On Nov 19, 2016 15:17, "Zach Ogden" <[email protected]> wrote:
> Hello, > > I am running the Windows Linux Subsystem on Windows 10. I installed ossec > on the debian bash system. I ran the ./install.sh file my normal user with > sudo in front of the script. Installation was successful. I cannot start > the services correctly. I receive the following error: > > > > */var/ossec/bin/ossec-logtest -v*2016/11/19 15:08:25 > ossec-testrule(1132): ERROR: Unable to chroot to directory '/var/ossec' due > to [(38)-(Function not implemented)]. > > */var/ossec/bin/ossec-analysisd -V* > > OSSEC HIDS v2.9.0 - Trend Micro Inc. > > */etc/ossec-init.conf* > > root@PC:/ossec-hids/src# > root@PC:/ossec-hids/src# > root@PC:/ossec-hids/src# > root@PC:/ossec-hids/src# > root@PC:/ossec-hids/src# cat /etc/ossec-init.conf > DIRECTORY="/var/ossec" > VERSION="v2.9.0" > DATE="Sat Nov 19 14:57:02 STD 2016" > TYPE="server" > > /var/ossec/etc/ossec.conf > > <ossec_config> > <global> > <email_notification>yes</email_notification> > <email_to>[email protected]</email_to> > <smtp_server>alt3.gmail-smtp-in.l.google.com.</smtp_server> > <email_from>ossecm@ZWO-PC</email_from> > </global> > > > <syscheck> > <!-- Frequency that syscheck is executed - default to every 22 hours > --> > <frequency>79200</frequency> > > <!-- Directories to check (perform all possible verifications) --> > <directories check_all="yes">/etc,/usr/bin,/usr/sbin</directories> > <directories check_all="yes">/bin,/sbin,/boot</directories> > > <!-- Files/directories to ignore --> > <ignore>/etc/mtab</ignore> > <ignore>/etc/mnttab</ignore> > <ignore>/etc/hosts.deny</ignore> > <ignore>/etc/mail/statistics</ignore> > <ignore>/etc/random-seed</ignore> > <ignore>/etc/adjtime</ignore> > <ignore>/etc/httpd/logs</ignore> > <ignore>/etc/utmpx</ignore> > <ignore>/etc/wtmpx</ignore> > <ignore>/etc/cups/certs</ignore> > <ignore>/etc/dumpdates</ignore> > <ignore>/etc/svc/volatile</ignore> > > <!-- Windows files to ignore --> > <ignore>C:\WINDOWS/System32/LogFiles</ignore> > <ignore>C:\WINDOWS/Debug</ignore> > <ignore>C:\WINDOWS/WindowsUpdate.log</ignore> > <ignore>C:\WINDOWS/iis6.log</ignore> > <ignore>C:\WINDOWS/system32/wbem/Logs</ignore> > <ignore>C:\WINDOWS/system32/wbem/Repository</ignore> > <ignore>C:\WINDOWS/Prefetch</ignore> > <ignore>C:\WINDOWS/PCHEALTH/HELPCTR/DataColl</ignore> > <ignore>C:\WINDOWS/SoftwareDistribution</ignore> > <ignore>C:\WINDOWS/Temp</ignore> > <ignore>C:\WINDOWS/system32/config</ignore> > <ignore>C:\WINDOWS/system32/spool</ignore> > <ignore>C:\WINDOWS/system32/CatRoot</ignore> > </syscheck> > > <rootcheck> > <rootkit_files>/var/ossec/etc/shared/rootkit_files.txt</rootkit_files> > <rootkit_trojans>/var/ossec/etc/shared/rootkit_trojans. > txt</rootkit_trojans> > <system_audit>/var/ossec/etc/shared/system_audit_rcl.txt</ > system_audit> > <system_audit>/var/ossec/etc/shared/cis_debian_linux_rcl. > txt</system_audit> > <system_audit>/var/ossec/etc/shared/cis_rhel_linux_rcl.txt< > /system_audit> > <system_audit>/var/ossec/etc/shared/cis_rhel5_linux_rcl. > txt</system_audit> > </rootcheck> > > <global> > <white_list>127.0.0.1</white_list> > <white_list>::1</white_list> > <white_list>^localhost.localdomain$</white_list> > <white_list>192.168.1.1</white_list> > <white_list>192.168.1.1</white_list> > <white_list>fec0:0:0:ffff::1</white_list> > </global> > > <remote> > <connection>syslog</connection> > </remote> > > <remote> > <connection>secure</connection> > </remote> > > <alerts> > <log_alert_level>1</log_alert_level> > <email_alert_level>7</email_alert_level> > </alerts> > > <command> > <name>host-deny</name> > <executable>host-deny.sh</executable> > <expect>srcip</expect> > <timeout_allowed>yes</timeout_allowed> > </command> > > <command> > <name>firewall-drop</name> > <executable>firewall-drop.sh</executable> > <expect>srcip</expect> > <timeout_allowed>yes</timeout_allowed> > </command> > > <command> > <name>disable-account</name> > <executable>disable-account.sh</executable> > <expect>user</expect> > <timeout_allowed>yes</timeout_allowed> > </command> > > <command> > <name>restart-ossec</name> > <executable>restart-ossec.sh</executable> > <expect></expect> > </command> > > > <command> > <name>route-null</name> > <executable>route-null.sh</executable> > <expect>srcip</expect> > <timeout_allowed>yes</timeout_allowed> > </command> > > > <!-- Active Response Config --> > <active-response> > <!-- This response is going to execute the host-deny > - command for every event that fires a rule with > - level (severity) >= 6. > - The IP is going to be blocked for 600 seconds. > --> > <command>host-deny</command> > <location>local</location> > <level>6</level> > <timeout>600</timeout> > </active-response> > > <active-response> > <!-- Firewall Drop response. Block the IP for > - 600 seconds on the firewall (iptables, > - ipfilter, etc). > --> > <command>firewall-drop</command> > <location>local</location> > <level>6</level> > <timeout>600</timeout> > </active-response> > > <!-- Files to monitor (localfiles) --> > > <localfile> > <log_format>syslog</log_format> > <location>/var/log/dpkg.log</location> > </localfile> > > <localfile> > <log_format>command</log_format> > <command>df -P</command> > </localfile> > > <localfile> > <log_format>full_command</log_format> > <command>netstat -tan |grep LISTEN |egrep -v '(127.0.0.1| ::1)' | > sort</command> > </localfile> > > <localfile> > <log_format>full_command</log_format> > <command>last -n 5</command> > </localfile> > </ossec_config> > > <ossec_config> <!-- rules global entry --> > <rules> > <include>rules_config.xml</include> > <include>pam_rules.xml</include> > <include>sshd_rules.xml</include> > <include>telnetd_rules.xml</include> > <include>syslog_rules.xml</include> > <include>arpwatch_rules.xml</include> > <include>symantec-av_rules.xml</include> > <include>symantec-ws_rules.xml</include> > <include>pix_rules.xml</include> > <include>named_rules.xml</include> > <include>smbd_rules.xml</include> > <include>vsftpd_rules.xml</include> > <include>pure-ftpd_rules.xml</include> > <include>proftpd_rules.xml</include> > <include>ms_ftpd_rules.xml</include> > <include>ftpd_rules.xml</include> > <include>hordeimp_rules.xml</include> > <include>roundcube_rules.xml</include> > <include>wordpress_rules.xml</include> > <include>cimserver_rules.xml</include> > <include>vpopmail_rules.xml</include> > <include>vmpop3d_rules.xml</include> > <include>courier_rules.xml</include> > <include>web_rules.xml</include> > <include>web_appsec_rules.xml</include> > <include>apache_rules.xml</include> > <include>nginx_rules.xml</include> > <include>php_rules.xml</include> > <include>mysql_rules.xml</include> > <include>postgresql_rules.xml</include> > <include>ids_rules.xml</include> > <include>squid_rules.xml</include> > <include>firewall_rules.xml</include> > <include>apparmor_rules.xml</include> > <include>cisco-ios_rules.xml</include> > <include>netscreenfw_rules.xml</include> > <include>sonicwall_rules.xml</include> > <include>postfix_rules.xml</include> > <include>sendmail_rules.xml</include> > <include>imapd_rules.xml</include> > <include>mailscanner_rules.xml</include> > <include>dovecot_rules.xml</include> > <include>ms-exchange_rules.xml</include> > <include>racoon_rules.xml</include> > <include>vpn_concentrator_rules.xml</include> > <include>spamd_rules.xml</include> > <include>msauth_rules.xml</include> > <include>mcafee_av_rules.xml</include> > <include>trend-osce_rules.xml</include> > <include>ms-se_rules.xml</include> > <!-- <include>policy_rules.xml</include> --> > <include>zeus_rules.xml</include> > <include>solaris_bsm_rules.xml</include> > <include>vmware_rules.xml</include> > <include>ms_dhcp_rules.xml</include> > <include>asterisk_rules.xml</include> > <include>ossec_rules.xml</include> > <include>attack_rules.xml</include> > <include>openbsd_rules.xml</include> > <include>clam_av_rules.xml</include> > <include>dropbear_rules.xml</include> > <include>sysmon_rules.xml</include> > <include>opensmtpd_rules.xml</include> > <include>local_rules.xml</include> > </rules> > </ossec_config> <!-- rules global entry --> > > *Content of /var/ossec/logs/ossec.log* > > 2016/11/19 14:57:03 ossec-testrule(1132): ERROR: Unable to chroot to > directory '/var/ossec' due to [(38)-(Function not implemented)]. > 2016/11/19 14:57:36 ossec-testrule(1132): ERROR: Unable to chroot to > directory '/var/ossec' due to [(38)-(Function not implemented)]. > 2016/11/19 15:01:04 manage_agents(1132): ERROR: Unable to chroot to > directory '/var/ossec' due to [(38)-(Function not implemented)]. > 2016/11/19 15:08:25 ossec-testrule(1132): ERROR: Unable to chroot to > directory '/var/ossec' due to [(38)-(Function not implemented)]. > 2016/11/19 15:11:48 ossec-testrule(1132): ERROR: Unable to chroot to > directory '/var/ossec' due to [(38)-(Function not implemented)]. > > > > *uname -a* > Linux PC 3.4.0+ #1 PREEMPT Thu Aug 1 17:06:05 CST 2013 x86_64 x86_64 > x86_64 GNU/Linux > > Regards, > Zach > -- --- You received this message because you are subscribed to the Google Groups "ossec-list" group. To unsubscribe from this group and stop receiving emails from it, send an email to [email protected]. For more options, visit https://groups.google.com/d/optout.
