Juan:

Here is the link to the GIT pull request I submitted:

https://github.com/inverse-inc/packetfence/pull/122

The new file makes use of the Perl File::Tail module that I do not think is 
included with PF by default.  It is very simple to install it though.

My code also assumes that your network is a 10.0.0.0/8 based network, you may 
need to change that or you can remove that check if you want.  It was put there 
to keep from trying to fire off violations on hosts outside of your own 
network.  If this check is not in place PF will log an error when it tries to 
open a violation since it cant map the MAC to the IP of the remote system.  Not 
a huge problem, but it does waste resources.

~90% of the file is copied from the current PFDetect module, I just replaced 
the log parsing logic with some that correctly pulls out the necessary bits 
from the syslog entries I get from SecurityOnion.

On my SO box I followed the instructions from here:

https://code.google.com/p/security-onion/wiki/ThirdPartyIntegration

This is written for SO but should be easily adaptable to any service sending 
syslogs.

I also put a cron job in my PF server to rotate the new syslog file every day 
with no retention since the info in that file already exist on the SO server 
and if it was actionable data PF would log that in its own logs.

I am still learning Perl and as such the quality of my code can almost 
assuredly be improved upon.  If you do make any improvements please contribute 
them back if you can.

Now that I have PF working with SO I am resting much easier at night : )

Good luck in your integration!

Jake Sallee
Godfather of Bandwidth
System Engineer
University of Mary Hardin-Baylor

900 College St.
Belton, Texas
76513

Fone: 254-295-4658
Phax: 254-295-4221
________________________________
From: Juan Camilo Valencia [juan.valen...@seguratec.com.co]
Sent: Tuesday, March 04, 2014 10:18 AM
To: packetfence-devel@lists.sourceforge.net
Subject: Re: [PacketFence-devel] Fwd: OSSEC Integration

Hi Jake,

Thanks a lot, I was following your thread last month and look very 
insteresting, if you share with me what you did that will help me figure it out 
several things, Iĺl appreciate if you can send me that, at the same time I'll 
share with you guys how the things going with the integration.

Thanks a lot,


On Tue, Mar 4, 2014 at 10:17 AM, Sallee, Jake 
<jake.sal...@umhb.edu<mailto:jake.sal...@umhb.edu>> wrote:
Juan:

What you are doing is very similar to what I am doing.

I am using a solution called SecurityOnion which is a NSM Linux Distribution 
that has OSSEC built in along with several other tools.

I wrote some custom code to integrate it with PF which you are welcome to use 
if you want.  I have been using it in my testing environment for several weeks 
and it has been very solid.

It may not be exactly what you are looking for but it may help you get started.

If you are interested please let me know and I will post the code here.

Good luck.

Jake Sallee
Godfather of Bandwidth
System Engineer
University of Mary Hardin-Baylor

900 College St.
Belton, Texas
76513

Fone: 254-295-4658
Phax: 254-295-4221
________________________________
From: Juan Camilo Valencia 
[juan.valen...@seguratec.com.co<mailto:juan.valen...@seguratec.com.co>]
Sent: Monday, March 03, 2014 1:37 PM
To: 
packetfence-devel@lists.sourceforge.net<mailto:packetfence-devel@lists.sourceforge.net>
Subject: Re: [PacketFence-devel] Fwd: OSSEC Integration

Hi Jason,

I'm going to try to summarize my idea because is based on what i have been read 
on the official website and in several forums and articles.

My idea is to have PF centralized in out-of-band mode, with snort configured 
and nessus scan. This is what we got right now in an older version.

The idea is to expand this deployment and begin install sensors in the network. 
That sensor should contain snort, ossec-server, and pfdetector. Since ossec  
deployment is capable to obtain a lot of information from the agents and then 
analyze that data through decoders and finally trigger alerts from rules, my 
integration idea is read that alert log, obtain data, srcip, alertid, 
hostname(if possible),etc, all data useful for pf. Then pfsensor parse and send 
that data to the centralize server and pf should take an action.

The idea is to modify the code in a way that we have another configuration 
option for violations, just like snort, suricata, nessus, u openvas.

So far my biggest worries here are the kind of info that ossec send, I couldn't 
see the IP in logs, only hostname, but I need more test I started this morning, 
and the deployment of the agents in the client.

Sorry for my bad English, let me know if the idea is clear or if I can explain 
better,

Best Regards from Colombia,


On Mon, Mar 3, 2014 at 12:51 PM, Jason Frisvold 
<xenoph...@godshell.com<mailto:xenoph...@godshell.com><mailto:xenoph...@godshell.com<mailto:xenoph...@godshell.com>>>
 wrote:
Juan Camilo Valencia wrote:
> Hi Loick,
>
> Thanks for your quick reply, let me know what can I do to help achieve
> this feature, I am not the most versatile guy in perl but I can't learn,
> and for testing right now I'm setting up the environment with 4.1 appliance.

Ok, I'm intrigued ..  What sort of integration are you talking about?
OSSEC is incredibly powerful, but I'm not sure how it fits together with
Packetfence, beyond the PF server being a client..

> Thanks a lot,
>
> Best regards from Colombia,

--
---------------------------
Jason 'XenoPhage' Frisvold
xenoph...@godshell.com<mailto:xenoph...@godshell.com><mailto:xenoph...@godshell.com<mailto:xenoph...@godshell.com>>
---------------------------

"Any sufficiently advanced magic is indistinguishable from technology.\"
- Niven's Inverse of Clarke's Third Law

------------------------------------------------------------------------------
Subversion Kills Productivity. Get off Subversion & Make the Move to Perforce.
With Perforce, you get hassle-free workflows. Merge that actually works.
Faster operations. Version large binaries.  Built-in WAN optimization and the
freedom to use Git, Perforce or both. Make the move to Perforce.
http://pubads.g.doubleclick.net/gampad/clk?id=122218951&iu=/4140/ostg.clktrk
_______________________________________________
PacketFence-devel mailing list
PacketFence-devel@lists.sourceforge.net<mailto:PacketFence-devel@lists.sourceforge.net><mailto:PacketFence-devel@lists.sourceforge.net<mailto:PacketFence-devel@lists.sourceforge.net>>
https://lists.sourceforge.net/lists/listinfo/packetfence-devel



--
JUAN CAMILO VALENCIA VARGAS
Ingeniero de Operaciones
SeguraTec S.A.S
Calle 11 # 43B-50 of 307
Medelllín Colombia

“Choose a job you love, and you will never have to work a day in your life”

------------------------------------------------------------------------------
Subversion Kills Productivity. Get off Subversion & Make the Move to Perforce.
With Perforce, you get hassle-free workflows. Merge that actually works.
Faster operations. Version large binaries.  Built-in WAN optimization and the
freedom to use Git, Perforce or both. Make the move to Perforce.
http://pubads.g.doubleclick.net/gampad/clk?id=122218951&iu=/4140/ostg.clktrk
_______________________________________________
PacketFence-devel mailing list
PacketFence-devel@lists.sourceforge.net<mailto:PacketFence-devel@lists.sourceforge.net>
https://lists.sourceforge.net/lists/listinfo/packetfence-devel



--
JUAN CAMILO VALENCIA VARGAS
Ingeniero de Operaciones
SeguraTec S.A.S
Calle 11 # 43B-50 of 307
Medelllín Colombia

“Choose a job you love, and you will never have to work a day in your life”

------------------------------------------------------------------------------
Subversion Kills Productivity. Get off Subversion & Make the Move to Perforce.
With Perforce, you get hassle-free workflows. Merge that actually works. 
Faster operations. Version large binaries.  Built-in WAN optimization and the
freedom to use Git, Perforce or both. Make the move to Perforce.
http://pubads.g.doubleclick.net/gampad/clk?id=122218951&iu=/4140/ostg.clktrk
_______________________________________________
PacketFence-devel mailing list
PacketFence-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-devel

Reply via email to