I got configured the next rule_id
<rules_id>5712</rules_id>
And checking ssh_rules.sh, I see the rule 5712:
<rule id="5712" level="10" frequency="6" timeframe="120" ignore="60">
<if_matched_sid>5710</if_matched_sid>
<description>SSHD brute force trying to get access to </description>
<description>the system.</description>
<same_source_ip />
<group>authentication_failures,</group>
</rule>
<rule id="5710" level="5">
<if_sid>5700</if_sid>
<match>illegal user|invalid user</match>
<description>Attempt to login using a non-existent user</description>
<group>invalid_login,authentication_failed,</group>
</rule>
When I check the logs generated when I try to access with an no existing user,
I see that:
Oct 19 09:56:29 sshd[26260]: [ID 800047 auth.info] Illegal user vpn6006 from
10.188.62.176
Oct 19 09:56:29 sshd[26260]: [ID 800047 auth.info] input_userauth_request:
illegal user vpn6006
Oct 19 09:56:29 sshd[26260]: [ID 800047 auth.info] Failed none for <invalid
username> from 10.188.62.176 port 4431 ssh2
Oct 19 09:56:33 sshd[26260]: [ID 219349 auth.debug] pam_unix_auth: user vpn6006
not found
Oct 19 09:56:33 sshd[26260]: [ID 800047 auth.info] Keyboard-interactive (PAM)
userauth failed[13] while authenticating: No account present for user
Oct 19 09:56:33 sshd[26260]: [ID 800047 auth.info] Failed keyboard-interactive
for <invalid username> from 10.188.62.176 port 4431 ssh2
Oct 19 09:56:35 sshd[26260]: [ID 219349 auth.debug] pam_unix_auth: user vpn6006
not found
Oct 19 09:56:35 sshd[26260]: [ID 800047 auth.info] Keyboard-interactive (PAM)
userauth failed[13] while authenticating: No account present for user
Oct 19 09:56:35 sshd[26260]: [ID 800047 auth.info] Failed keyboard-interactive
for <invalid username> from 10.188.62.176 port 4431 ssh2
Oct 19 09:56:37 sshd[26260]: [ID 219349 auth.debug] pam_unix_auth: user vpn6006
not found
Oct 19 09:56:37 sshd[26260]: [ID 800047 auth.info] Keyboard-interactive (PAM)
userauth failed[13] while authenticating: No account present for user
Oct 19 09:56:37 sshd[26260]: [ID 800047 auth.info] Failed keyboard-interactive
for <invalid username> from 10.188.62.176 port 4431 ssh2
Oct 19 09:56:37 sshd[26260]: [ID 800047 auth.info] Connection closed by
10.188.62.176
Oct 19 09:56:40 sshd[26304]: [ID 800047 auth.info] Illegal user vpn6006 from
10.188.62.176
Oct 19 09:56:40 sshd[26304]: [ID 800047 auth.info] input_userauth_request:
illegal user vpn6006
Oct 19 09:56:40 sshd[26304]: [ID 800047 auth.info] Failed none for <invalid
username> from 10.188.62.176 port 4480 ssh2
Oct 19 09:56:43 sshd[26304]: [ID 219349 auth.debug] pam_unix_auth: user vpn6006
not found
Oct 19 09:56:43 sshd[26304]: [ID 800047 auth.info] Keyboard-interactive (PAM)
userauth failed[13] while authenticating: No account present for user
Oct 19 09:56:43 sshd[26304]: [ID 800047 auth.info] Failed keyboard-interactive
for <invalid username> from 10.188.62.176 port 4480 ssh2
Oct 19 09:56:45 sshd[26304]: [ID 219349 auth.debug] pam_unix_auth: user vpn6006
not found
Oct 19 09:56:45 sshd[26304]: [ID 800047 auth.info] Keyboard-interactive (PAM)
userauth failed[13] while authenticating: No account present for user
Oct 19 09:56:45 sshd[26304]: [ID 800047 auth.info] Failed keyboard-interactive
for <invalid username> from 10.188.62.176 port 4480 ssh2
Oct 19 09:56:46 sshd[26304]: [ID 219349 auth.debug] pam_unix_auth: user vpn6006
not found
Oct 19 09:56:46 sshd[26304]: [ID 800047 auth.info] Keyboard-interactive (PAM)
userauth failed[13] while authenticating: No account present for user
Oct 19 09:56:46 sshd[26304]: [ID 800047 auth.info] Failed keyboard-interactive
for <invalid username> from 10.188.62.176 port 4480 ssh2
Oct 19 09:56:46 sshd[26304]: [ID 800047 auth.info] Connection closed by
10.188.62.176
So, I need to create a new rule that match with the message and configure the
active response with that new rule?
Or What is the log that the rule needs to fire it?
-----Mensaje original-----
De: [email protected] [mailto:[email protected]] En nombre
de dan (ddp)
Enviado el: miércoles, 19 de octubre de 2016 12:11 p.m.
Para: [email protected]
Asunto: Re: [ossec-list] Active response
On Wed, Oct 19, 2016 at 1:02 PM, Adiel Navarro <
<mailto:[email protected]> [email protected]> wrote:
> How can I check the active-responses scripts are running?
>
If there are entries in the active-responses.log file, the scripts are running.
If there are not entries in the log, you need to figure out why.
> In the agent, I have the next lines inserted in ossec.conf to watch the log
> files:
>
> <localfile>
> <log_format>syslog</log_format>
> <location>/var/ossec/logs/active-responses.log</location>
> </localfile>
>
> How can I configure the rule?
>
On the OSSEC server add a rule to /var/ossec/rules/local_rules.xml looking for
the information in the log message.
For instance, I have the following logs:
Tue Oct 18 07:04:11 EDT 2016 /var/ossec/active-response/bin/pf.sh add
- 42.112.31.172 1476788651.100797 5718
Wed Oct 19 08:10:26 EDT 2016 /var/ossec/active-response/bin/pf.sh add
- 117.211.159.74 1476879026.110618 5718
My rules would be something like:
<!-- Identify an active response log message --> <rule id="987654" level="0">
<match>/var/ossec/active-response/bin</match>
<description>AR fired</description>
</rule>
<!-- Once the log message is identified, check to see if it is adding something
to ossec_fwtable --> <rule id="987655" level="10">
<if_sid>987654</if_sid>
<match>pf.sh add </match>
<description>pf.sh active response added an ip to the
blocklist.</description> </rule>
After adding the rules the OSSEC processes on the server would have to be
restarted.
I could make it fancier by creating a decoder, but it's probably not necessary.
> -----Mensaje original-----
> De: <mailto:[email protected]> [email protected] [
> <mailto:[email protected]> mailto:[email protected]]
> En nombre de dan (ddp) Enviado el: miércoles, 19 de octubre de 2016 11:56 a.m.
> Para: <mailto:[email protected]> [email protected]
> Asunto: Re: [ossec-list] Active response
>
> On Wed, Oct 19, 2016 at 12:48 PM, Adiel Navarro <
> <mailto:[email protected]> [email protected]> wrote:
>> How can I Configure ossec to watch the active response.log file will fire an
>> alert?
>> Why active-responses.log is not writing?
>>
>
> If active-responses.log is empty, it's probably because no active response
> scripts are being run.
>
> Getting alerts when AR scripts are run is pretty simple. Setup a localfile to
> watch the log file and create a rule to alert when there are new entries.
>
>> In agent:
>>
>> <localfile>
>> <log_format>syslog</log_format>
>> <location>/var/ossec/logs/active-responses.log</location>
>> </localfile>
>>
>> -bash-3.2# ls -l /var/ossec/logs
>> total 86
>> -rw-r--r-- 1 root root 0 Oct 17 14:30
>> active-responses.log
>> -rw-rw-r-- 1 ossec ossec 44032 Oct 17 14:29 ossec.log
>>
>> in the server:
>> -bash-3.2# ls -l /var/ossec/logs
>> total 7432
>> -rw-rw---- 1 ossec ossec 0 May 19 10:01 active-responses.log
>> drwxr-x--- 3 ossec ossec 4096 Oct 17 12:56 alerts
>> drwxr-x--- 3 ossec ossec 4096 Oct 17 12:56 archives
>> drwxr-x--- 3 ossec ossec 4096 Oct 17 12:56 firewall
>> -rw-rw---- 1 ossec ossec 7582818 Oct 17 17:09 ossec.log
>>
>>
>>
>> -----Mensaje original-----
>> De: <mailto:[email protected]> [email protected] [
>> <mailto:[email protected]> mailto:[email protected]] En
>> nombre de dan (ddp) Enviado el: miércoles, 19 de octubre de 2016 07:50 a.m.
>> Para: <mailto:[email protected]> [email protected]
>> Asunto: Re: [ossec-list] Active response
>>
>> On Wed, Oct 19, 2016 at 8:43 AM, dan (ddp) < <mailto:[email protected]>
>> [email protected]> wrote:
>>> On Tue, Oct 18, 2016 at 6:54 PM, Aj Navarro <
>>> <mailto:[email protected]> [email protected]> wrote:
>>
>>>> Only I see the next messages in /var/ossec/logs/alers/alerts.log
>>>>
>>>> ** Alert 1476724188.107242: mail - syslog,errors,
>>>>
>>>> 2016 Oct 17 12:09:48 ixtrtc42scf->/var/log/messages
>>>>
>>>> Rule: 1002 (level 2) -> 'Unknown problem somewhere in the system.'
>>>>
>>>> Oct 17 12:09:48 ixtrtc42scf kernel: type=1100
>>>> audit(1476724188.016:36149378): user pid=6141 uid=0 auid=4294967295
>>>> ses=4294967295 msg=
>>>>
>>>> 'op=PAM:authentication acct="root" exe="/usr/sbin/sshd"
>>>> hostname=10.188.62.176 addr=10.188.62.176 terminal=ssh res=failed'
>>>>
>>>
>>> These log messages are not triggering 5712. In fact OSSEC isn't sure
>>> what to do with these log messages.
>>> Is there anything in your auth log?
>>>
>>
>> Digging into it further, we get:
>> # cat /tmp/yy | /var/ossec/bin/ossec-logtest -q
>> 2016/10/19 08:44:09 ossec-testrule: INFO: Reading the lists file:
>> 'rules/lists/ossec.block'
>> 2016/10/19 08:44:09 ossec-testrule: INFO: Started (pid: 16098).
>> ossec-testrule: Type one log per line.
>>
>> **Phase 1: Completed pre-decoding.
>> full event: 'Oct 17 12:09:48 ixtrtc42scf kernel: type=1100
>> audit(1476724188.016:36149378): user pid=6141 uid=0 auid=4294967295
>> ses=4294967295 msg='op=PAM:authentication acct="root"
>> exe="/usr/sbin/sshd" hostname=10.188.62.176 addr=10.188.62.176 terminal=ssh
>> res=failed''
>> hostname: 'ixtrtc42scf'
>> program_name: 'kernel'
>> log: 'type=1100 audit(1476724188.016:36149378): user pid=6141
>> uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:authentication
>> acct="root" exe="/usr/sbin/sshd" hostname=10.188.62.176
>> addr=10.188.62.176 terminal=ssh res=failed''
>>
>> **Phase 2: Completed decoding.
>> decoder: 'iptables'
>>
>> **Phase 3: Completed filtering (rules).
>> Rule id: '1002'
>> Level: '2'
>> Description: 'Unknown problem somewhere in the system.'
>> **Alert to be generated.
>>
>> So we'll have to create a decoder to deal with these odd log messages.
>> Adding the following decoder to my local decoders file:
>> <decoder name="wtf-iptables">
>> <parent>iptables</parent>
>> <prematch> exe="/usr/sbin/sshd" </prematch>
>> <!--<regex> acct="(\S+)" hostname="(\S+)" addr="(\S+)" </regex>-->
>> <regex> acct="(\S+)" exe="/\.+/sshd" hostname=(\S+) addr=(\S+) </regex>
>> <order>user,dstip, srcip</order>
>> </decoder>
>>
>> I get:
>> **Phase 1: Completed pre-decoding.
>> full event: 'Oct 17 12:09:48 ixtrtc42scf kernel: type=1100
>> audit(1476724188.016:36149378): user pid=6141 uid=0 auid=4294967295
>> ses=4294967295 msg='op=PAM:authentication acct="root"
>> exe="/usr/sbin/sshd" hostname=10.188.62.176 addr=10.188.62.176 terminal=ssh
>> res=failed''
>> hostname: 'ixtrtc42scf'
>> program_name: 'kernel'
>> log: 'type=1100 audit(1476724188.016:36149378): user pid=6141
>> uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:authentication
>> acct="root" exe="/usr/sbin/sshd" hostname=10.188.62.176
>> addr=10.188.62.176 terminal=ssh res=failed''
>>
>> **Phase 2: Completed decoding.
>> decoder: 'iptables'
>> dstuser: 'root'
>> dstip: '10.188.62.176'
>> srcip: '10.188.62.176'
>>
>> **Phase 3: Completed filtering (rules).
>> Rule id: '1002'
>> Level: '2'
>> Description: 'Unknown problem somewhere in the system.'
>> **Alert to be generated.
>>
>>
>> I haven't done any testing to see if this will affect anything else though.
>>
>> --
>>
>> ---
>> You received this message because you are subscribed to the Google Groups
>> "ossec-list" group.
>> To unsubscribe from this group and stop receiving emails from it, send an
>> email to <mailto:[email protected]>
>> [email protected].
>> For more options, visit <https://groups.google.com/d/optout>
>> https://groups.google.com/d/optout.
>>
>> --
>>
>> ---
>> You received this message because you are subscribed to the Google Groups
>> "ossec-list" group.
>> To unsubscribe from this group and stop receiving emails from it, send an
>> email to <mailto:[email protected]>
>> [email protected].
>> For more options, visit <https://groups.google.com/d/optout>
>> https://groups.google.com/d/optout.
>
> --
>
> ---
> You received this message because you are subscribed to the Google Groups
> "ossec-list" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to <mailto:[email protected]>
> [email protected].
> For more options, visit <https://groups.google.com/d/optout>
> https://groups.google.com/d/optout.
>
> --
>
> ---
> You received this message because you are subscribed to the Google Groups
> "ossec-list" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to <mailto:[email protected]>
> [email protected].
> For more options, visit <https://groups.google.com/d/optout>
> https://groups.google.com/d/optout.
--
---
You received this message because you are subscribed to the Google Groups
"ossec-list" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to <mailto:[email protected]>
[email protected].
For more options, visit <https://groups.google.com/d/optout>
https://groups.google.com/d/optout.
--
---
You received this message because you are subscribed to the Google Groups
"ossec-list" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to [email protected].
For more options, visit https://groups.google.com/d/optout.