what i basically want is that a firewall drop is executed on the host that 
originates the alert and if the alert is part of defined groups and level 6 
or higher.

initially i had 1 active response block with all agents seperated by 
comma's in the <agent_id> field , initially this worked but after 
recompiling for geoip  this gave errors on the server. now it is configured 
as you see below


   <command>
    <name>firewall-drop</name>
    <executable>firewall-drop.sh</executable>
    <expect>srcip</expect>
    <timeout_allowed>yes</timeout_allowed>
  </command>  



<active-response>
    <command>firewall-drop</command>
    <location>defined-agent</location>
    <agent_id>005</agent_id>
    
<rules_group>apache,web,appsec,attack,web,accesslog,web_scan,recon,invalid_access,automatic_attack</rules_group>
   

    <level>6</level>
    <timeout>600</timeout>
  </active-response>


 <active-response>
    <command>firewall-drop</command>
    <location>defined-agent</location>
    <agent_id>006</agent_id>
    
<rules_group>apache,web,appsec,attack,web,accesslog,web_scan,recon,invalid_access,automatic_attack</rules_group>
    <level>6</level>
    <timeout>600</timeout>
  </active-response>


 <active-response>
    <command>firewall-drop</command>
    <location>defined-agent</location>
    <agent_id>007</agent_id>
    
<rules_group>apache,web,appsec,attack,web,accesslog,web_scan,recon,invalid_access,automatic_attack</rules_group>
    <level>6</level>
    <timeout>600</timeout>
  </active-response>

 <active-response>
    <command>firewall-drop</command>
    <location>defined-agent</location>
    <agent_id>009</agent_id>
    
<rules_group>apache,web,appsec,attack,web,accesslog,web_scan,recon,invalid_access,automatic_attack</rules_group>
    <level>6</level>
    <timeout>600</timeout>
  </active-response>


 <active-response>
    <command>firewall-drop</command>
    <location>defined-agent</location>
    <agent_id>012</agent_id>
    
<rules_group>apache,web,appsec,attack,web,accesslog,web_scan,recon,invalid_access,automatic_attack</rules_group>
    <level>6</level>
    <timeout>600</timeout>
  </active-response>


Op woensdag 4 september 2013 18:08:50 UTC+2 schreef dan (ddpbsd):
>
> On Wed, Sep 4, 2013 at 12:01 PM,  <[email protected] <javascript:>> wrote: 
> > 
> > 
> > on 1 of my servers i get an alert during testing detected by modsecurity 
> and 
> > forwarded to ossec , this alert comes from one of the test servers and i 
> > would expect that active response would be activated only on the server 
> that 
> > underwent the action, however apparently this ip address was then 
> blocked on 
> > all the servers , while only notifying in  the alerts that it had 
> blocked 
> > the ip for only 2 servers (all the client have the same configuration 
> > distributed by agent.conf): 
> > 
> > ** Alert 1378301036.1249820: - apache,access_denied, 
> > 2013 Sep 04 15:23:56 
> > 
> > 
> > Wed Sep  4 15:23:56 CEST 2013 
> > /var/ossec/active-response/bin/firewall-drop.sh add - 172.30.6.23 
> > 1378301036.1249820 30118 
> > 
> > how is this possible 
> > 
>
> How is AR configured? 
>
> > -- 
> > 
> > --- 
> > You received this message because you are subscribed to the Google 
> Groups 
> > "ossec-list" group. 
> > To unsubscribe from this group and stop receiving emails from it, send 
> an 
> > email to [email protected] <javascript:>. 
> > For more options, visit https://groups.google.com/groups/opt_out. 
>

-- 

--- 
You received this message because you are subscribed to the Google Groups 
"ossec-list" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
For more options, visit https://groups.google.com/groups/opt_out.

Reply via email to