On Oct 19, 2016 1:40 PM, "Adiel Navarro" <[email protected]>
wrote:
>
> I got configured the next rule_id
>
>
>
> <rules_id>5712</rules_id>
>
>
>
> And checking ssh_rules.sh, I see the rule 5712:
>
>
>
> <rule id="5712" level="10" frequency="6" timeframe="120" ignore="60">
>
>     <if_matched_sid>5710</if_matched_sid>
>
>     <description>SSHD brute force trying to get access to </description>
>
>     <description>the system.</description>
>
>     <same_source_ip />
>
>     <group>authentication_failures,</group>
>
>   </rule>
>
>
>
> <rule id="5710" level="5">
>
>     <if_sid>5700</if_sid>
>
>     <match>illegal user|invalid user</match>
>
>     <description>Attempt to login using a non-existent user</description>
>
>     <group>invalid_login,authentication_failed,</group>
>
>   </rule>
>
>
>
>
>
> When I check the logs generated when I try to access with an no existing
user, I see that:
>
>
>
> Oct 19 11:20:29 sshd[20692]: [ID 800047 auth.info] Keyboard-interactive
(PAM) userauth failed[13] while authenticating: No account present for user
>
> Oct 19 11:20:29 sshd[20692]: [ID 800047 auth.info] Keyboard-interactive
(PAM) userauth failed[13] while authenticating: No account present for user
>
> Oct 19 11:20:29 sshd[20692]: [ID 800047 auth.info] Keyboard-interactive
(PAM) userauth failed[13] while authenticating: No account present for user
>
>
>
> So, I need to create a new rule that match with the message and configure
the active response with that new rule, right?
>
>

Yep. Where are you getting these logs from? I don't think I've seen openssh
logs like this in the past.

>
>
>
>
>
> -----Mensaje original-----
> De: [email protected] [mailto:[email protected]] En
nombre de dan (ddp)
> Enviado el: miércoles, 19 de octubre de 2016 12:11 p.m.
>
> Para: [email protected]
> Asunto: Re: [ossec-list] Active response
>
>
>
> On Wed, Oct 19, 2016 at 1:02 PM, Adiel Navarro <
[email protected]> wrote:
>
> > How can I check the active-responses scripts are running?
>
> >
>
>
>
> If there are entries in the active-responses.log file, the scripts are
running.
>
> If there are not entries in the log, you need to figure out why.
>
>
>
> > In the agent, I have the next lines inserted in ossec.conf to watch the
log files:
>
> >
>
> >  <localfile>
>
> >     <log_format>syslog</log_format>
>
> >     <location>/var/ossec/logs/active-responses.log</location>
>
> >   </localfile>
>
> >
>
> > How can I configure the rule?
>
> >
>
>
>
> On the OSSEC server add a rule to /var/ossec/rules/local_rules.xml
looking for the information in the log message.
>
>
>
> For instance, I have the following logs:
>
> Tue Oct 18 07:04:11 EDT 2016 /var/ossec/active-response/bin/pf.sh add
>
> - 42.112.31.172 1476788651.100797 5718
>
> Wed Oct 19 08:10:26 EDT 2016 /var/ossec/active-response/bin/pf.sh add
>
> - 117.211.159.74 1476879026.110618 5718
>
>
>
> My rules would be something like:
>
>
>
> <!-- Identify an active response log message --> <rule id="987654"
level="0">
>
>   <match>/var/ossec/active-response/bin</match>
>
>   <description>AR fired</description>
>
> </rule>
>
>
>
> <!-- Once the log message is identified, check to see if it is adding
something to ossec_fwtable --> <rule id="987655" level="10">
>
>    <if_sid>987654</if_sid>
>
>    <match>pf.sh add </match>
>
>    <description>pf.sh active response added an ip to the
blocklist.</description> </rule>
>
>
>
> After adding the rules the OSSEC processes on the server would have to be
restarted.
>
>
>
> I could make it fancier by creating a decoder, but it's probably not
necessary.
>
>
>
>
>
> > -----Mensaje original-----
>
> > De: [email protected] [mailto:[email protected]]
>
> > En nombre de dan (ddp) Enviado el: miércoles, 19 de octubre de 2016
11:56 a.m.
>
> > Para: [email protected]
>
> > Asunto: Re: [ossec-list] Active response
>
> >
>
> > On Wed, Oct 19, 2016 at 12:48 PM, Adiel Navarro <
[email protected]> wrote:
>
> >> How can I Configure ossec to watch the active response.log file will
fire an alert?
>
> >> Why active-responses.log is not writing?
>
> >>
>
> >
>
> > If active-responses.log is empty, it's probably because no active
response scripts are being run.
>
> >
>
> > Getting alerts when AR scripts are run is pretty simple. Setup a
localfile to watch the log file and create a rule to alert when there are
new entries.
>
> >
>
> >> In agent:
>
> >>
>
> >> <localfile>
>
> >>    <log_format>syslog</log_format>
>
> >>    <location>/var/ossec/logs/active-responses.log</location>
>
> >>   </localfile>
>
> >>
>
> >> -bash-3.2# ls -l /var/ossec/logs
>
> >> total 86
>
> >> -rw-r--r--      1   root       root               0 Oct 17 14:30
active-responses.log
>
> >> -rw-rw-r--   1 ossec    ossec      44032 Oct 17 14:29 ossec.log
>
> >>
>
> >> in the server:
>
> >> -bash-3.2# ls -l /var/ossec/logs
>
> >> total 7432
>
> >> -rw-rw---- 1 ossec ossec       0 May 19 10:01 active-responses.log
>
> >> drwxr-x--- 3 ossec ossec    4096 Oct 17 12:56 alerts
>
> >> drwxr-x--- 3 ossec ossec    4096 Oct 17 12:56 archives
>
> >> drwxr-x--- 3 ossec ossec    4096 Oct 17 12:56 firewall
>
> >> -rw-rw---- 1 ossec ossec 7582818 Oct 17 17:09 ossec.log
>
> >>
>
> >>
>
> >>
>
> >> -----Mensaje original-----
>
> >> De: [email protected] [mailto:[email protected]]
En nombre de dan (ddp) Enviado el: miércoles, 19 de octubre de 2016 07:50
a.m.
>
> >> Para: [email protected]
>
> >> Asunto: Re: [ossec-list] Active response
>
> >>
>
> >> On Wed, Oct 19, 2016 at 8:43 AM, dan (ddp) <[email protected]> wrote:
>
> >>> On Tue, Oct 18, 2016 at 6:54 PM, Aj Navarro <[email protected]>
wrote:
>
> >>
>
> >>>> Only I see the next messages in /var/ossec/logs/alers/alerts.log
>
> >>>>
>
> >>>> ** Alert 1476724188.107242: mail - syslog,errors,
>
> >>>>
>
> >>>> 2016 Oct 17 12:09:48 ixtrtc42scf->/var/log/messages
>
> >>>>
>
> >>>> Rule: 1002 (level 2) -> 'Unknown problem somewhere in the system.'
>
> >>>>
>
> >>>> Oct 17 12:09:48 ixtrtc42scf kernel: type=1100
>
> >>>> audit(1476724188.016:36149378): user pid=6141 uid=0 auid=4294967295
>
> >>>> ses=4294967295 msg=
>
> >>>>
>
> >>>> 'op=PAM:authentication acct="root" exe="/usr/sbin/sshd"
>
> >>>> hostname=10.188.62.176 addr=10.188.62.176 terminal=ssh res=failed'
>
> >>>>
>
> >>>
>
> >>> These log messages are not triggering 5712. In fact OSSEC isn't sure
>
> >>> what to do with these log messages.
>
> >>> Is there anything in your auth log?
>
> >>>
>
> >>
>
> >> Digging into it further, we get:
>
> >> # cat /tmp/yy | /var/ossec/bin/ossec-logtest -q
>
> >> 2016/10/19 08:44:09 ossec-testrule: INFO: Reading the lists file:
>
> >> 'rules/lists/ossec.block'
>
> >> 2016/10/19 08:44:09 ossec-testrule: INFO: Started (pid: 16098).
>
> >> ossec-testrule: Type one log per line.
>
> >>
>
> >> **Phase 1: Completed pre-decoding.
>
> >>        full event: 'Oct 17 12:09:48 ixtrtc42scf kernel: type=1100
>
> >> audit(1476724188.016:36149378): user pid=6141 uid=0 auid=4294967295
>
> >> ses=4294967295 msg='op=PAM:authentication acct="root"
>
> >> exe="/usr/sbin/sshd" hostname=10.188.62.176 addr=10.188.62.176
terminal=ssh res=failed''
>
> >>        hostname: 'ixtrtc42scf'
>
> >>        program_name: 'kernel'
>
> >>        log: 'type=1100 audit(1476724188.016:36149378): user pid=6141
>
> >> uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:authentication
>
> >> acct="root" exe="/usr/sbin/sshd" hostname=10.188.62.176
>
> >> addr=10.188.62.176 terminal=ssh res=failed''
>
> >>
>
> >> **Phase 2: Completed decoding.
>
> >>        decoder: 'iptables'
>
> >>
>
> >> **Phase 3: Completed filtering (rules).
>
> >>        Rule id: '1002'
>
> >>        Level: '2'
>
> >>        Description: 'Unknown problem somewhere in the system.'
>
> >> **Alert to be generated.
>
> >>
>
> >> So we'll have to create a decoder to deal with these odd log messages.
>
> >> Adding the following decoder to my local decoders file:
>
> >> <decoder name="wtf-iptables">
>
> >>   <parent>iptables</parent>
>
> >>   <prematch> exe="/usr/sbin/sshd" </prematch>
>
> >>   <!--<regex> acct="(\S+)" hostname="(\S+)" addr="(\S+)" </regex>-->
>
> >>   <regex> acct="(\S+)" exe="/\.+/sshd" hostname=(\S+) addr=(\S+)
</regex>
>
> >>   <order>user,dstip, srcip</order>
>
> >> </decoder>
>
> >>
>
> >> I get:
>
> >> **Phase 1: Completed pre-decoding.
>
> >>        full event: 'Oct 17 12:09:48 ixtrtc42scf kernel: type=1100
>
> >> audit(1476724188.016:36149378): user pid=6141 uid=0 auid=4294967295
>
> >> ses=4294967295 msg='op=PAM:authentication acct="root"
>
> >> exe="/usr/sbin/sshd" hostname=10.188.62.176 addr=10.188.62.176
terminal=ssh res=failed''
>
> >>        hostname: 'ixtrtc42scf'
>
> >>        program_name: 'kernel'
>
> >>        log: 'type=1100 audit(1476724188.016:36149378): user pid=6141
>
> >> uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:authentication
>
> >> acct="root" exe="/usr/sbin/sshd" hostname=10.188.62.176
>
> >> addr=10.188.62.176 terminal=ssh res=failed''
>
> >>
>
> >> **Phase 2: Completed decoding.
>
> >>        decoder: 'iptables'
>
> >>        dstuser: 'root'
>
> >>        dstip: '10.188.62.176'
>
> >>        srcip: '10.188.62.176'
>
> >>
>
> >> **Phase 3: Completed filtering (rules).
>
> >>        Rule id: '1002'
>
> >>        Level: '2'
>
> >>        Description: 'Unknown problem somewhere in the system.'
>
> >> **Alert to be generated.
>
> >>
>
> >>
>
> >> I haven't done any testing to see if this will affect anything else
though.
>
> >>
>
> >> --
>
> >>
>
> >> ---
>
> >> You received this message because you are subscribed to the Google
Groups "ossec-list" group.
>
> >> To unsubscribe from this group and stop receiving emails from it, send
an email to [email protected].
>
> >> For more options, visit https://groups.google.com/d/optout.
>
> >>
>
> >> --
>
> >>
>
> >> ---
>
> >> You received this message because you are subscribed to the Google
Groups "ossec-list" group.
>
> >> To unsubscribe from this group and stop receiving emails from it, send
an email to [email protected].
>
> >> For more options, visit https://groups.google.com/d/optout.
>
> >
>
> > --
>
> >
>
> > ---
>
> > You received this message because you are subscribed to the Google
Groups "ossec-list" group.
>
> > To unsubscribe from this group and stop receiving emails from it, send
an email to [email protected].
>
> > For more options, visit https://groups.google.com/d/optout.
>
> >
>
> > --
>
> >
>
> > ---
>
> > You received this message because you are subscribed to the Google
Groups "ossec-list" group.
>
> > To unsubscribe from this group and stop receiving emails from it, send
an email to [email protected].
>
> > For more options, visit https://groups.google.com/d/optout.
>
>
>
> --
>
>
>
> ---
>
> You received this message because you are subscribed to the Google Groups
"ossec-list" group.
>
> To unsubscribe from this group and stop receiving emails from it, send an
email to [email protected].
>
> For more options, visit https://groups.google.com/d/optout.
>
> --
>
> ---
> You received this message because you are subscribed to the Google Groups
"ossec-list" group.
> To unsubscribe from this group and stop receiving emails from it, send an
email to [email protected].
> For more options, visit https://groups.google.com/d/optout.

-- 

--- 
You received this message because you are subscribed to the Google Groups 
"ossec-list" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
For more options, visit https://groups.google.com/d/optout.

Reply via email to