-
Notifications
You must be signed in to change notification settings - Fork 1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Better Dropbear events detection #572
Conversation
This is especially useful for detecting SSH bruteforcing events on OpenWRT routers.
This signature will also classify these events as authentication failuers, contributing to the password bruteforcing rule.
Without testing, i like the additions. Could you add a dropbear.ini in contrib/ossec-testing/tests? This is something we're trying to add as time permits, andadding it alongside new rules has been helpful. |
Just added these, mostly mimicking what I found in sshd.ini. Let me know if it works. Also added one more detection rule for Dropbear. |
It'll be a few days before i can test. If you don't see anything by
|
Is it possible that the build system is wonky at the moment? I checked out this PR to my local system and ran the tests myself. The dropbear tests are passing but the pam.ini tests are failing because the pam decoder is not working. I checked that my local_decoder.xml is empty. Edit: after cleaning my ossec directory and a fresh build both tests are passing on my local machine now. Maybe someone should rerun Travis Job 981.24 |
Retrying build. Lets see what happens. |
Doesn't seem to have helped. Relevant lines are as follows: https://travis-ci.org/ossec/ossec-hids/jobs/57781949#L1421-L1482 |
The |
I know I asked you to add it, but can you remove the dropbear.ini file? I don't know why it's failing on travis, but it would be nice to get these additions in. The tests pass locally, but no one has been able to figure out what travis is doing to make them fail. |
Better Dropbear events detection
This MR introduces improved detection of Dropbear events, which is especially useful if you're collecting logs from OpenWRT routers.