Hi,
I am still having problem with nessus scan & violation...any helps is
appreciated!!
I have successfuly created a scan policy and I can manually a execute
scan using command pfcmd schedule now <IP>.
*
I see this in packetfence.log:
*
Aug 18 16:16:32 pfcmd(0) INFO: executing
HOME=/usr/local/pf/conf/nessus/ /opt/nessus/bin/nessus -q -V -x
--dot-nessus /usr/local/pf/conf/nessus/remotescan.nessus --policy-name
RemoteScan 10.0.10.21 1241 admin <password> --target-file
/tmp/pf_nessus_192.168.2.15_2011-08-18-16:16:32.txt
/usr/local/pf/html/admin/scan/results/dump_192.168.2.15_2011-08-18-16:16:32.nbe
(pf::scan::runScan)
*
A dump file created at
/usr/local/pf/html/admin/scan/result/dump_192.168.2.15_2011-08-18-16\:16\:32.nbe
*
cat dump_192.168.2.15_2011-08-18-16\:16\:32.nbe
timestamps|||scan_start|Thu Aug 18 16:32:47 2011|
timestamps||192.168.2.15|host_start|Thu Aug 18 16:33:15 2011|
results|192.168.2|192.168.2.15|netbios-ssn (139/tcp)
results|192.168.2|192.168.2.15|epmap (135/tcp)
results|192.168.2|192.168.2.15|device2 (2030/tcp)
results|192.168.2|192.168.2.15|de-cache-query (1255/tcp)
results|192.168.2|192.168.2.15|serialgateway (1243/tcp)
results|192.168.2|192.168.2.15|netbios-ssn (139/tcp)|21725|Security
Hole|\nSynopsis :\n\nSymantec Antivirus Corporate is
installed.\n\nDescription :\n\nThis plugin checks that the remote host
has Symantec Antivirus \nCorporate installed and properly running, and
makes sure that the latest \nVdefs are loaded.\n\nSolution :\n\nMake
sure SAVCE is installed, running and using the latest
VDEFS.\n\nRiskfactor :\n\nCritical / CVSS Base Score :
10.0\n(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)\n\nPlugin output :\n\nThe
remote host has an antivirus software from Symantec installed. It has
\nbeen fingerprinted as :\n\nSymantec Endpoint Protection :
13.0.6000.513\nDAT version : 20110617\n\nThe remote host has an
out-dated version of the Symantec \nCorporate virus signatures. Last
version is 20110713\n\nAs aresult, the remote host might be infected
by viruses received by\nemail or other
means.\n\ntimestamps||192.168.2.15|host_end|Thu Aug 18 16:33:51
2011|timestamps|||scan_end|Thu Aug18 16:33:52 2011|
*
Now I try register a laptop to see if it find violation
*
packetfence log:
Aug 18 16:28:03 redir.cgi(0) INFO: 00:21:70:90:4e:2f being redirected
(ModPerl::ROOT::ModPerl::PerlRun::usr_local_pf_cgi_2dbin_redir_2ecgi::handler)
Aug 18 16:28:03 redir.cgi(0) INFO: Updating node 00:21:70:90:4e:2f
user_agent with useragent: 'Mozilla/4.0 (compatible; MSIE 8.0; Windows
NT 5.1; Trident/4.0; .NET CLR 1.1.4322; .NET CLR 2.0.50727; .NET CLR
3.0.04506.30; .NET CLR 3.0.04506.648; .NET CLR 3.0.4506.2152; .NET CLR
3.5.30729)' (pf::web::web_node_record_user_agent)
Aug 18 16:28:03 redir.cgi(0) INFO: Static User-Agent lookup data
initialized (pf::useragent::_init)
Aug 18 16:28:03 redir.cgi(0) INFO: 00:21:70:90:4e:2f redirected to
registration page
(ModPerl::ROOT::ModPerl::PerlRun::usr_local_pf_cgi_2dbin_redir_2ecgi::handler)
Aug 18 16:28:08 register.cgi(0) INFO: 192.168.2.15 - 00:21:70:90:4e:2f
(ModPerl::ROOT::ModPerl::PerlRun::usr_local_pf_cgi_2dbin_register_2ecgi::handler)
Aug 18 16:28:20 register.cgi(0) INFO: 192.168.2.15 - 00:21:70:90:4e:2f
(ModPerl::ROOT::ModPerl::PerlRun::usr_local_pf_cgi_2dbin_register_2ecgi::handler)
Aug 18 16:28:20 register.cgi(0) INFO: calling /usr/local/pf/bin/pfcmd
'manage register 00:21:70:90:4e:2f "usertest"
pid="1",user_agent="Mozilla 4.0 compatible; MSIE 8.0; Windows NT 5.1;
Trident 4.0; .NET CLR 1.1.4322; .NET CLR 2.0.50727; .NET CLR
3.0.04506.30; .NET CLR 3.0.04506.648; .NET CLR 3.0.4506.2152; .NET CLR
3.5.30729 "' (pf::web::_sanitize_and_register)
Aug 18 16:28:21 pfcmd(0) INFO: grace expired on violation 1200001 for
node 00:21:70:90:4e:2f (pf::violation::violation_add)
Aug 18 16:28:21 pfcmd(0) INFO: violation 1200001 added for
00:21:70:90:4e:2f (pf::violation::violation_add)
Aug 18 16:28:21 pfcmd(0) INFO: executing action 'log' on class 1200001
(pf::action::action_execute)
Aug 18 16:28:21 pfcmd(0) INFO: /usr/local/pf/logs/violation.log
2011-08-18 16:28:21: System Scan (1200001) detected on node
00:21:70:90:4e:2f (192.168.2.15) (pf::action::action_log)
Aug 18 16:28:21 pfcmd(0) INFO: executing action 'trap' on class
1200001 (pf::action::action_execute)
Aug 18 16:28:21 pfcmd(0) INFO: VLAN isolation is enabled and
manage_register is part of adjustswitchportvlanreasons
(main::vlan_reevaluation)
Aug 18 16:28:21 pfcmd(0) INFO: 00:21:70:90:4e:2f is currentlog
connected at 10.0.10.2 ifIndex 10105 in VLAN 2 (main::vlan_reevaluation)
Aug 18 16:28:21 pfcmd(0) INFO: highest priority violation for
00:21:70:90:4e:2f is 1200001. Target VLAN for violation:
registrationVlan (2) (pf::vlan::getViolationVlan)
Aug 18 16:28:21 register.cgi(0) INFO: more violations yet to come for
00:21:70:90:4e:2f
(ModPerl::ROOT::ModPerl::PerlRun::usr_local_pf_cgi_2dbin_register_2ecgi::handler)
Aug 18 16:28:21 redir.cgi(0) INFO: 00:21:70:90:4e:2f being redirected
(ModPerl::ROOT::ModPerl::PerlRun::usr_local_pf_cgi_2dbin_redir_2ecgi::handler)
Aug 18 16:28:21 redir.cgi(0) INFO: captive portal redirect on
violation vid: 1200001, redirect url:
/content/index.php?template=system_scan&admin=yes
(ModPerl::ROOT::ModPerl::PerlRun::usr_local_pf_cgi_2dbin_redir_2ecgi::handler)
Aug 18 16:28:21 redir.cgi(0) INFO: 00:21:70:90:4e:2f being redirected
(ModPerl::ROOT::ModPerl::PerlRun::usr_local_pf_cgi_2dbin_redir_2ecgi::handler)
Aug 18 16:28:21 redir.cgi(0) INFO: captive portal redirect on
violation vid: 1200001, redirect url:
/content/index.php?template=system_scan&admin=yes
(ModPerl::ROOT::ModPerl::PerlRun::usr_local_pf_cgi_2dbin_redir_2ecgi::handler)
*
On the laptop I see Quanrantine Established page and if I hit scan, I
will see this on my log file but nothing is scan
*
Aug 18 16:31:36 release.cgi(0) INFO: scanning 192.168.2.15 by
calling*/usr/local/pf/bin/pfcmd schedule now 192.168.2.15 1>/dev/null
2>&1
*(ModPerl::ROOT::ModPerl::PerlRun::usr_local_pf_cgi_2dbin_release_2ecgi::handler)
Aug 18 16:31:36 release.cgi(0) INFO: violation for mac
00:21:70:90:4e:2f vid 1200001 modified (pf::violation::violation_modify)
*
It seems it execute the command but nothing happening. if I check at
packetfence Violation tab I see System scan (1200001) with status
open. For some reasons my Scan ID 1200003 was never detected.
**
This is my pf.conf file
*
[general]
#
# general.domain
#
# Domain name of PacketFence system.
domain=packetfence.local
#
# general.hostname
#
# Hostname of PacketFence system. This is concatenated with the domain
in Apache rewriting rules and therefore must be resolvable by clients.
hostname=pf-zen
#
# general.dnsservers
#
# Comma-delimited list of DNS servers. Passthroughs are created to
allow queries to these servers from even "trapped" nodes.
dnsservers=10.0.10.10
#
# general.dhcpservers
#
# Comma-delimited list of DHCP servers. Passthroughs are created to
allow DHCP transactions from even "trapped" nodes.
dhcpservers=10.0.10.10
[network]
#
# network.mode
#
# Defines the mode in which PacketFence will operate.
#
# When deployed in arp mode, PacketFence uses ARP manipulation inject
itself into the datastream of unregistered or
# trapped nodes. The major failing of arp mode is that
# it's not 100% in catching all traffic - spurious packets can and
will occasionaly get through.
mode=vlan
[trapping]
#
# trapping.testing
#
# Disables sending of ARPs - note that this has implications on node
detection and timeouts.
testing=disabled
#
# trapping.range
#
# Comma-delimited list of address ranges/CIDR blocks that PacketFence
will monitor/detect/trap on. Gateway, network, and
# broadcast addresses are ignored.
range=10.0.10.0/24,192.168.2.0/24,192.168.3.0/24
#
# trapping.registration
#
# If enabled, nodes will be required to register on first network
access. Further registration options are configured in the
# registration section.
registration=enabled
detection=enabled
[registration]
auth=ldap
#
[database]
#
# database.pass
#
# Password for the mysql database used by PacketFence.
pass=pfz3n
[vlan]
#
# vlan.dhcpd
#
# Should DHCPd be started ?
#
dhcpd=enabled
#
#
# vlan.named
#
# Should named be started ?
#
named=enabled
[interface eth0]
mask=255.255.255.0
type=dhcplistener,internal,managed,monitor
gateway=10.0.10.1
ip=10.0.10.10
authorizedips=
[captive_portal]
network_detection_ip=10.0.10.10,10.0.10.0/24,192.168.2.0/24
[scan]
ssl=enabled
pass=password
user=admin
port=1241
host=10.0.10.21
registration=enabled
nessusclient_file=remotescan.nessus
nessusclient_policy=RemoteScan
live_tids=21725
*
This is my violations.conf
*
# Most of the snort rules are from Emerging Threats
(http://www.emergingthreats.net/)
#
# In order to use different rulesets, please point the variable
snort_rules,
# defined below (in [defaults]), to your local file(s).
#
[defaults]
priority=4
max_enable=3
actions=trap,email,log
auto_enable=Y
disable=Y
grace=120m
button_text=Enable Network
snort_rules=local.rules,emerging-attack_response.rules,emerging-botcc.rules,emerging-exploit.rules,emerging-malwar
e.rules,emerging-p2p.rules,emerging-scan.rules,emerging-shellcode.rules,emerging-trojan.rules,emerging-virus.rules
,emerging-worm.rules
# vlan: The vlan parameter allows you to define in what vlan a node
with a violation will be put in.
# accepted values are the vlan names: isolationVlan, normalVlan,
registrationVlan, macDetectionVlan, guestVlan,
# customVlan1, customVlan2, customVlan3, customVlan4, customVlan5
# (see switches.conf)
vlan=isolationVlan
# if you add a category here, nodes in these categories will be immune
to the violation
whitelisted_categories=
[1100001]
desc=Scan
url=/content/index.php?template=failed_scan
priority=4
max_enable=4
button_text=Scan my computer again
trigger=Scan::21725,Scan::10861,Scan::10943,Scan::11177,Scan::11231,Scan::11302,Scan::11304,Scan::11528,Scan::1159
5,Scan::11664,Scan::11787,Scan::11790,Scan::11803,Scan::11808,Scan::11835,Scan::11878,Scan::11886,Scan::11887,Scan
::11921,Scan::12051,Scan::12052,Scan::12054,Scan::12092,Scan::12208,Scan::12209,Scan::13641,Scan::13852,Scan::1472
4,Scan::15460,Scan::15894,Scan::15970,Scan::16324,Scan::16326,Scan::16327,Scan::16328,Scan::16329,Scan::18020,Scan
::18021,Scan::18023,Scan::18025,Scan::18027,Scan::18028,Scan::18215,Scan::18482,Scan::18483,Scan::18490,Scan::1850
2,Scan::18681,Scan::18682,Scan::19401,Scan::19402,Scan::19406,Scan::19408,Scan::20005,Scan::20172,Scan::20299,Scan
::20368,Scan::20382,Scan::20389,Scan::20390,Scan::20904,Scan::20905,Scan::21213,Scan::21332,Scan::21685,Scan::2168
7,Scan::22030,Scan::22034,Scan::22183,Scan::22184,Scan::22185,Scan::22186,Scan::22187,Scan::22192,Scan::22194,Scan
::22332,Scan::22449,Scan::22530,Scan::23644,Scan::23646,Scan::23647,Scan::23833,Scan::23835,Scan::23837,Scan::2383
8,Scan::23999,Scan::24000
actions=email,log,trap
disable=N
# for faster remediation, it is recommended to leave an offending
client in the registration vlan (where it is sca
nned)
vlan=registrationVlan
#
# Example config to block a whole class of devices based on their MAC
address
# Trigger format: The number is a decimal representation of the OUI
(Vendor) portion of the MAC.
# To generate such a representation you can use perl -e "print
hex('001620');"
# There is a copy of the oui.txt file in conf/ to help you match
vendor name and vendor mac.
#
[1100002]
desc=MAC Vendor isolation example
url=/content/index.php?template=banned_devices
trigger=VENDORMAC::5664
actions=trap,email,log
disable=Y
#
# Example config to block an OS based on their dhcp fingerprint
# Trigger format: an id (defined as os_id in os_type table)
# Right now the only way to find the os id is to query the database
but it should be feasible
# from the pfcmd tool or the web gui in the future.
# From a MySQL prompt, a 'select * from os_type;' will give you what
you need. Just put in
# the os_id next to OS::. In exemple to block Windows 95 you would
use: OS::104
#
# The below example blocks Windows 95, 98, 98SE, NT4 and ME.
#
[1100003]
desc=Ancient OS isolation example
url=/content/index.php?template=banned_os
trigger=OS::104,OS::103,OS::106,OS::105,OS::102,OS::100
actions=trap,email,log
disable=N
#
# Example config to block a specific Browser User Agent
# This works in the same way as OS does.
# Trigger format: an id (as in configuration -> user-agent )
#
[1100004]
desc=Browser isolation example
url=/content/index.php?template=banned_devices
trigger=USERAGENT::101,USERAGENT::102
actions=trap,email,log
disable=Y
[1100005]
desc=P2P Isolation (snort example)
url=/content/index.php?template=p2p
trigger=Detect::2001808,Detect::2000334,Detect::2000357,Detect::2000369,Detect::2000330,Detect::2000331,Detect::2000332,Detect::2000333,Detect::2001296,Detect::2001297,Detect::2001298,Detect::2001299,Detect::2001305,Detect::2001300,Detect::2001664,Detect::2002760,Detect::2002761,Detect::2001796,Detect::2001812
actions=trap,email,log
disable=Y
[1100006]
desc=Auto-register Device example
priority=1
trigger=OS::3,OS::6,OS::7,OS::8,OS::10,OS::12,OS::13
actions=log,autoreg
disable=Y
[1100007]
desc=Disable NATing Routers and APs
url=/content/index.php?template=nat
trigger=Detect::1100005,Detect::1100006,Detect::1100007,OS::4
actions=trap,email,log
disable=Y
[1100010]
desc=Rogue DHCP
url=/content/index.php?template=roguedhcp
actions=email,log
trigger=
disable=Y
#
# 1200000 - 120099 Reserved for required administration violations
#
[1200001]
priority=9
desc=System Scan
url=/content/index.php?template=system_scan&admin=yes
actions=log,trap
button_text=Scan
trigger=
disable=N
vlan=registrationVlan
*
[1200003]
priority=1
desc=Check Antivirus Updates
url=/content/index.php?template=system_scan&admin=yes
actions=email,log,trap
priority=1
trigger=Scan::21725
disable=N
max_enable=1
vlan=registrationVlan
*
#
# Scan is taking place in the registration vlan don't change this value.
#
# 1300000 - 1399999 Reserved for PacketFence violations
#
[1300000]
desc=Generic
priority=8
actions=trap,log
url=/content/index.php?template=generic
disable=N
[1300001]
desc=Spam
priority=6
actions=trap,log
url=/content/index.php?template=spam
disable=N
#
# 1400000 - 1499999 Reserved for local violations
#
#
# 2000000 - 2099999 Snort violations
#
[2000000]
desc=Malware
priority=4
url=/content/index.php?template=malware
disable=Y
action=trap,email,log
# For conficker:
Detect::2008802,Detect::2008803,Detect::2009024,Detect::2009114,Detect::2009200,Detect::2009201
trigger=Detect::2008802,Detect::2008803,Detect::2009024,Detect::2009114,Detect::2009200,Detect::2009201
[2000032]
desc=LSASS Exploit
priority=4
url=/content/index.php?template=lsass
redirect_url=/proxies/tools/stinger.exe
disable=Y
trigger=Detect::2000032,Detect::2000033,Detect::2000046,Detect::2001286,Detect::2001337,Detect::2001302
[2002030]
desc=IRC Trojan
priority=3
auto_enable=N
url=/content/index.php?template=trojan
disable=Y
trigger=Detect::2002029,Detect::2002030,Detect::2002031,Detect::2002032,Detect::2002033,Detect::2000345,Detect::2000347,Detect::2000348,Detect::2000349,Detect::2000350,Detect::2000351,Detect::2000352
actions=trap,email,log
# The following signatures replace the generic portscan detector. It
was notoriously noisy, expecially
# for BitTorrent clients. These new signatures look for most of the
"worm-like" scanning behaviors.
[2002201]
desc=Zotob (W32.Zotob and variants)
priority=4
url=/content/index.php?template=zotob
disable=Y
trigger=Detect::2002201,Detect::2002203
[2001904]
desc=Telnet Scan
priority=6
url=/content/index.php?template=scanning
disable=Y
auto_enable=N
trigger=Detect::2001904
[2001972]
desc=Remote Desktop Scan
priority=6
url=/content/index.php?template=scanning
disable=Y
auto_enable=N
trigger=Detect::2001972
[2001569]
desc=NetBIOS Scan
priority=6
url=/content/index.php?template=scanning
disable=Y
auto_enable=N
trigger=Detect::2001569,Detect::2001579,Detect::2001580,Detect::2001581,Detect::2001582,Detect::2001583
# The following are peer-to-peer (P2P) signatures. They can be
exceedingly loud, but seem fairly accurate in our experience.
# Since P2P is not considered illicit on all networks, they are all
shipped disabled - set disable=N to enable.
[2000334]
desc=P2P (BitTorrent)
priority=8
url=/content/index.php?template=p2p
disable=Y
max_enable=1
trigger=Detect::2000334,Detect::2000357,Detect::2000369
[2001808]
desc=P2P (Limewire)
priority=8
url=/content/index.php?template=p2p
disable=Y
max_enable=1
trigger=Detect::2001808
[2000330]
desc=P2P (eDonkey)
priority=8
url=/content/index.php?template=p2p
disable=Y
max_enable=1
trigger=Detect::2000330,Detect::2000331,Detect::2000332,Detect::2000333,Detect::2001296,Detect::2001297,Detect::2001298,Detect::2001299,Detect::2001305,Detect::2001300
[2001664]
desc=P2P (Gnutella)
priority=8
url=/content/index.php?template=p2p
disable=Y
max_enable=1
trigger=Detect::2001664,Detect::2002760,Detect::2002761
[2001812]
desc=P2P (Kazaa)
priority=8
url=/content/index.php?template=p2p
disable=Y
max_enable=1
trigger=Detect::2001796,Detect::2001812
#
# 3000000 - 3099999 Device bans
#
[3000001]
desc=Block all mobile devices
url=/content/index.php?template=banned_devices
actions=email,log,trap
disable=Y
priority=10
trigger=USERAGENT::300,OS::11
[3000002]
desc=Block iPhone and iPod touch
url=/content/index.php?template=banned_devices
actions=trap,email,log
disable=Y
priority=10
trigger=OS::1102,USERAGENT::101,USERAGENT::102
# MAC vendors: 00:0f:86, 00:1c:cc, 00:21:06, 00:23:7a, 00:24:9f, 00:25:57
[3000003]
desc=Block BlackBerries
url=/content/index.php?template=banned_devices
actions=trap,email,log
disable=Y
priority=10
trigger=VENDORMAC::3974,VENDORMAC::7372,VENDORMAC::8454,VENDORMAC::9082,VENDORMAC::9375,VENDORMAC::9559,USERAGENT::103
[3000004]
desc=Block PS3 and PSP
url=/content/index.php?template=banned_devices
actions=trap,email,log
disable=Y
priority=10
trigger=USERAGENT::111,USERAGENT::112,OS::605
# MAC vendor: 00:13:b6
[3000005]
desc=Block Slingbox
url=/content/index.php?template=banned_devices
actions=trap,email,log
disable=Y
priority=10
trigger=VENDORMAC::5046,OS::703
------------------------------------------------------------------------------
Get a FREE DOWNLOAD! and learn more about uberSVN rich system,
user administration capabilities and model configuration. Take
the hassle out of deploying and managing Subversion and the
tools developers use with it. http://p.sf.net/sfu/wandisco-d2d-2
_______________________________________________
Packetfence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users