15:1] (http_inspect) OVERSIZE REQUEST-URI DIRECTORY
       - [119:16:1] (http_inspect) OVERSIZE CHUNK ENCODING
    -->
    <id>119:15:1|119:16:1</id>
    <description>Lower the level for some (http_inspect) events.</description>
  </rule>

</group> <!-- IDS -->

<group name="sshd,">

  <rule id="100099" level="5">
    <if_sid>5710</if_sid>
    <decoded_as>sshd</decoded_as>
    <description>IVARSG: rule intercepted, works fine!!!!.</description>
  </rule>

</group> <!-- IDS -->

<!-- EOF -->


hostname:/var/ossec# uname -a
Linux hostname.domain.tld 2.6.26-1-686 #1 SMP Sat Jan 10 18:29:31 UTC 2009 i686 
GNU/Linux


Reply via email to