diff options
-rw-r--r-- | system/ossec-agent/README | 3 | ||||
-rw-r--r-- | system/ossec-agent/README.SLACKWARE | 15 | ||||
-rw-r--r-- | system/ossec-agent/doinst.sh | 29 | ||||
-rw-r--r-- | system/ossec-agent/ossec-agent.SlackBuild | 152 | ||||
-rw-r--r-- | system/ossec-agent/ossec-agent.conf | 105 | ||||
-rw-r--r-- | system/ossec-agent/ossec-agent.info | 10 | ||||
-rw-r--r-- | system/ossec-agent/ossec.logrotate | 5 | ||||
-rw-r--r-- | system/ossec-agent/slack-desc | 19 |
8 files changed, 338 insertions, 0 deletions
diff --git a/system/ossec-agent/README b/system/ossec-agent/README new file mode 100644 index 0000000000..955a80fcad --- /dev/null +++ b/system/ossec-agent/README @@ -0,0 +1,3 @@ +OSSEC is an Open Source Host-based Intrusion Detection System that performs log +analysis, file integrity checking, policy monitoring, rootkit detection, +real-time alerting and active response. diff --git a/system/ossec-agent/README.SLACKWARE b/system/ossec-agent/README.SLACKWARE new file mode 100644 index 0000000000..e07808bfc6 --- /dev/null +++ b/system/ossec-agent/README.SLACKWARE @@ -0,0 +1,15 @@ +You may wish to add these lines to /etc/rc.d/rc.local to start the service: + +if [ -x /etc/rc.d/rc.ossec ]; then + /etc/rc.d/rc.ossec start +fi + +You may also add these lines to /etc/rc.d/rc.local_shutdown: + +if [ -x /etc/rc.d/rc.ossec ]; then + /etc/rc.d/rc.ossec stop +fi + +Remember to give executable permission to /etc/rc.d/rc.local_shutdown: + + chmod 0755 /etc/rc.d/rc.local_shutdown diff --git a/system/ossec-agent/doinst.sh b/system/ossec-agent/doinst.sh new file mode 100644 index 0000000000..1f5ea03367 --- /dev/null +++ b/system/ossec-agent/doinst.sh @@ -0,0 +1,29 @@ +config() { + NEW="$1" + OLD="$(dirname $NEW)/$(basename $NEW .new)" + # If there's no config file by that name, mv it over: + if [ ! -r $OLD ]; then + mv $NEW $OLD + elif [ "$(cat $OLD | md5sum)" = "$(cat $NEW | md5sum)" ]; then + # toss the redundant copy + rm $NEW + fi + # Otherwise, we leave the .new copy for the admin to consider... +} + +preserve_perms() { + NEW="$1" + OLD="$(dirname $NEW)/$(basename $NEW .new)" + if [ -e $OLD ]; then + cp -a $OLD ${NEW}.incoming + cat $NEW > ${NEW}.incoming + mv ${NEW}.incoming $NEW + fi + config $NEW +} + +preserve_perms etc/rc.d/rc.ossec.new +config etc/ossec-init.conf.new +config etc/logrotate.d/ossec.new +find var/ossec/etc -type f -name '*.new' \ + | while read new ; do config $new ; done diff --git a/system/ossec-agent/ossec-agent.SlackBuild b/system/ossec-agent/ossec-agent.SlackBuild new file mode 100644 index 0000000000..8522b3143f --- /dev/null +++ b/system/ossec-agent/ossec-agent.SlackBuild @@ -0,0 +1,152 @@ +#!/bin/sh + +# Slackware build script for ossec-agent + +# Copyright 2016 Mario Preksavec, Zagreb, Croatia +# All rights reserved. +# +# Redistribution and use of this script, with or without modification, is +# permitted provided that the following conditions are met: +# +# 1. Redistributions of this script must retain the above copyright +# notice, this list of conditions and the following disclaimer. +# +# THIS SOFTWARE IS PROVIDED BY THE AUTHOR "AS IS" AND ANY EXPRESS OR IMPLIED +# WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF +# MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO +# EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, +# SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, +# PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; +# OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, +# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR +# OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF +# ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. + +PRGNAM=ossec-agent +VERSION=${VERSION:-2.9rc3} +BUILD=${BUILD:-1} +TAG=${TAG:-_SBo} + +SRCNAM=ossec-hids + +if [ -z "$ARCH" ]; then + case "$( uname -m )" in + i?86) ARCH=i586 ;; + arm*) ARCH=arm ;; + *) ARCH=$( uname -m ) ;; + esac +fi + +CWD=$(pwd) +TMP=${TMP:-/tmp/SBo} +PKG=$TMP/package-$PRGNAM +OUTPUT=${OUTPUT:-/tmp} + +if [ "$ARCH" = "i586" ]; then + SLKCFLAGS="-O2 -march=i586 -mtune=i686" + LIBDIRSUFFIX="" +elif [ "$ARCH" = "i686" ]; then + SLKCFLAGS="-O2 -march=i686 -mtune=i686" + LIBDIRSUFFIX="" +elif [ "$ARCH" = "x86_64" ]; then + SLKCFLAGS="-O2 -fPIC" + LIBDIRSUFFIX="64" +else + SLKCFLAGS="-O2" + LIBDIRSUFFIX="" +fi + +USERID=${USERID:-333} +USERID_MAIL=${USERID_MAIL:-334} +USERID_REMOTE=${USERID_REMOTE:-335} +GROUPID=${GROUPID:-333} + +if ! grep ^ossec: /etc/group 2>&1 > /dev/null \ +|| ! grep -E '^(ossec|ossecm|ossecr):' /etc/passwd 2>&1 > /dev/null; then + echo -e "\n You must have ossec users and a group to run this script\n" +fi + +if ! grep ^ossec: /etc/group 2>&1 > /dev/null; then + echo " # groupadd -g $GROUPID ossec" +fi + +if ! grep ^ossec: /etc/passwd 2>&1 > /dev/null; then + echo " # useradd -u $USERID -d /var/ossec -s /bin/false -g ossec ossec" + echo " # passwd -l ossec" +fi + +if ! grep ^ossecm: /etc/passwd 2>&1 > /dev/null; then + echo " # useradd -u $USERID_MAIL -d /var/ossec -s /bin/false -g ossec ossecm" + echo " # passwd -l ossecm" +fi + +if ! grep ^ossecr: /etc/passwd 2>&1 > /dev/null; then + echo " # useradd -u $USERID_REMOTE -d /var/ossec -s /bin/false -g ossec ossecr" + echo " # passwd -l ossecr" +fi + +if ! grep ^ossec: /etc/group 2>&1 > /dev/null \ +|| ! grep -E '^(ossec|ossecm|ossecr):' /etc/passwd 2>&1 > /dev/null; then + echo + exit +fi + +set -e + +rm -rf $PKG +mkdir -p $TMP $PKG $OUTPUT +cd $TMP +rm -rf $SRCNAM-$VERSION +tar xvf $CWD/$SRCNAM-$VERSION.tar.gz +cd $SRCNAM-$VERSION +chown -R root:root . +find -L . \ + \( -perm 777 -o -perm 775 -o -perm 750 -o -perm 711 -o -perm 555 \ + -o -perm 511 \) -exec chmod 755 {} \; -o \ + \( -perm 666 -o -perm 664 -o -perm 640 -o -perm 600 -o -perm 444 \ + -o -perm 440 -o -perm 400 \) -exec chmod 644 {} \; + +# Makefile fixes +sed -e 's|\(./init/adduser.sh.*\)|#\1|' \ + -e 's|\(DEFINES+=-DDEFAULTDIR=\).*|\1\\"/var/ossec\\"|' \ + -i src/Makefile + +# There is no configure script and install.sh is a bit limited +( cd src + make PREFIX=$PKG/var/ossec TARGET=agent build + make PREFIX=$PKG/var/ossec TARGET=agent install +) + +# Prepare system /etc +mkdir -p $PKG/etc/{logrotate.d,rc.d} +cat << EOF > $PKG/etc/ossec-init.conf.new +DIRECTORY="/var/ossec" +VERSION="$(cat src/VERSION)" +DATE="$(date)" +TYPE="agent" +EOF +chmod 600 $PKG/etc/ossec-init.conf.new +cat src/init/ossec-hids.init > $PKG/etc/rc.d/rc.ossec.new +cat $CWD/ossec.logrotate > $PKG/etc/logrotate.d/ossec.new + +# Stock ossec.conf is just an example - we prefer our own +mv $PKG/var/ossec/etc/ossec.conf $PKG/var/ossec/etc/ossec.conf.example +cat $CWD/ossec-agent.conf > $PKG/var/ossec/etc/ossec.conf.new +touch $PKG/var/ossec/etc/shared/agent.conf.new +chmod 640 $PKG/var/ossec/etc/{ossec,shared/agent}.conf.new +chown root:ossec $PKG/var/ossec/etc/{ossec,shared/agent}.conf.new +for i in $PKG/var/ossec/etc/*.{conf,keys} ; do mv $i $i.new ; done + +find $PKG -print0 | xargs -0 file | grep -e "executable" -e "shared object" | grep ELF \ + | cut -f 1 -d : | xargs strip --strip-unneeded 2> /dev/null || true + +mkdir -p $PKG/usr/doc/$PRGNAM-$VERSION +cp -a BUGS CHANGELOG CONFIG CONTRIBUTORS LICENSE README.md doc/{*.txt,README.*} \ + $CWD/README.SLACKWARE $PKG/usr/doc/$PRGNAM-$VERSION +cat $CWD/$PRGNAM.SlackBuild > $PKG/usr/doc/$PRGNAM-$VERSION/$PRGNAM.SlackBuild + +mkdir -p $PKG/install +cat $CWD/slack-desc > $PKG/install/slack-desc + +cd $PKG +/sbin/makepkg -l y -c n $OUTPUT/$PRGNAM-$VERSION-$ARCH-$BUILD$TAG.${PKGTYPE:-tgz} diff --git a/system/ossec-agent/ossec-agent.conf b/system/ossec-agent/ossec-agent.conf new file mode 100644 index 0000000000..be938c59e5 --- /dev/null +++ b/system/ossec-agent/ossec-agent.conf @@ -0,0 +1,105 @@ +<!-- OSSEC Slackware example config --> +<!-- Written by Mario Preksavec <mario at slackware dot hr> --> + +<ossec_config> + <client> + <!-- Server IP address --> + <server-ip>127.0.0.1</server-ip> + </client> + + <syscheck> + <!-- Frequency that syscheck is executed -- default every 2 hours --> + <frequency>7200</frequency> + + <!-- Directories to check (perform all possible verifications) --> + <directories check_all="yes">/etc,/usr/bin,/usr/sbin</directories> + <directories check_all="yes">/bin,/sbin,/boot</directories> + + <!-- Files/directories to ignore --> + <ignore>/etc/mtab</ignore> + <ignore>/etc/hosts.deny</ignore> + <ignore>/etc/mail/statistics</ignore> + <ignore>/etc/random-seed</ignore> + <ignore>/etc/adjtime</ignore> + <ignore>/etc/ntp/drift</ignore> + </syscheck> + + <rootcheck> + <!-- Local of the rootkit_files and rootkit_trojans files --> + <rootkit_files>/var/ossec/etc/shared/rootkit_files.txt</rootkit_files> + <rootkit_trojans>/var/ossec/etc/shared/rootkit_trojans.txt</rootkit_trojans> + <system_audit>/var/ossec/etc/shared/system_audit_rcl.txt</system_audit> + <system_audit>/var/ossec/etc/shared/cis_debian_linux_rcl.txt</system_audit> + <system_audit>/var/ossec/etc/shared/cis_rhel_linux_rcl.txt</system_audit> + <system_audit>/var/ossec/etc/shared/cis_rhel5_linux_rcl.txt</system_audit> + <system_audit>/var/ossec/etc/shared/cis_rhel6_linux_rcl.txt</system_audit> + <system_audit>/var/ossec/etc/shared/cis_rhel7_linux_rcl.txt</system_audit> + </rootcheck> + + <!-- Files to monitor (localfiles) --> + + <localfile> + <log_format>syslog</log_format> + <location>/var/log/messages</location> + </localfile> + + <localfile> + <log_format>syslog</log_format> + <location>/var/log/syslog</location> + </localfile> + + <localfile> + <log_format>syslog</log_format> + <location>/var/log/debug</location> + </localfile> + + <localfile> + <log_format>syslog</log_format> + <location>/var/log/secure</location> + </localfile> + + <localfile> + <log_format>syslog</log_format> + <location>/var/log/cron</location> + </localfile> + + <localfile> + <log_format>syslog</log_format> + <location>/var/log/maillog</location> + </localfile> + + <localfile> + <log_format>syslog</log_format> + <location>/var/log/spooler</location> + </localfile> + + <localfile> + <log_format>apache</log_format> + <location>/var/log/httpd/access_log</location> + </localfile> + + <localfile> + <log_format>apache</log_format> + <location>/var/log/httpd/error_log</location> + </localfile> + + <localfile> + <log_format>command</log_format> + <command>df -h</command> + </localfile> + + <localfile> + <log_format>full_command</log_format> + <command>netstat -tan | grep LISTEN | grep -v 127.0.0.1 | sort</command> + </localfile> + + <localfile> + <log_format>full_command</log_format> + <command>last -n 5</command> + </localfile> + + <localfile> + <log_format>full_command</log_format> + <command>lastb -n 5</command> + </localfile> +</ossec_config> diff --git a/system/ossec-agent/ossec-agent.info b/system/ossec-agent/ossec-agent.info new file mode 100644 index 0000000000..028b2a2aa2 --- /dev/null +++ b/system/ossec-agent/ossec-agent.info @@ -0,0 +1,10 @@ +PRGNAM="ossec-agent" +VERSION="2.9rc3" +HOMEPAGE="http://ossec.github.io/" +DOWNLOAD="https://github.com/ossec/ossec-hids/archive/2.9rc3/ossec-hids-2.9rc3.tar.gz" +MD5SUM="a4ce5872f32c0ab045215017198eb5a3" +DOWNLOAD_x86_64="" +MD5SUM_x86_64="" +REQUIRES="" +MAINTAINER="Mario Preksavec" +EMAIL="mario at slackware dot hr" diff --git a/system/ossec-agent/ossec.logrotate b/system/ossec-agent/ossec.logrotate new file mode 100644 index 0000000000..7b6406819f --- /dev/null +++ b/system/ossec-agent/ossec.logrotate @@ -0,0 +1,5 @@ +/var/ossec/logs/active-responses.log /var/ossec/logs/ossec.log { + missingok + notifempty + copytruncate +} diff --git a/system/ossec-agent/slack-desc b/system/ossec-agent/slack-desc new file mode 100644 index 0000000000..d58b681ba7 --- /dev/null +++ b/system/ossec-agent/slack-desc @@ -0,0 +1,19 @@ +# HOW TO EDIT THIS FILE: +# The "handy ruler" below makes it easier to edit a package description. +# Line up the first '|' above the ':' following the base package name, and +# the '|' on the right side marks the last column you can put a character in. +# You must make exactly 11 lines for the formatting to be correct. It's also +# customary to leave one space after the ':' except on otherwise blank lines. + + |-----handy-ruler------------------------------------------------------| +ossec-agent: ossec-agent (Open Source Host-based Intrusion Detection System) +ossec-agent: +ossec-agent: OSSEC is an Open Source Host-based Intrusion Detection System that +ossec-agent: performs log analysis, file integrity checking, policy monitoring, +ossec-agent: rootkit detection, real-time alerting and active response. +ossec-agent: +ossec-agent: Homepage: http://ossec.github.io/ +ossec-agent: +ossec-agent: +ossec-agent: +ossec-agent: |