Sorry for the confusion, the # hashes where putted there by me to
masquerade hostnames/ip's.
I tried the ossec-logtest now and pasted infro from "NetScreen device_id=",
skipped the first part of the info the archives.log file, a bit unsure what
should be included.
-----------------------------------------------------------------------------------------------------------------------------------
2014/04/02 01:01:01 ossec-testrule: INFO: Started (pid: 29953).
ossec-testrule: Type one log per line.
NetScreen device_id=<netscreen-device> [Root]system-warning-00518:
Admin user "theuser" login attempt for Web(https) management (port 47873)
from <client_ip>:54031 failed. (2014-04-02 00:01:01)
**Phase 1: Completed pre-decoding.
full event: 'NetScreen device_id=<netscreen-device>
[Root]system-warning-00518: Admin user "<theuser>" login attempt for
Web(https) management (port 47873) from <client-ip>:54031 failed.
(2014-04-02 00:01:01)'
hostname: '<ossec_server>'
program_name: '(null)'
log: 'NetScreen device_id=<netscreen-device>
[Root]system-warning-00518: Admin user "<theuser>" login attempt for
Web(https) management (port 47873) from <client-ip>:54031 failed.
(2014-04-02 00:01:01)'
**Phase 2: Completed decoding.
No decoder matched.
**Phase 3: Completed filtering (rules).
Rule id: '1002'
Level: '2'
Description: 'Unknown problem somewhere in the system.'
**Alert to be generated.
-----------------------------------------------------------------------------------------------------------------------------------
On Wednesday, April 2, 2014 1:57:53 PM UTC+2, dan (ddpbsd) wrote:
>
>
> On Apr 2, 2014 7:54 AM, "Daniel Kertby" <[email protected] <javascript:>>
> wrote:
> >
> > Hi all,
> >
> > Im experience the same issue when trying to setup ossec monitoring for a
> Juniper Netscreen SSG-320M.
> > Failed web user login is hitting the 1002 rule, info from archives.log
> provided below:
> >
> > 014 Apr 02 23:59:59 #ossec-hostname# -> #FW_IP# #FW_hostname#: NetScreen
> device_id=#FW_hostname# [Root]system-warning-00518: Admin user
> "#username#" login attempt for Web(https) management (port 47873) from
> #client_IP#:54031 failed. (2014-04-02 23:59:59)
> >
>
> Maybe it's the hashes?
> Have you tried using ossec-logtest to see how ossec is parsing the log
> message?
>
> > Any help appreciated!
> >
> > Regards,
> > Daniel
> >
> > On Thursday, August 16, 2012 2:52:42 PM UTC+2, dan (ddpbsd) wrote:
> >>
> >> On Thu, Aug 16, 2012 at 6:48 AM, oorhan <[email protected]> wrote:
> >> > hi Dan,
> >> >
> >> > Thank you for your reply.
> >> >
> >> > The original netscreen log message has timestamp. Log is taken from
> another
> >> > syslog server.
> >> >
> >>
> >>
> >> According to your alert.log entry the log message does not have a
> timestamp.
> >>
> >> An example of an alert.log entry complete with a timestamp:
> >> ** Alert 1336394319.2684: - syslog,sudo
> >> 2012 May 07 08:38:39 arrakis->/var/log/secure
> >> Rule: 5402 (level 3) -> 'Successful sudo to ROOT executed'
> >> User: ddp
> >> 2012-05-07T08:38:38.338172-04:00 arrakis sudo: ddp : TTY=ttyp1 ;
> >> PWD=/home/ddp ; USER=root ; COMMAND=/sbin/ifconfig em0 down
> >>
> >>
> >> You can enable the logall option to make sure though.
> >>
> >> Looking at the sample you gave me though (the one in alerts.log since
> >> I don't trust the other one), I can see why it isn't decoded as a
> >> netscreen entry. The decoder thinks the first parts of the log will
> >> be "NetScreen device_id." In your sample it starts with: "SSG350M:
> >> NetScreen device_id." So find out why the SSG350M is showing up
> >> instead of a timestamp and you should be golden.
> >>
> >> Otherwise if the log sample you provided is incorrect, post a sample
> >> from the archives.log so we can try and track this down.
> >>
> >>
> >> >
> >> > "
> >> >
> >> > Aug 15 10:30:14 136.10.247.130 SSG350M: NetScreen
> device_id=Juniper111
> >> > [Root]system-warning-00518: Admin user "userid" login attempt for
> Web(http)
> >> > management (port 20480) from 1.1.1.1:22560 failed. (2012-08-15
> 11:33:36)
> >> >
> >> > "
> >> >
> >> > Log message on your test was a part of alert.log.
> >> >
> >> > here is my Logtest results..but we are still unable to decode it. Any
> idea?
> >> >
> >> >
> >> > Aug 15 10:30:14 136.10.247.130 SSG350M: NetScreen
> device_id=Juniper111
> >> > [Root]system-warning-00518: Admin user "userid" login attempt for
> Web(http)
> >> > management (port 20480) from 1.1.1.1:22560 failed. (2012-08-15
> 11:33:36)
> >> >
> >> >
> >> > **Phase 1: Completed pre-decoding.
> >> > full event: 'Aug 15 10:30:14 136.10.247.130 SSG350M: NetScreen
> >> > device_id=Juniper111 [Root]system-warning-00518: Admin user "userid"
> login
> >> > attempt for Web(http) management (port 20480) from 1.1.1.1:22560failed.
> >> > (2012-08-15 11:33:36)'
> >> > hostname: '136.10.247.130'
> >> >
> >> > program_name: 'SSG350M'
> >> > log: 'NetScreen device_id=Juniper111
> [Root]system-warning-00518:
> >> > Admin user "userid" login attempt for Web(http) management (port
> 20480) from
> >> > 1.1.1.1:22560 failed. (2012-08-15 11:33:36)'
> >> >
> >> > **Phase 2: Completed decoding.
> >> > decoder: 'netscreenfw'
> >> > action: 'warning'
> >> > id: '00518'
> >> >
> >>
> >> Looks like it's being decoded to me. I must be misunderstanding
> something.
> >>
> >> > **Phase 3: Completed filtering (rules).
> >> > Rule id: '4502'
> >> > Level: '9'
> >> > Description: 'Netscreen warning message.'
> >> > **Alert to be generated.
> >> >
> >> >
> >> >
> >> >
> >> > 15 Ağustos 2012 Çarşamba 16:20:34 UTC+3 tarihinde dan (ddpbsd) yazdı:
> >> >>
> >> >> On Wed, Aug 15, 2012 at 7:03 AM, Ozgur Orhan <[email protected]>
> wrote:
> >> >> >
> >> >> >
> >> >> >
> >> >> > Hi All,
> >> >> >
> >> >> >
> >> >> >
> >> >> > We have issues configuring Ossec server to receive Netscreen
> firewall
> >> >> > logs. Logs are decoded as syslog not netscreen firewall.
> >> >> >
> >> >> >
> >> >> >
> >> >> > Here are my configuration steps;
> >> >> >
> >> >> > First, firewalls are configured sending audit logs via syslog.
> >> >> >
> >> >> > We changed ossec.conf file as below to allow syslog;
> >> >> >
> >> >> >
> >> >> >
> >> >> > <remote>
> >> >> >
> >> >> > <connection>syslog</connection>
> >> >> >
> >> >> > <allowed-ips>firewall ip</allowed-ips>
> >> >> >
> >> >> > </remote>
> >> >> >
> >> >> >
> >> >> >
> >> >> > Ossec services restarted without problem.
> >> >> >
> >> >> >
> >> >> >
> >> >> > I checked with tcpdump that firewall syslog traffic is received by
> Ossec
> >> >> > Server.
> >> >> >
> >> >> >
> >> >> >
> >> >> > Here is my sample log.
> >> >> >
> >> >> >
> >> >> >
> >> >> > Aug 15 10:30:14 136.10.247.130 SSG350M: NetScreen
> device_id=Juniper111
> >> >> > [Root]system-warning-00518: Admin user "userid" login attempt for
> >> >> > Web(http)
> >> >> > management (port 20480) from 1.1.1.1:22560 failed. (2012-08-15
> 11:33:36)
> >> >> >
> >> >> >
> >> >> >
> >> >> >
> >> >> >
> >> >> > /var/ossec/bin/ossec-logtest shows logs from netscreen device
> decoded
> >> >> > properly.
> >> >> >
> >> >> >
> >> >> >
> >> >> > **Phase 1: Completed pre-decoding.
> >> >> >
> >> >> > full event: 'Aug 15 10:30:14 136.10.247.130 SSG350M:
> NetScreen
> >> >> > device_id=Juniper111 [Root]system-warning-00518: Admin user
> "userid"
> >> >> > login
> >> >> > attempt for Web(http) management (port 20480) from
> >> >> > 1.1.1.1:22560failed.
> >> >> > (2012-08-15 11:33:36)'
> >> >> >
> >> >> > hostname: '1.1.1.1'
> >> >> >
> >> >> > program_name: 'SSG350M'
> >> >> >
> >> >> > log: 'NetScreen device_id=Juniper111
> [Root]system-warning-00518:
> >> >> > Admin user "userid" login attempt for Web(http) management (port
> 20480)
> >> >> > from
> >> >> > 1.1.1.1:22560 failed. (2012-08-15 11:33:36)'
> >> >> >
> >> >> >
> >> >> >
> >> >> > **Phase 2: Completed decoding.
> >> >> >
> >> >> > decoder: 'netscreenfw'
> >> >> >
> >> >> > action: 'warning'
> >> >> >
> >> >> > id: '00518'
> >> >> >
> >> >> >
> >> >> >
> >> >> > **Phase 3: Completed filtering (rules).
> >> >> >
> >> >> > Rule id: '4502'
> >> >> >
> >> >> > Level: '9'
> >> >> >
> >> >> > Description: 'Netscreen warning message.'
> >> >> >
> >> >> > **Alert to be generated.
> >> >> >
> >> >> >
> >> >> >
> >> >> > No logs/alerts occured on /var/ossec/logs/firewall/firewall.log.
> >> >> >
> >> >> > I checked /var/ossec/logs/alerts/alerts.log and a log about syslog
> >> >> > process. It seems log is decoded as syslog.
> >> >> >
> >> >> >
> >> >> >
> >> >> > ** Alert 1345026945.197836: -
> >> >> > syslog,access_control,authentication_failed,
> >> >> >
> >> >> > 2012 Aug 15 13:35:45 logyon->1.1.1.1
> >> >> >
> >> >> > Rule: 2501 (level 5) -> 'User authentication failure.'
> >> >> >
> >> >> > SSG350M: NetScreen device_id=Juniper111
> [Root]system-warning-00518: ADM:
> >> >> > Local admin authentication failed for login name userid: invalid
> >> >> > password
> >> >> > (2012-08-15 14:39:22)
> >> >> >
> >> >>
> >> >> It looks like the log message sent to OSSEC is different than the
> log
> >> >> message you tested above. This log message doesn't have the
> timestamp
> >> >> at the beginning.
> >> >>
> >> >> **Phase 1: Completed pre-decoding.
> >> >> full event: 'SSG350M: NetScreen device_id=Juniper111
> >> >> [Root]system-warning-00518: ADM: Local admin authentication failed
> for
> >> >> login name userid: invalid password (2012-08-15 14:39:22)'
> >> >> hostname: 'arrakis'
> >> >> program_name: '(null)'
> >> >> log: 'SSG350M: NetScreen device_id=Juniper111
> >> >> [Root]system-warning-00518: ADM: Local admin authentication failed
> for
> >> >> login name userid: invalid password (2012-08-15 14:39:22)'
> >> >>
> >> >> **Phase 2: Completed decoding.
> >> >> No decoder matched.
> >> >>
> >> >> **Phase 3: Completed filtering (rules).
> >> >> Rule id: '2501'
> >> >> Level: '5'
> >> >> Description: 'User authentication failure.'
> >> >> **Alert to be generated.
> >> >>
> >> >>
> >> >> >
> >> >> >
> >> >> > I couldn't find what I am missing. Any help would be greatly
> >> >> > appreciated..
> >> >> >
> >> >> >
> >> >> >
> >> >> > Regards,
> >> >> >
> >> >> >
> >> >> >
> >> >> > Ozgur
> >> >> >
> >> >> > Bu e-posta icindeki bilgiler ve/veya mesajla iletilen butun
> dosyalar
> >> >> > sadece gondericisi tarafindan almasi amaclanan yetkili kisinin
> kullanimi
> >> >> > icindir ve gizlilik icerebilir. Eger bu e-posta size yanlislikla
> >> >> > ulasmissa,
> >> >> > icerigini hicbir sekilde kullanmayiniz. Bu durumda lutfen ilgili
> >> >> > e-postayi
> >> >> > mesaj kutunuzdan siliniz ve gonderen kisiyi uyariniz.
> >> >> >
> >> >> > The information in this message and/or attachments is intended
> solely
> >> >> > for
> >> >> > the attention and use of the named addressee and may be
> confidential. If
> >> >> > you
> >> >> > are not the intended recipient, you are hereby notified that you
> have
> >> >> > received this transmittal in error and that any use of it is
> strictly
> >> >> > prohibited. In such a case please delete this message and kindly
> notify
> >> >> > the
> >> >> > sender accordingly.
> >
> > --
> >
> > ---
> > You received this message because you are subscribed to the Google
> Groups "ossec-list" group.
> > To unsubscribe from this group and stop receiving emails from it, send
> an email to [email protected] <javascript:>.
> > For more options, visit https://groups.google.com/d/optout.
>
--
---
You received this message because you are subscribed to the Google Groups
"ossec-list" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to [email protected].
For more options, visit https://groups.google.com/d/optout.