aboutsummaryrefslogtreecommitdiff
path: root/system/ossec-server
diff options
context:
space:
mode:
authorMario Preksavec <mario at slackware dot hr>2016-10-14 13:43:05 +0700
committerWilly Sudiarto Raharjo <willysr@slackbuilds.org>2016-10-14 22:20:04 +0700
commit2a16520e1accca46b48a74a4e5217fb0b1959204 (patch)
tree984f7a2be4268d2eb379eb8500ff96c521062d38 /system/ossec-server
parent586e7472246dfee07fa8e0a705c34b8e626b1204 (diff)
system/ossec-server: Added (Open Source Host-based IDS).
Signed-off-by: Willy Sudiarto Raharjo <willysr@slackbuilds.org>
Diffstat (limited to 'system/ossec-server')
-rw-r--r--system/ossec-server/README3
-rw-r--r--system/ossec-server/README.SLACKWARE15
-rw-r--r--system/ossec-server/doinst.sh29
-rw-r--r--system/ossec-server/ossec-server.SlackBuild152
-rw-r--r--system/ossec-server/ossec-server.conf233
-rw-r--r--system/ossec-server/ossec-server.info10
-rw-r--r--system/ossec-server/ossec.logrotate5
-rw-r--r--system/ossec-server/slack-desc19
8 files changed, 466 insertions, 0 deletions
diff --git a/system/ossec-server/README b/system/ossec-server/README
new file mode 100644
index 0000000000000..955a80fcad5af
--- /dev/null
+++ b/system/ossec-server/README
@@ -0,0 +1,3 @@
+OSSEC is an Open Source Host-based Intrusion Detection System that performs log
+analysis, file integrity checking, policy monitoring, rootkit detection,
+real-time alerting and active response.
diff --git a/system/ossec-server/README.SLACKWARE b/system/ossec-server/README.SLACKWARE
new file mode 100644
index 0000000000000..e07808bfc66d9
--- /dev/null
+++ b/system/ossec-server/README.SLACKWARE
@@ -0,0 +1,15 @@
+You may wish to add these lines to /etc/rc.d/rc.local to start the service:
+
+if [ -x /etc/rc.d/rc.ossec ]; then
+ /etc/rc.d/rc.ossec start
+fi
+
+You may also add these lines to /etc/rc.d/rc.local_shutdown:
+
+if [ -x /etc/rc.d/rc.ossec ]; then
+ /etc/rc.d/rc.ossec stop
+fi
+
+Remember to give executable permission to /etc/rc.d/rc.local_shutdown:
+
+ chmod 0755 /etc/rc.d/rc.local_shutdown
diff --git a/system/ossec-server/doinst.sh b/system/ossec-server/doinst.sh
new file mode 100644
index 0000000000000..a68e4ea3a2e13
--- /dev/null
+++ b/system/ossec-server/doinst.sh
@@ -0,0 +1,29 @@
+config() {
+ NEW="$1"
+ OLD="$(dirname $NEW)/$(basename $NEW .new)"
+ # If there's no config file by that name, mv it over:
+ if [ ! -r $OLD ]; then
+ mv $NEW $OLD
+ elif [ "$(cat $OLD | md5sum)" = "$(cat $NEW | md5sum)" ]; then
+ # toss the redundant copy
+ rm $NEW
+ fi
+ # Otherwise, we leave the .new copy for the admin to consider...
+}
+
+preserve_perms() {
+ NEW="$1"
+ OLD="$(dirname $NEW)/$(basename $NEW .new)"
+ if [ -e $OLD ]; then
+ cp -a $OLD ${NEW}.incoming
+ cat $NEW > ${NEW}.incoming
+ mv ${NEW}.incoming $NEW
+ fi
+ config $NEW
+}
+
+preserve_perms etc/rc.d/rc.ossec.new
+config etc/ossec-init.conf.new
+config etc/logrotate.d/ossec.new
+find var/ossec/etc var/ossec/rules -type f -name '*.new' \
+ | while read new ; do config $new ; done
diff --git a/system/ossec-server/ossec-server.SlackBuild b/system/ossec-server/ossec-server.SlackBuild
new file mode 100644
index 0000000000000..84fb6e79137fb
--- /dev/null
+++ b/system/ossec-server/ossec-server.SlackBuild
@@ -0,0 +1,152 @@
+#!/bin/sh
+
+# Slackware build script for ossec-server
+
+# Copyright 2016 Mario Preksavec, Zagreb, Croatia
+# All rights reserved.
+#
+# Redistribution and use of this script, with or without modification, is
+# permitted provided that the following conditions are met:
+#
+# 1. Redistributions of this script must retain the above copyright
+# notice, this list of conditions and the following disclaimer.
+#
+# THIS SOFTWARE IS PROVIDED BY THE AUTHOR "AS IS" AND ANY EXPRESS OR IMPLIED
+# WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
+# MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO
+# EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
+# SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
+# PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS;
+# OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
+# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
+# OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
+# ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
+
+PRGNAM=ossec-server
+VERSION=${VERSION:-2.9rc3}
+BUILD=${BUILD:-1}
+TAG=${TAG:-_SBo}
+
+SRCNAM=ossec-hids
+
+if [ -z "$ARCH" ]; then
+ case "$( uname -m )" in
+ i?86) ARCH=i586 ;;
+ arm*) ARCH=arm ;;
+ *) ARCH=$( uname -m ) ;;
+ esac
+fi
+
+CWD=$(pwd)
+TMP=${TMP:-/tmp/SBo}
+PKG=$TMP/package-$PRGNAM
+OUTPUT=${OUTPUT:-/tmp}
+
+if [ "$ARCH" = "i586" ]; then
+ SLKCFLAGS="-O2 -march=i586 -mtune=i686"
+ LIBDIRSUFFIX=""
+elif [ "$ARCH" = "i686" ]; then
+ SLKCFLAGS="-O2 -march=i686 -mtune=i686"
+ LIBDIRSUFFIX=""
+elif [ "$ARCH" = "x86_64" ]; then
+ SLKCFLAGS="-O2 -fPIC"
+ LIBDIRSUFFIX="64"
+else
+ SLKCFLAGS="-O2"
+ LIBDIRSUFFIX=""
+fi
+
+USERID=${USERID:-333}
+USERID_MAIL=${USERID_MAIL:-334}
+USERID_REMOTE=${USERID_REMOTE:-335}
+GROUPID=${GROUPID:-333}
+
+if ! grep ^ossec: /etc/group 2>&1 > /dev/null \
+|| ! grep -E '^(ossec|ossecm|ossecr):' /etc/passwd 2>&1 > /dev/null; then
+ echo -e "\n You must have ossec users and a group to run this script\n"
+fi
+
+if ! grep ^ossec: /etc/group 2>&1 > /dev/null; then
+ echo " # groupadd -g $GROUPID ossec"
+fi
+
+if ! grep ^ossec: /etc/passwd 2>&1 > /dev/null; then
+ echo " # useradd -u $USERID -d /var/ossec -s /bin/false -g ossec ossec"
+ echo " # passwd -l ossec"
+fi
+
+if ! grep ^ossecm: /etc/passwd 2>&1 > /dev/null; then
+ echo " # useradd -u $USERID_MAIL -d /var/ossec -s /bin/false -g ossec ossecm"
+ echo " # passwd -l ossecm"
+fi
+
+if ! grep ^ossecr: /etc/passwd 2>&1 > /dev/null; then
+ echo " # useradd -u $USERID_REMOTE -d /var/ossec -s /bin/false -g ossec ossecr"
+ echo " # passwd -l ossecr"
+fi
+
+if ! grep ^ossec: /etc/group 2>&1 > /dev/null \
+|| ! grep -E '^(ossec|ossecm|ossecr):' /etc/passwd 2>&1 > /dev/null; then
+ echo
+ exit
+fi
+
+set -e
+
+rm -rf $PKG
+mkdir -p $TMP $PKG $OUTPUT
+cd $TMP
+rm -rf $SRCNAM-$VERSION
+tar xvf $CWD/$SRCNAM-$VERSION.tar.gz
+cd $SRCNAM-$VERSION
+chown -R root:root .
+find -L . \
+ \( -perm 777 -o -perm 775 -o -perm 750 -o -perm 711 -o -perm 555 \
+ -o -perm 511 \) -exec chmod 755 {} \; -o \
+ \( -perm 666 -o -perm 664 -o -perm 640 -o -perm 600 -o -perm 444 \
+ -o -perm 440 -o -perm 400 \) -exec chmod 644 {} \;
+
+# Makefile fixes
+sed -e 's|\(./init/adduser.sh.*\)|#\1|' \
+ -e 's|\(DEFINES+=-DDEFAULTDIR=\).*|\1\\"/var/ossec\\"|' \
+ -i src/Makefile
+
+# There is no configure script and install.sh is a bit limited
+( cd src
+ make PREFIX=$PKG/var/ossec TARGET=server build
+ make PREFIX=$PKG/var/ossec TARGET=server install
+)
+
+# Prepare system /etc
+mkdir -p $PKG/etc/{logrotate.d,rc.d}
+cat << EOF > $PKG/etc/ossec-init.conf.new
+DIRECTORY="/var/ossec"
+VERSION="$(cat src/VERSION)"
+DATE="$(date)"
+TYPE="server"
+EOF
+chmod 600 $PKG/etc/ossec-init.conf.new
+cat src/init/ossec-hids.init > $PKG/etc/rc.d/rc.ossec.new
+cat $CWD/ossec.logrotate > $PKG/etc/logrotate.d/ossec.new
+
+# Stock ossec.conf is just an example - we prefer our own
+mv $PKG/var/ossec/etc/ossec.conf $PKG/var/ossec/etc/ossec.conf.example
+cat $CWD/ossec-server.conf > $PKG/var/ossec/etc/ossec.conf.new
+chmod 640 $PKG/var/ossec/etc/ossec.conf.new
+chown root:ossec $PKG/var/ossec/etc/ossec.conf.new
+for i in $PKG/var/ossec/etc/*.{conf,keys,xml} ; do mv $i $i.new ; done
+mv $PKG/var/ossec/rules/local_rules.xml $PKG/var/ossec/rules/local_rules.xml.new
+
+find $PKG -print0 | xargs -0 file | grep -e "executable" -e "shared object" | grep ELF \
+ | cut -f 1 -d : | xargs strip --strip-unneeded 2> /dev/null || true
+
+mkdir -p $PKG/usr/doc/$PRGNAM-$VERSION
+cp -a BUGS CHANGELOG CONFIG CONTRIBUTORS LICENSE README.md doc/{*.txt,README.*} \
+ $CWD/README.SLACKWARE $PKG/usr/doc/$PRGNAM-$VERSION
+cat $CWD/$PRGNAM.SlackBuild > $PKG/usr/doc/$PRGNAM-$VERSION/$PRGNAM.SlackBuild
+
+mkdir -p $PKG/install
+cat $CWD/slack-desc > $PKG/install/slack-desc
+
+cd $PKG
+/sbin/makepkg -l y -c n $OUTPUT/$PRGNAM-$VERSION-$ARCH-$BUILD$TAG.${PKGTYPE:-tgz}
diff --git a/system/ossec-server/ossec-server.conf b/system/ossec-server/ossec-server.conf
new file mode 100644
index 0000000000000..5befd2db7ab6e
--- /dev/null
+++ b/system/ossec-server/ossec-server.conf
@@ -0,0 +1,233 @@
+<!-- OSSEC Slackware example config -->
+<!-- Written by Mario Preksavec <mario at slackware dot hr> -->
+
+<ossec_config>
+ <global>
+ <email_notification>no</email_notification>
+ <email_to>root@example.com</email_to>
+ <smtp_server>smtp.example.com</smtp_server>
+ <email_from>ossecm@ossec.example.com</email_from>
+ </global>
+
+ <rules>
+ <include>rules_config.xml</include>
+ <include>pam_rules.xml</include>
+ <include>sshd_rules.xml</include>
+ <include>telnetd_rules.xml</include>
+ <include>syslog_rules.xml</include>
+ <include>arpwatch_rules.xml</include>
+ <include>symantec-av_rules.xml</include>
+ <include>symantec-ws_rules.xml</include>
+ <include>pix_rules.xml</include>
+ <include>named_rules.xml</include>
+ <include>smbd_rules.xml</include>
+ <include>vsftpd_rules.xml</include>
+ <include>pure-ftpd_rules.xml</include>
+ <include>proftpd_rules.xml</include>
+ <include>ms_ftpd_rules.xml</include>
+ <include>ftpd_rules.xml</include>
+ <include>hordeimp_rules.xml</include>
+ <include>roundcube_rules.xml</include>
+ <include>wordpress_rules.xml</include>
+ <include>cimserver_rules.xml</include>
+ <include>vpopmail_rules.xml</include>
+ <include>vmpop3d_rules.xml</include>
+ <include>courier_rules.xml</include>
+ <include>web_rules.xml</include>
+ <include>web_appsec_rules.xml</include>
+ <include>apache_rules.xml</include>
+ <include>nginx_rules.xml</include>
+ <include>php_rules.xml</include>
+ <include>mysql_rules.xml</include>
+ <include>postgresql_rules.xml</include>
+ <include>ids_rules.xml</include>
+ <include>squid_rules.xml</include>
+ <include>firewall_rules.xml</include>
+ <include>apparmor_rules.xml</include>
+ <include>cisco-ios_rules.xml</include>
+ <include>netscreenfw_rules.xml</include>
+ <include>sonicwall_rules.xml</include>
+ <include>postfix_rules.xml</include>
+ <include>sendmail_rules.xml</include>
+ <include>imapd_rules.xml</include>
+ <include>mailscanner_rules.xml</include>
+ <include>dovecot_rules.xml</include>
+ <include>ms-exchange_rules.xml</include>
+ <include>racoon_rules.xml</include>
+ <include>vpn_concentrator_rules.xml</include>
+ <include>spamd_rules.xml</include>
+ <include>msauth_rules.xml</include>
+ <include>mcafee_av_rules.xml</include>
+ <include>trend-osce_rules.xml</include>
+ <include>ms-se_rules.xml</include>
+ <!-- <include>policy_rules.xml</include> -->
+ <include>zeus_rules.xml</include>
+ <include>solaris_bsm_rules.xml</include>
+ <include>vmware_rules.xml</include>
+ <include>ms_dhcp_rules.xml</include>
+ <include>asterisk_rules.xml</include>
+ <include>ossec_rules.xml</include>
+ <include>attack_rules.xml</include>
+ <include>systemd_rules.xml</include>
+ <include>firewalld_rules.xml</include>
+ <include>dropbear_rules.xml</include>
+ <include>unbound_rules.xml</include>
+ <include>sysmon_rules.xml</include>
+ <include>opensmtpd_rules.xml</include>
+ <include>local_rules.xml</include>
+ </rules>
+
+ <syscheck>
+ <!-- Frequency that syscheck is executed -- default every 20 hours -->
+ <frequency>17200</frequency>
+
+ <!-- Directories to check (perform all possible verifications) -->
+ <directories check_all="yes">/etc,/usr/bin,/usr/sbin</directories>
+ <directories check_all="yes">/bin,/sbin,/boot</directories>
+
+ <!-- Files/directories to ignore -->
+ <ignore>/etc/mtab</ignore>
+ <ignore>/etc/hosts.deny</ignore>
+ <ignore>/etc/mail/statistics</ignore>
+ <ignore>/etc/random-seed</ignore>
+ <ignore>/etc/adjtime</ignore>
+ <ignore>/etc/ntp/drift</ignore>
+ </syscheck>
+
+ <rootcheck>
+ <rootkit_files>/var/ossec/etc/shared/rootkit_files.txt</rootkit_files>
+ <rootkit_trojans>/var/ossec/etc/shared/rootkit_trojans.txt</rootkit_trojans>
+ <system_audit>/var/ossec/etc/shared/system_audit_rcl.txt</system_audit>
+ <system_audit>/var/ossec/etc/shared/cis_debian_linux_rcl.txt</system_audit>
+ <system_audit>/var/ossec/etc/shared/cis_rhel_linux_rcl.txt</system_audit>
+ <system_audit>/var/ossec/etc/shared/cis_rhel5_linux_rcl.txt</system_audit>
+ <system_audit>/var/ossec/etc/shared/cis_rhel6_linux_rcl.txt</system_audit>
+ <system_audit>/var/ossec/etc/shared/cis_rhel7_linux_rcl.txt</system_audit>
+ </rootcheck>
+
+ <global>
+ <white_list>127.0.0.1</white_list>
+ <white_list>::1</white_list>
+ </global>
+
+ <remote>
+ <connection>secure</connection>
+ </remote>
+
+ <alerts>
+ <log_alert_level>1</log_alert_level>
+ <email_alert_level>7</email_alert_level>
+ </alerts>
+
+ <command>
+ <name>host-deny</name>
+ <executable>host-deny.sh</executable>
+ <expect>srcip</expect>
+ <timeout_allowed>yes</timeout_allowed>
+ </command>
+
+ <command>
+ <name>firewall-drop</name>
+ <executable>firewall-drop.sh</executable>
+ <expect>srcip</expect>
+ <timeout_allowed>yes</timeout_allowed>
+ </command>
+
+ <command>
+ <name>disable-account</name>
+ <executable>disable-account.sh</executable>
+ <expect>user</expect>
+ <timeout_allowed>yes</timeout_allowed>
+ </command>
+
+ <!-- Active Response Config -->
+ <active-response>
+ <!-- This response is going to execute the host-deny
+ - command for every event that fires a rule with
+ - level (severity) >= 6.
+ - The IP is going to be blocked for 600 seconds.
+ -->
+ <command>host-deny</command>
+ <location>local</location>
+ <level>6</level>
+ <timeout>600</timeout>
+ </active-response>
+
+ <active-response>
+ <!-- Firewall Drop response. Block the IP for
+ - 600 seconds on the firewall (iptables,
+ - ipfilter, etc).
+ -->
+ <command>firewall-drop</command>
+ <location>local</location>
+ <level>6</level>
+ <timeout>600</timeout>
+ </active-response>
+
+ <!-- Files to monitor (localfiles) -->
+
+ <localfile>
+ <log_format>syslog</log_format>
+ <location>/var/log/messages</location>
+ </localfile>
+
+ <localfile>
+ <log_format>syslog</log_format>
+ <location>/var/log/syslog</location>
+ </localfile>
+
+ <localfile>
+ <log_format>syslog</log_format>
+ <location>/var/log/debug</location>
+ </localfile>
+
+ <localfile>
+ <log_format>syslog</log_format>
+ <location>/var/log/secure</location>
+ </localfile>
+
+ <localfile>
+ <log_format>syslog</log_format>
+ <location>/var/log/cron</location>
+ </localfile>
+
+ <localfile>
+ <log_format>syslog</log_format>
+ <location>/var/log/maillog</location>
+ </localfile>
+
+ <localfile>
+ <log_format>syslog</log_format>
+ <location>/var/log/spooler</location>
+ </localfile>
+
+ <localfile>
+ <log_format>apache</log_format>
+ <location>/var/log/httpd/access_log</location>
+ </localfile>
+
+ <localfile>
+ <log_format>apache</log_format>
+ <location>/var/log/httpd/error_log</location>
+ </localfile>
+
+ <localfile>
+ <log_format>command</log_format>
+ <command>df -h</command>
+ </localfile>
+
+ <localfile>
+ <log_format>full_command</log_format>
+ <command>netstat -tan | grep LISTEN | grep -v 127.0.0.1 | sort</command>
+ </localfile>
+
+ <localfile>
+ <log_format>full_command</log_format>
+ <command>last -n 5</command>
+ </localfile>
+
+ <localfile>
+ <log_format>full_command</log_format>
+ <command>lastb -n 5</command>
+ </localfile>
+</ossec_config>
diff --git a/system/ossec-server/ossec-server.info b/system/ossec-server/ossec-server.info
new file mode 100644
index 0000000000000..ac892d7f4c6b7
--- /dev/null
+++ b/system/ossec-server/ossec-server.info
@@ -0,0 +1,10 @@
+PRGNAM="ossec-server"
+VERSION="2.9rc3"
+HOMEPAGE="http://ossec.github.io/"
+DOWNLOAD="https://github.com/ossec/ossec-hids/archive/2.9rc3/ossec-hids-2.9rc3.tar.gz"
+MD5SUM="a4ce5872f32c0ab045215017198eb5a3"
+DOWNLOAD_x86_64=""
+MD5SUM_x86_64=""
+REQUIRES=""
+MAINTAINER="Mario Preksavec"
+EMAIL="mario at slackware dot hr"
diff --git a/system/ossec-server/ossec.logrotate b/system/ossec-server/ossec.logrotate
new file mode 100644
index 0000000000000..7b6406819f6fe
--- /dev/null
+++ b/system/ossec-server/ossec.logrotate
@@ -0,0 +1,5 @@
+/var/ossec/logs/active-responses.log /var/ossec/logs/ossec.log {
+ missingok
+ notifempty
+ copytruncate
+}
diff --git a/system/ossec-server/slack-desc b/system/ossec-server/slack-desc
new file mode 100644
index 0000000000000..3c3059e8e75ce
--- /dev/null
+++ b/system/ossec-server/slack-desc
@@ -0,0 +1,19 @@
+# HOW TO EDIT THIS FILE:
+# The "handy ruler" below makes it easier to edit a package description.
+# Line up the first '|' above the ':' following the base package name, and
+# the '|' on the right side marks the last column you can put a character in.
+# You must make exactly 11 lines for the formatting to be correct. It's also
+# customary to leave one space after the ':' except on otherwise blank lines.
+
+ |-----handy-ruler------------------------------------------------------|
+ossec-server: ossec-server (Open Source Host-based Intrusion Detection System)
+ossec-server:
+ossec-server: OSSEC is an Open Source Host-based Intrusion Detection System that
+ossec-server: performs log analysis, file integrity checking, policy monitoring,
+ossec-server: rootkit detection, real-time alerting and active response.
+ossec-server:
+ossec-server: Homepage: http://ossec.github.io/
+ossec-server:
+ossec-server:
+ossec-server:
+ossec-server: