Hello Siddhartha,
you can try to add:
$logger->warn($this->{'_report'});
just after
# Clean the report
And look at the packetfence.log file.
Regards
Le 2013-01-22 13:47, siddhartha mukkamala a écrit :
Below are the logs in both scenarios
with External Nessus Server:
Jan 22 12:23:19 pfcmd.pl <http://pfcmd.pl>(916) INFO: New ID
generated: 135887899994d373 (pf::util::generate_id)
Jan 22 12:23:19 pfcmd.pl <http://pfcmd.pl>(916) INFO: Instantiate a
new vulnerability scanning engine object of type pf::scan::nessus.
(pf::scan::instantiate_scan_engine)
Jan 22 12:23:23 pfcmd.pl <http://pfcmd.pl>(916) INFO: executing Nessus
scan with this policy PCI - Windows (pf::scan::nessus::startScan)
Jan 22 12:23:23 pfcmd.pl <http://pfcmd.pl>(916) INFO: Nessus is
scanning 10.0.103.11 (pf::scan::nessus::startScan)
Jan 22 12:23:38 pfcmd.pl <http://pfcmd.pl>(916) INFO: Nessus is
scanning 10.0.103.11 (pf::scan::nessus::startScan)
Jan 22 12:23:53 pfcmd.pl <http://pfcmd.pl>(916) INFO: Nessus is
scanning 10.0.103.11 (pf::scan::nessus::startScan)
Jan 22 12:24:33 pfcmd.pl <http://pfcmd.pl>(916) INFO: Calling
/usr/local/pf/bin/pfcmd manage vclose 00:26:b9:c0:d3:73 1200001
(pf::scan::parse_scan_report)
With Nessus on the same box as PF
Jan 22 10:18:56 pfcmd.pl <http://pfcmd.pl>(32387) INFO: Nessus is
scanning 10.0.103.11 (pf::scan::nessus::startScan)
Jan 22 10:19:11 pfcmd.pl <http://pfcmd.pl>(32387) INFO: Nessus is
scanning 10.0.103.11 (pf::scan::nessus::startScan)
Jan 22 10:19:15 pfdhcplistener(32230) INFO: 00:26:b9:c0:d3:73
requested an IP. DHCP Fingerprint: OS::100 (Microsoft Windows XP).
Modified node with last_dhcp = 2013-01-22 10:19:15,computername =
ISTXN-CKSW,dhcp_fingerprint = 1,15,3,6,44,46,47,31,33,249,43
(main::listen_dhcp)
Jan 22 10:19:15 pfdhcplistener(32230) INFO: DHCPACK from 10.0.85.31
(00:15:17:5b:ff:0b) to host 00:26:b9:c0:d3:73 (10.0.103.11) for 300
seconds (main::parse_dhcp_ack)
Jan 22 10:19:36 pfcmd.pl <http://pfcmd.pl>(32387) INFO: Calling
violation_trigger for ip: 10.0.103.11, mac: 00:26:b9:c0:d3:73, type:
nessus, trigger: 57608 (pf::scan::parse_scan_report)
Jan 22 10:19:37 pfcmd.pl <http://pfcmd.pl>(32387) INFO: calling
'/usr/local/pf/bin/pfcmd violation add
vid=1100001,mac=00:26:b9:c0:d3:73,release_date=0' (trigger
nessus::57608) (pf::violation::violation_trigger)
Jan 22 10:19:37 pfcmd.pl <http://pfcmd.pl>(32504) INFO: pfcmd calling
violation_add for 00:26:b9:c0:d3:73 (main::command_param)
Jan 22 10:19:37 pfcmd.pl <http://pfcmd.pl>(32504) INFO: grace expired
on violation 1100001 for node 00:26:b9:c0:d3:73
(pf::violation::violation_add)
Jan 22 10:19:37 pfcmd.pl <http://pfcmd.pl>(32504) INFO: violation
1100001 added for 00:26:b9:c0:d3:73 (pf::violation::violation_add)
Jan 22 10:19:37 pfcmd.pl <http://pfcmd.pl>(32504) INFO: executing
action 'email' on class 1100001 (pf::action::action_execute)
Jan 22 10:19:38 pfcmd.pl <http://pfcmd.pl>(32504) INFO: email
regarding 'PF Alert: Nessus Scan detection on 00:26:b9:c0:d3:73' sent
to txpf01@localhost (pf::util::pfmailer)
Jan 22 10:19:38 pfcmd.pl <http://pfcmd.pl>(32504) INFO: executing
action 'log' on class 1100001 (pf::action::action_execute)
Jan 22 10:19:38 pfcmd.pl <http://pfcmd.pl>(32504) INFO:
/usr/local/pf/logs/violation.log 2013-01-22 10:19:38: Nessus Scan
(1100001) detected on node 00:26:b9:c0:d3:73 (10.0.103.11)
(pf::action::action_log)
Jan 22 10:19:38 pfcmd.pl <http://pfcmd.pl>(32504) INFO: executing
action 'trap' on class 1100001 (pf::action::action_execute)
On Tue, Jan 22, 2013 at 12:31 PM, siddhartha mukkamala
<[email protected]
<mailto:[email protected]>> wrote:
I finally gave up using external nessus server and installed
nessus on the same PF box and it worked perfectly fine. The only
other difference is that the external nessus server is V4.4 and
the new one I installed is V5.2.
Do we have to make any changes for the Packetfence to work with
external nessus server- its scheduling the scan and on the
external server and deleting those reports after the scan is
completed as specified in nessus.pm <http://nessus.pm> but not
parsing the report?
On Mon, Jan 21, 2013 at 5:30 PM, siddhartha mukkamala
<[email protected]
<mailto:[email protected]>> wrote:
Seems like when we connect a host, PF is launching the nessus
scan using XMLRPC and scanning the host and deleting the scan
report from external nessus server but failing to trigger
violations. Where does the PF server stores the downloaded
nessus report? Is there a way to debug the flow?
I commented out the below lines in nessus.pm
<http://nessus.pm> to check the report on nessus server for
plugin ids, it seems like pf::scan::parse_scan_report failed
to trigger the violations based on the plugin_ids..can someone
help...
# Get the report
$this->{'_report'} = $n->report_filenbe_download($scanid);
# Remove report on the server and logout from nessus
#$n->report_delete($scanid);
#$n->DESTROY;
# Clean the report
$this->{'_report'} = [ split("\n", $this->{'_report'}) ];
pf::scan::parse_scan_report($this);
--
Siddhartha
--
Siddhartha
--
Siddhartha
------------------------------------------------------------------------------
Master Visual Studio, SharePoint, SQL, ASP.NET, C# 2012, HTML5, CSS,
MVC, Windows 8 Apps, JavaScript and much more. Keep your skills current
with LearnDevNow - 3,200 step-by-step video tutorials by Microsoft
MVPs and experts. ON SALE this month only -- learn more at:
http://p.sf.net/sfu/learnnow-d2d
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users
--
Fabrice Durand
[email protected] :: +1.514.447.4918 (x135) :: www.inverse.ca
Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and PacketFence
(http://packetfence.org)
------------------------------------------------------------------------------
Master Visual Studio, SharePoint, SQL, ASP.NET, C# 2012, HTML5, CSS,
MVC, Windows 8 Apps, JavaScript and much more. Keep your skills current
with LearnDevNow - 3,200 step-by-step video tutorials by Microsoft
MVPs and experts. ON SALE this month only -- learn more at:
http://p.sf.net/sfu/learnnow-d2d
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users