-
Notifications
You must be signed in to change notification settings - Fork 1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Active response with "firewall drop" Stop working properly after upgrade to 2.9RC3 #969
Comments
With 2.9rc3, is execd running on the server and agent? |
on the agent i'm still in 2.8 root 23998 0.0 0.1 16692 488 ? S 10:06 0:00 /var/ossec/bin/ossec-execd
on the server nothing in /var/ossec/logs/active-responses.log but sometimes entries on the agent: Thu Oct 13 14:16:27 CEST 2016 /var/ossec/active-response/bin/firewall-drop.sh add - IP1 1476360987.532711 117154 how can i debug more ? |
This night i let a brute force going on, and when before it trigger in a few seconds |
Can you upgrade the agent? Cross version compatibility isn't something we really test at all. |
Worst :(
|
Same as 👍 #652 |
I don't think that error (should be a warning really) affects the agent's performance. It's mostly an informational message. Does the agent not run when you see those ( |
i saw in the link that it starts and i had the 4 demon: But active response still not working |
and to be sure, the logs match in ossec-logtest *_Phase 3: Completed filtering (rules). |
Can you post your active response configuration? |
it is at the start of the issue, i changed it a bit now: agent;
server:
thanks |
I haven't noticed any issues myself, but I don't have any systems using repeated_offenders. I'll add one shortly to see if anything changes. |
i test without repeat offender, same problem. |
I have:
|
somenews in debug mode in the agent i have that: even if i declare the command in the agent too |
What do you have in |
strange, strange: less /var/ossec/etc/shared/ar.conf restart-ossec0 - restart-ossec.sh - 0 it works with /var/ossec/bin/agent_control -b IP -f firewall-drop0 -u 130 jeudi 20 octobre 2016, 10:35:26 (UTC+0200) /var/ossec/active-response/bin/firewall-drop.sh add - IP (from_the_server) (no_rule_id) is it normal ? |
Apparently that is normal, I get the same thing (and my AR works). You could try posting this to the mailing list to see if anyone else is experiencing the same sorts of issues. |
or i upgrade to the version you have ? what version ? |
I'm using the current MASTER from github on most of my systems. |
just unzip and ./install.sh ? |
It's basically the same process. |
i upgrade to master same problem. This, is working:
but active response doesn't working. there is also a chance in geoip support ? Thanks |
Yeah, I don't know what's going on with your setup. And I haven't had time to mess with my Linux instances to see what's what. |
i will ask for help on the list |
Ok, so I setup 2 Ubuntu 14.04 lxc/lxd instances. One is a server, the second an agent. Both running 2.9rc3. I left all of the defaults that aren't silly (like listening to port 514 on the server). I left the default AR config (well, I removed the stupid hosts-deny thing). Just tried to "brute force" a root login via ssh and managed to trigger AR.
############ On the agent:
Also on the agent:
Also on the agent:
No clue what else to look into. |
With the same configuration, it works in 2.8 as a server
it doesn't work and in debug mode i got this error, that i didn't have in other versions:
Please note the strange format: '10.55.112.101"' with the double quote |
it broke at 2.9.0beta05 :/ |
Can you provide the log message that the |
beta05 is older than rc3. |
i try all versions to saw where it was put in the code (from the last master to beta05)
Décoding:
Decoder: Attached to ticket old and new |
Old for srcip
Newone:
|
I definitely see the offending deocder (vsftpd_login), but I can't figure out how to fix it. Limiting it to ipv4 is easy, but supporting v6 causes issues. |
This is dumb, but it seems to work:
I assume the rest of the decoders would have to be similarly modified. |
ok i better understand when you want ipv6 support, it is more difficult ``lundi 24 octobre 2016, 14:27:20 (UTC+0200) /var/ossec/active-response/bin/firewall-drop.sh add - 10.55.112.102 1477312040.1133823 11451 |
i happy we find the problem and there was a problem...and before the final release :) |
Thanks a lot for helping find that problem! |
i will test a bit more cause my ossec start to be impressive ;) |
hello |
@marcRBD It looks like it was merged into master. I'm guessing I didn't push it into the RC branches. |
too late now ? |
Submit a pull request against the v2.9.1 branch and I'll see what I can do. |
i'm not familiar with github to do that |
hi
i upgrade on a debian Jessie from ossec 2.8 to 2.9RC3
server side:
i removed an ip whitelisted from the configuration and send a brute force
from this ip---> no AR
i come back in 2.8:
i test from this ip--> no AR
The configuration was working before upgrade !!
still not working, then i test from another ip and it works
from all ip source, even the first one again.
and it is not working anymore from all ip.
There is no whitelisting and the log triggered:
Rule: 117154 (level 11) -> 'Active response: FTP brute force (multiple failed logins).'
We have a lot of agent so i need the active response to keep working
in the upgrade (agent 2.8--> server 2.9) and after the upgrade
Anyone test it ?
best regards
thanks
The text was updated successfully, but these errors were encountered: