diff --git a/.gitignore b/.gitignore index dedb101..876f0fa 100644 --- a/.gitignore +++ b/.gitignore @@ -1 +1 @@ -/prelude-lml-4.0.0.tar.gz +/prelude-lml-4.1.0.tar.gz diff --git a/prelude-lml-4.0.0-fix_check.patch b/prelude-lml-4.0.0-fix_check.patch deleted file mode 100644 index 6177978..0000000 --- a/prelude-lml-4.0.0-fix_check.patch +++ /dev/null @@ -1,504 +0,0 @@ -diff -Nru src/file-server.c src/file-server.c ---- ./src/file-server.c 2016-09-15 08:49:20.170000884 +0200 -+++ ./src/file-server.c 2017-01-28 18:18:06.634761198 +0100 -@@ -346,6 +346,9 @@ - ssize_t ret; - struct stat st; - -+ if ( config.dry_run ) -+ return 0; -+ - if ( fstat(fileno(monitor->metadata_fd), &st) < 0 ) { - prelude_log(PRELUDE_LOG_WARN, "fstat failed : %s.\n", strerror(errno)); - return -1; -@@ -416,6 +419,9 @@ - off_t offset = 0, available = 65535; - unsigned char msum[METADATA_SIZE], *sumptr = msum; - -+ if ( config.dry_run ) -+ return 0; -+ - filename = lml_log_source_get_name(monitor->source); - - ret = file_metadata_read(monitor, &offset, &sumptr); -@@ -477,6 +483,9 @@ - int fd; - char file[PATH_MAX], path[PATH_MAX], *ptr; - -+ if ( config.dry_run ) -+ return 0; -+ - strncpy(file, lml_log_source_get_name(monitor->source), sizeof(file)); - - while ( (ptr = strchr(file, '/')) ) -diff -Nru src/prelude-lml.c src/prelude-lml.c ---- ./src/prelude-lml.c 2016-09-15 08:49:20.171000884 +0200 -+++ ./src/prelude-lml.c 2017-01-28 18:19:25.373006781 +0100 -@@ -361,6 +361,7 @@ - ev_timer evt; - struct timeval end; - struct sigaction action; -+ const char *env; - - /* - * Initialize libev. -@@ -389,7 +390,11 @@ - if ( ret < 0 ) - return ret; - -- ret = log_plugins_init(LOG_PLUGIN_DIR, lml_root_optlist); -+ env = getenv("PRELUDE_LML_PLUGIN_DIR"); -+ if ( !env ) -+ env = LOG_PLUGIN_DIR; -+ -+ ret = log_plugins_init(env, lml_root_optlist); - if (ret < 0) - return ret; - -diff -Nru src/regex.c src/regex.c ---- ./src/regex.c 2016-09-15 08:49:20.172000884 +0200 -+++ ./src/regex.c 2017-01-28 18:17:45.931222693 +0100 -@@ -156,16 +156,20 @@ - FILE *fd; - size_t len; - char buf[1024]; -- const char *errptr; -+ const char *errptr, *env; - int line = 0, erroff; - regex_table_item_t *rt; - pcre_extra *regex_regex_extra = NULL; - char *regex, *options, *source, *plugin; - pcre *regex_regex = NULL, *source_regex = NULL; - -- fd = fopen(REGEX_CONF, "r"); -+ env = getenv("PRELUDE_LML_REGEX_CONF"); -+ if ( !env ) -+ env = REGEX_CONF; -+ -+ fd = fopen(env, "r"); - if ( ! fd ) { -- prelude_log(PRELUDE_LOG_ERR, "couldn't open config file %s.\n", REGEX_CONF); -+ prelude_log(PRELUDE_LOG_ERR, "couldn't open config file %s.\n", env); - return -1; - } - -diff -Nru tests/Makefile.in tests/Makefile.in ---- ./tests/Makefile.in 2016-09-15 09:03:00.925000884 +0200 -+++ ./tests/Makefile.in 2017-01-28 18:22:00.268558881 +0100 -@@ -1362,7 +1362,10 @@ - cd $(top_srcdir)/prelude-lml && make - - check-am: -- $(srcdir)/loggrep.py $(top_srcdir)/plugins/pcre/ruleset/*.rules | $(top_srcdir)/src/prelude-lml --quiet --dry-run --metadata=nowrite,head --batch-mode --no-resolve --pcre --dump-unmatched --config $(srcdir)/prelude-lml.conf 2>&1 | $(GREP) -Fvf $(srcdir)/ignored -+ rm -rf plugins && mkdir plugins -+ cp $(top_srcdir)/plugins/*/.libs/*.so plugins -+ ./loggrep.py regex.test | PRELUDE_LML_PLUGIN_DIR=plugins PRELUDE_LML_REGEX_CONF=plugins.rules $(top_srcdir)/src/prelude-lml --quiet --dry-run --metadata=nowrite,head --batch-mode --no-resolve --pcre --dump-unmatched --config $(srcdir)/prelude-lml.conf 2>&1 | $(GREP) -Fvf $(srcdir)/ignored -+ rm -rf plugins - - -include $(top_srcdir)/git.mk - -diff -Nru tests/plugins.rules tests/plugins.rules ---- ./tests/plugins.rules 1970-01-01 01:00:00.000000000 +0100 -+++ ./tests/plugins.rules 2017-01-28 18:20:24.857682680 +0100 -@@ -0,0 +1 @@ -+ * Pcre - * -diff -Nru tests/prelude-lml.conf tests/prelude-lml.conf ---- ./tests/prelude-lml.conf 2016-09-15 08:49:20.172000884 +0200 -+++ ./tests/prelude-lml.conf 2017-01-28 18:20:30.037567378 +0100 -@@ -3,51 +3,5 @@ - prefix-regex = "^(?P.{15}) (?P\S+) (?:(?P\S+?)(?:\[(?P[0-9]+)\])?: )?" - file = - - --[format=apache] --time-format = "%d/%b/%Y:%H:%M:%S" --prefix-regex = "(?P\S+) \S+ \S+ \[(?P.{20}) [+-].{4}\] " --file = - -- --[format=apache-error] --#[Sat Mar 12 22:56:12 2005] [error] [client 127.0.0.1] --time-format = "%a %b %d %H:%M:%S %Y" --prefix-regex = "^\[(?P.{24})\]" --file = - -- --[format=checkpoint] --time-format = "%d%b%Y %H:%M:%S" --prefix-regex = "^(?P.{20})" --file = - -- --[format=squid] --#2005/11/28 06:00:44| --time-format = "%Y/%m/%d %H:%M:%S" --prefix-regex = "^(?P.{19})\| " --file = - -- --[format=honeyd] --#2006-08-18-12:21:12.1239 --time-format = "%Y-%m-%d-%H:%M:%S" --prefix-regex = "^(?P.{19})\." --file = - -- --[format=honeytrap] --#[2007-05-26 16:48:09] --time-format = "%Y-%m-%d %H:%M:%S" --prefix-regex = "^\[(?P.{19})\]" --file = - -- --[format=kojoney] --#2007/04/12 21:57 CEST --time-format = "%Y/%m/%d %H:%M" --prefix-regex = "^(?P.{16}) " --file = - -- --[format=rishi] --#2007-05-20 12:49:57,644 --time-format = "%Y-%m-%d %H:%M:%S" --prefix-regex = "^(?P.{19})," --file = - -- - [Pcre] --ruleset=../plugins/pcre/ruleset/pcre.rules -+ruleset=./regex.test -diff -Nru tests/regex.test tests/regex.test ---- ./tests/regex.test 1970-01-01 01:00:00.000000000 +0100 -+++ ./tests/regex.test 2017-01-28 18:20:17.921837067 +0100 -@@ -0,0 +1,340 @@ -+#FULLNAME: SSH -+#VERSION: 1.0 -+#DESCRIPTION: SSH, is a cryptographic (encrypted) network protocol to allow remote login and other network services to operate securely over an unsecured network. -+ -+##### -+# -+# Copyright (C) 2002,2004 Nicolas Delon -+# Copyright (C) 2005 G Ramon Gomez -+# All Rights Reserved -+# -+# This program is free software; you can redistribute it and/or modify -+# it under the terms of the GNU General Public License as published by -+# the Free Software Foundation; either version 2, or (at your option) -+# any later version. -+# -+# This program is distributed in the hope that it will be useful, -+# but WITHOUT ANY WARRANTY; without even the implied warranty of -+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the -+# GNU General Public License for more details. -+# -+# You should have received a copy of the GNU General Public License along -+# with this program; if not, write to the Free Software Foundation, Inc., -+# 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA. -+# -+##### -+ -+################### -+# Logging succeed # -+################### -+ -+#LOG:Dec 8 14:45:17 itguxweb1 sshd[32112]: Accepted publickey for root from 12.34.56.78 port 56634 ssh2 -+regex=for root from|user root; \ -+ id=1907; \ -+ assessment.impact.type=admin; \ -+ assessment.impact.severity=medium; \ -+ silent; chained -+ -+#LOG:Dec 8 14:45:17 itguxweb1 sshd[32112]: Accepted publickey for root from 12.34.56.78 port 56634 ssh2 -+#LOG:Jan 14 03:30:44 mail sshd[20298]: Accepted publickey for root from fec0:0:201::3 port 63018 ssh2 -+#LOG:Jan 14 03:30:44 mail sshd[20298]: Accepted publickey for john from fec0:0:201::3 port 63018 ssh2 -+#LOG:Dec 10 10:33:19 itguxweb2 sshd[29738]: Accepted password for ekwong from 12.34.56.78 port 39852 ssh2 -+regex=Accepted (\S+) for (\S+) from (\S+) port (\d+); \ -+ classification.text=Remote Login; \ -+ optgoto=1907; \ -+ id=1908; \ -+ revision=3; \ -+ analyzer(0).name=sshd; \ -+ analyzer(0).manufacturer=OpenSSH; \ -+ analyzer(0).class=Authentication; \ -+ assessment.impact.severity=low; \ -+ assessment.impact.completion=succeeded; \ -+ assessment.impact.type=user; \ -+ assessment.impact.description=User $2 logged in from $3 port $4 using the $1 method; \ -+ source(0).node.address(0).address=$3; \ -+ source(0).service.port=$4; \ -+ source(0).service.iana_protocol_name=tcp; \ -+ source(0).service.iana_protocol_number=6; \ -+ target(0).service.port=22; \ -+ target(0).service.name=ssh; \ -+ target(0).service.iana_protocol_name=tcp; \ -+ target(0).service.iana_protocol_number=6; \ -+ target(0).user.category=os-device; \ -+ target(0).user.user_id(0).type=target-user; \ -+ target(0).user.user_id(0).name=$2; \ -+ additional_data(0).type=string; \ -+ additional_data(0).meaning=Authentication method; \ -+ additional_data(0).data=$1; \ -+ last; -+ -+ -+################ -+# Login failed # -+################ -+ -+#LOG:Dec 9 16:00:35 itguxweb2 sshd[24541]: Failed password for root from 12.34.56.78 port 1806 -+#LOG:Dec 9 21:29:56 devel5 sshd[17554]: Failed password for akarade from 12.34.56.78 port 4214 -+regex=Failed (\S+) for (\S+) from (\S+) port (\d+); \ -+ optgoto=1907; \ -+ classification.text=Remote Login; \ -+ id=1902; \ -+ revision=3; \ -+ analyzer(0).name=sshd; \ -+ analyzer(0).manufacturer=OpenSSH; \ -+ analyzer(0).class=Authentication; \ -+ assessment.impact.severity=medium; \ -+ assessment.impact.completion=failed; \ -+ assessment.impact.type=user; \ -+ assessment.impact.description=Someone tried to login as $2 from $3 port $4 using the $1 method; \ -+ source(0).node.address(0).address=$3; \ -+ source(0).service.port=$4; \ -+ source(0).service.iana_protocol_name=tcp; \ -+ source(0).service.iana_protocol_number=6; \ -+ target(0).service.port=22; \ -+ target(0).service.name=ssh; \ -+ target(0).service.iana_protocol_name=tcp; \ -+ target(0).service.iana_protocol_number=6; \ -+ target(0).user.category=os-device; \ -+ target(0).user.user_id(0).type=target-user; \ -+ target(0).user.user_id(0).name=$2; \ -+ additional_data(0).type=string; \ -+ additional_data(0).meaning=Authentication method; \ -+ additional_data(0).data=$1; \ -+ last -+ -+ -+############################################## -+# Invalid (not existing) user tried to login # -+############################################## -+ -+#LOG:Jan 20 14:10:02 blah sshd[25443]: Invalid user admin from 213.201.222.134 -+regex=(Illegal|Invalid) user (\S+) from (\S+); \ -+ classification.text=User login failed with an invalid user; \ -+ id=1904; \ -+ revision=2; \ -+ analyzer(0).name=sshd; \ -+ analyzer(0).manufacturer=OpenSSH; \ -+ analyzer(0).class=Authentication; \ -+ assessment.impact.severity=medium; \ -+ assessment.impact.completion=failed; \ -+ assessment.impact.type=user; \ -+ assessment.impact.description=Someone tried to login with the invalid user "$2" from $3; \ -+ source(0).node.address(0).address=$3; \ -+ source(0).service.iana_protocol_name=tcp; \ -+ source(0).service.iana_protocol_number=6; \ -+ target(0).service.port=22; \ -+ target(0).service.name=ssh; \ -+ target(0).service.iana_protocol_name=tcp; \ -+ target(0).service.iana_protocol_number=6; \ -+ target(0).user.category=os-device; \ -+ target(0).user.user_id(0).type=target-user; \ -+ target(0).user.user_id(0).name=$2; \ -+ last -+ -+################################################################################## -+# User listed in DenyGroups or DenyUsers (sshd_config directives) tried to login # -+################################################################################## -+ -+#LOG:Jan 6 22:50:24 localhost sshd[15489]: User nobody not allowed because none of user's groups are listed in AllowGroups -+regex=User (\S+) not allowed because (.*)listed in (\w+); \ -+ classification.text=User login failed with a denied user; \ -+ id=1905; \ -+ revision=3; \ -+ analyzer(0).name=sshd; \ -+ analyzer(0).manufacturer=OpenSSH; \ -+ analyzer(0).class=Authentication; \ -+ assessment.impact.severity=medium; \ -+ assessment.impact.completion=failed; \ -+ assessment.impact.type=user; \ -+ assessment.impact.description=User $1 failed to login because $2 listed in $3; \ -+ source(0).service.iana_protocol_name=tcp; \ -+ source(0).service.iana_protocol_number=6; \ -+ target(0).service.port=22; \ -+ target(0).service.name=ssh; \ -+ target(0).service.iana_protocol_name=tcp; \ -+ target(0).service.iana_protocol_number=6; \ -+ target(0).user.category=os-device; \ -+ target(0).user.user_id(0).type=target-user; \ -+ target(0).user.user_id(0).name=$1; \ -+ additional_data(0).type=string; \ -+ additional_data(0).meaning=ACL; \ -+ additional_data(0).data=$3; \ -+ additional_data(1).type=string; \ -+ additional_data(1).meaning=Failure reason; \ -+ additional_data(1).data=$2 listed in $3; \ -+ last -+ -+################################################################## -+# Sshd did not receive the identification string from the client # -+# (maybe a ssh server recognition) # -+################################################################## -+ -+#LOG:Jun 10 09:51:57 server sshd[9100]: Did not receive identification string from 1.2.3.4 -+regex=Did not receive identification string from (\S+); \ -+ classification.text=Server recognition; \ -+ id=1906; \ -+ revision=2; \ -+ analyzer(0).name=sshd; \ -+ analyzer(0).manufacturer=OpenSSH; \ -+ analyzer(0).class=Authentication; \ -+ assessment.impact.severity=medium; \ -+ assessment.impact.completion=failed; \ -+ assessment.impact.type=recon; \ -+ assessment.impact.description=$1 is probably making a server recognition; \ -+ source(0).node.address(0).address=$1; \ -+ source(0).service.iana_protocol_name=tcp; \ -+ source(0).service.iana_protocol_number=6; \ -+ target(0).service.port=22; \ -+ target(0).service.name=ssh; \ -+ target(0).service.iana_protocol_name=tcp; \ -+ target(0).service.iana_protocol_number=6; \ -+ additional_data(0).type=string; \ -+ additional_data(0).meaning=Failure reason; \ -+ additional_data(0).data=Did not receive identification string; \ -+ last -+ -+######################################################################### -+# Forbidden root login # -+# (directive PermitRootLogin and keyword "no" or "forced-commands-only" # -+# of the sshd_config file) # -+######################################################################### -+ -+#LOG:Jan 5 01:31:41 www sshd[1643]: ROOT LOGIN REFUSED FROM 1.2.3.4 -+regex=ROOT LOGIN REFUSED FROM (\S+); \ -+ classification.text=Admin login; \ -+ id=1909; \ -+ revision=2; \ -+ analyzer(0).name=sshd; \ -+ analyzer(0).manufacturer=OpenSSH; \ -+ analyzer(0).class=Authentication; \ -+ assessment.impact.severity=medium; \ -+ assessment.impact.completion=failed; \ -+ assessment.impact.type=admin; \ -+ assessment.impact.description=Root tried to login while it is forbidden; \ -+ source(0).node.address(0).address=$1; \ -+ source(0).service.iana_protocol_name=tcp; \ -+ source(0).service.iana_protocol_number=6; \ -+ target(0).service.port=22; \ -+ target(0).service.name=ssh; \ -+ target(0).service.iana_protocol_name=tcp; \ -+ target(0).service.iana_protocol_number=6; \ -+ target(0).user.category=os-device; \ -+ target(0).user.user_id(0).type=target-user; \ -+ target(0).user.user_id(0).name=root; \ -+ last -+ -+ -+# Re: Generic Message Exchange Authentication For SSH -+# -+#LOG:Jan 14 08:19:21 ras sshd[22774]: input_userauth_request: invalid user remote-mail -+regex=input_userauth_request: (illegal|invalid) user (\S+); \ -+ classification.text=Invalid user in authentication request; \ -+ id=1910; \ -+ revision=3; \ -+ analyzer(0).name=sshd; \ -+ analyzer(0).manufacturer=OpenSSH; \ -+ analyzer(0).class=Authentication; \ -+ assessment.impact.severity=medium; \ -+ assessment.impact.completion=failed; \ -+ assessment.impact.type=user; \ -+ assessment.impact.description=General purpose authentication request was blocked. Reason: invalid user $2; \ -+ source(0).service.iana_protocol_name=tcp; \ -+ source(0).service.iana_protocol_number=6; \ -+ target(0).service.port=22; \ -+ target(0).service.name=ssh; \ -+ target(0).service.iana_protocol_name=tcp; \ -+ target(0).service.iana_protocol_number=6; \ -+ target(0).user.category=os-device; \ -+ target(0).user.user_id(0).type=target-user; \ -+ target(0).user.user_id(0).name=$2; \ -+ additional_data(0).type=string; \ -+ additional_data(0).meaning=Failure reason; \ -+ additional_data(0).data=$1 user; \ -+ last -+ -+# Re: Generic Message Exchange Authentication For SSH -+# -+# This rule catches several other combinations that can be output by -+# input_userauth_request() in auth2.c -+#LOG:Jan 14 08:19:21 ras sshd[22774]: input_userauth_request: invalid user remote-mail -+regex=input_userauth_request: (.+); \ -+ classification.text=Invalid user in authentication request; \ -+ id=1911; \ -+ revision=2; \ -+ analyzer(0).name=sshd; \ -+ analyzer(0).manufacturer=OpenSSH; \ -+ analyzer(0).class=Authentication; \ -+ assessment.impact.severity=medium; \ -+ assessment.impact.completion=failed; \ -+ assessment.impact.type=user; \ -+ assessment.impact.description=General purpose authentication request was blocked. Reason: $1; \ -+ source(0).service.iana_protocol_name=tcp; \ -+ source(0).service.iana_protocol_number=6; \ -+ target(0).service.port=22; \ -+ target(0).service.name=ssh; \ -+ target(0).service.iana_protocol_name=tcp; \ -+ target(0).service.iana_protocol_number=6; \ -+ target(0).user.category=os-device; \ -+ last -+ -+#LOG:Dec 9 18:48:29 itguxweb2 sshd[29536]: Failed password for illegal user ROOT from 12.34.56.78 port 2886 -+#LOG:Jan 14 08:19:21 ras sshd[22774]: Failed none for invalid user remote-mail from 192.168.1.22 port 65407 ssh2 -+#LOG:Jan 14 11:29:17 ras sshd[18163]: Failed publickey for invalid user fred from fec0:0:201::3 port 62788 ssh2 -+#LOG:Jan 14 11:29:17 ras sshd[18163]: Failed publickey for invalid user fred from 1.2.3.4 port 62788 ssh2 -+#LOG:Jan 14 11:29:17 ras sshd[18163]: Failed publickey for invalid user fred from hostname port 62788 ssh2 -+regex=Failed (\S+) for (illegal|invalid) user (\S+) from (\S+) port (\d+); \ -+ classification.text=Remote Login; \ -+ optgoto=1907; \ -+ id=1912; \ -+ revision=3; \ -+ analyzer(0).name=sshd; \ -+ analyzer(0).manufacturer=OpenSSH; \ -+ analyzer(0).class=Authentication; \ -+ assessment.impact.severity=medium; \ -+ assessment.impact.completion=failed; \ -+ assessment.impact.type=admin; \ -+ assessment.impact.description=Someone tried to login as $3 from $4 port $5 using the $1 method; \ -+ source(0).node.address(0).address=$4; \ -+ source(0).service.port=$5; \ -+ source(0).service.iana_protocol_name=tcp; \ -+ source(0).service.iana_protocol_number=6; \ -+ target(0).service.port=22; \ -+ target(0).service.name=ssh; \ -+ target(0).service.iana_protocol_name=tcp; \ -+ target(0).service.iana_protocol_number=6; \ -+ target(0).user.category=os-device; \ -+ target(0).user.user_id(0).type=target-user; \ -+ target(0).user.user_id(0).name=$3; \ -+ additional_data(0).type=string; \ -+ additional_data(0).meaning=Authentication method; \ -+ additional_data(0).data=$1; \ -+ additional_data(1).type=string; \ -+ additional_data(1).meaning=Failure reason; \ -+ additional_data(1).data=$2 user; \ -+ last -+ -+#LOG:Oct 2 14:40:05 suse-9.2 sshd[18725]: error: PAM: Authentication failure for root from unknown.anywhere.net -+#LOG:Oct 2 14:46:52 suse-9.2 sshd[18804]: error: PAM: Authentication failure for foobar from unknown.anywhere.net -+regex=error: PAM: Authentication failure for (\S+) from (\S+); \ -+ classification.text=Remote Login; \ -+ optgoto=1907; \ -+ id=1914; \ -+ revision=2; \ -+ analyzer(0).name=sshd; \ -+ analyzer(0).manufacturer=OpenSSH; \ -+ analyzer(0).class=Authentication; \ -+ assessment.impact.severity=medium; \ -+ assessment.impact.completion=failed; \ -+ assessment.impact.type=user; \ -+ assessment.impact.description=Someone tried to login as $1 from $2; \ -+ source(0).node.name=$2; \ -+ source(0).service.iana_protocol_name=tcp; \ -+ source(0).service.iana_protocol_number=6; \ -+ target(0).service.port=22; \ -+ target(0).service.name=ssh; \ -+ target(0).service.iana_protocol_name=tcp; \ -+ target(0).service.iana_protocol_number=6; \ -+ target(0).user.category=os-device; \ -+ target(0).user.user_id(0).type=target-user; \ -+ target(0).user.user_id(0).name=$1; \ -+ last diff --git a/prelude-lml-4.0.0-fix_etc_perms.patch b/prelude-lml-4.0.0-fix_etc_perms.patch deleted file mode 100644 index 28bba70..0000000 --- a/prelude-lml-4.0.0-fix_etc_perms.patch +++ /dev/null @@ -1,39 +0,0 @@ ---- ./Makefile.in 2016-09-15 09:03:01.116000884 +0200 -+++ ./Makefile.in 2017-01-26 07:38:35.217447516 +0100 -@@ -1762,9 +1762,9 @@ - - - install-data-local: -- $(INSTALL) -m 700 -d $(DESTDIR)$(configdir); -- $(INSTALL) -m 700 -d $(DESTDIR)$(lml_run_dir); -- $(INSTALL) -m 700 -d $(DESTDIR)$(metadata_dir) -+ $(INSTALL) -m 755 -d $(DESTDIR)$(configdir); -+ $(INSTALL) -m 755 -d $(DESTDIR)$(lml_run_dir); -+ $(INSTALL) -m 755 -d $(DESTDIR)$(metadata_dir) - @if test -f $(DESTDIR)$(configdir)/prelude-lml.conf; then \ - echo "********************************************************************************"; \ - echo; \ -@@ -1772,9 +1772,9 @@ - echo "Installing default configuration in $(DESTDIR)$(configdir)/prelude-lml.conf-dist"; \ - echo; \ - echo "********************************************************************************"; \ -- $(INSTALL) -m 600 $(top_srcdir)/prelude-lml.conf $(DESTDIR)$(configdir)/prelude-lml.conf-dist; \ -+ $(INSTALL) -m 644 $(top_srcdir)/prelude-lml.conf $(DESTDIR)$(configdir)/prelude-lml.conf-dist; \ - else \ -- $(INSTALL) -m 600 $(top_srcdir)/prelude-lml.conf $(DESTDIR)$(configdir)/; \ -+ $(INSTALL) -m 644 $(top_srcdir)/prelude-lml.conf $(DESTDIR)$(configdir)/; \ - fi - @if test -f $(DESTDIR)$(configdir)/plugins.rules; then \ - echo "********************************************************************************"; \ -@@ -1783,9 +1783,9 @@ - echo "Installing default configuration in $(DESTDIR)$(configdir)/plugins.rules-dist"; \ - echo; \ - echo "********************************************************************************"; \ -- $(INSTALL) -m 600 $(top_srcdir)/plugins.rules $(DESTDIR)$(configdir)/plugins.rules-dist; \ -+ $(INSTALL) -m 644 $(top_srcdir)/plugins.rules $(DESTDIR)$(configdir)/plugins.rules-dist; \ - else \ -- $(INSTALL) -m 600 $(top_srcdir)/plugins.rules $(DESTDIR)$(configdir)/; \ -+ $(INSTALL) -m 644 $(top_srcdir)/plugins.rules $(DESTDIR)$(configdir)/; \ - fi - - uninstall-local: diff --git a/prelude-lml-4.0.0-gnutls_priority_set_direct.patch b/prelude-lml-4.0.0-gnutls_priority_set_direct.patch deleted file mode 100644 index 92b06ed..0000000 --- a/prelude-lml-4.0.0-gnutls_priority_set_direct.patch +++ /dev/null @@ -1,11 +0,0 @@ ---- ./src/tcp-server-tls.c 2016-09-15 08:49:20.172000884 +0200 -+++ ./src/tcp-server-tls.c2 2017-02-07 01:10:30.904772287 +0100 -@@ -489,7 +489,7 @@ - #else - # define TLS_DH_STR "+ANON-DH" - #endif -- const char *pstring = "NORMAL:" TLS_DH_STR; -+ const char *pstring = "@SYSTEM:" TLS_DH_STR; - - gnutls_set_default_priority(session); - diff --git a/prelude-lml-4.1.0-fix_check.patch b/prelude-lml-4.1.0-fix_check.patch new file mode 100644 index 0000000..6177978 --- /dev/null +++ b/prelude-lml-4.1.0-fix_check.patch @@ -0,0 +1,504 @@ +diff -Nru src/file-server.c src/file-server.c +--- ./src/file-server.c 2016-09-15 08:49:20.170000884 +0200 ++++ ./src/file-server.c 2017-01-28 18:18:06.634761198 +0100 +@@ -346,6 +346,9 @@ + ssize_t ret; + struct stat st; + ++ if ( config.dry_run ) ++ return 0; ++ + if ( fstat(fileno(monitor->metadata_fd), &st) < 0 ) { + prelude_log(PRELUDE_LOG_WARN, "fstat failed : %s.\n", strerror(errno)); + return -1; +@@ -416,6 +419,9 @@ + off_t offset = 0, available = 65535; + unsigned char msum[METADATA_SIZE], *sumptr = msum; + ++ if ( config.dry_run ) ++ return 0; ++ + filename = lml_log_source_get_name(monitor->source); + + ret = file_metadata_read(monitor, &offset, &sumptr); +@@ -477,6 +483,9 @@ + int fd; + char file[PATH_MAX], path[PATH_MAX], *ptr; + ++ if ( config.dry_run ) ++ return 0; ++ + strncpy(file, lml_log_source_get_name(monitor->source), sizeof(file)); + + while ( (ptr = strchr(file, '/')) ) +diff -Nru src/prelude-lml.c src/prelude-lml.c +--- ./src/prelude-lml.c 2016-09-15 08:49:20.171000884 +0200 ++++ ./src/prelude-lml.c 2017-01-28 18:19:25.373006781 +0100 +@@ -361,6 +361,7 @@ + ev_timer evt; + struct timeval end; + struct sigaction action; ++ const char *env; + + /* + * Initialize libev. +@@ -389,7 +390,11 @@ + if ( ret < 0 ) + return ret; + +- ret = log_plugins_init(LOG_PLUGIN_DIR, lml_root_optlist); ++ env = getenv("PRELUDE_LML_PLUGIN_DIR"); ++ if ( !env ) ++ env = LOG_PLUGIN_DIR; ++ ++ ret = log_plugins_init(env, lml_root_optlist); + if (ret < 0) + return ret; + +diff -Nru src/regex.c src/regex.c +--- ./src/regex.c 2016-09-15 08:49:20.172000884 +0200 ++++ ./src/regex.c 2017-01-28 18:17:45.931222693 +0100 +@@ -156,16 +156,20 @@ + FILE *fd; + size_t len; + char buf[1024]; +- const char *errptr; ++ const char *errptr, *env; + int line = 0, erroff; + regex_table_item_t *rt; + pcre_extra *regex_regex_extra = NULL; + char *regex, *options, *source, *plugin; + pcre *regex_regex = NULL, *source_regex = NULL; + +- fd = fopen(REGEX_CONF, "r"); ++ env = getenv("PRELUDE_LML_REGEX_CONF"); ++ if ( !env ) ++ env = REGEX_CONF; ++ ++ fd = fopen(env, "r"); + if ( ! fd ) { +- prelude_log(PRELUDE_LOG_ERR, "couldn't open config file %s.\n", REGEX_CONF); ++ prelude_log(PRELUDE_LOG_ERR, "couldn't open config file %s.\n", env); + return -1; + } + +diff -Nru tests/Makefile.in tests/Makefile.in +--- ./tests/Makefile.in 2016-09-15 09:03:00.925000884 +0200 ++++ ./tests/Makefile.in 2017-01-28 18:22:00.268558881 +0100 +@@ -1362,7 +1362,10 @@ + cd $(top_srcdir)/prelude-lml && make + + check-am: +- $(srcdir)/loggrep.py $(top_srcdir)/plugins/pcre/ruleset/*.rules | $(top_srcdir)/src/prelude-lml --quiet --dry-run --metadata=nowrite,head --batch-mode --no-resolve --pcre --dump-unmatched --config $(srcdir)/prelude-lml.conf 2>&1 | $(GREP) -Fvf $(srcdir)/ignored ++ rm -rf plugins && mkdir plugins ++ cp $(top_srcdir)/plugins/*/.libs/*.so plugins ++ ./loggrep.py regex.test | PRELUDE_LML_PLUGIN_DIR=plugins PRELUDE_LML_REGEX_CONF=plugins.rules $(top_srcdir)/src/prelude-lml --quiet --dry-run --metadata=nowrite,head --batch-mode --no-resolve --pcre --dump-unmatched --config $(srcdir)/prelude-lml.conf 2>&1 | $(GREP) -Fvf $(srcdir)/ignored ++ rm -rf plugins + + -include $(top_srcdir)/git.mk + +diff -Nru tests/plugins.rules tests/plugins.rules +--- ./tests/plugins.rules 1970-01-01 01:00:00.000000000 +0100 ++++ ./tests/plugins.rules 2017-01-28 18:20:24.857682680 +0100 +@@ -0,0 +1 @@ ++ * Pcre - * +diff -Nru tests/prelude-lml.conf tests/prelude-lml.conf +--- ./tests/prelude-lml.conf 2016-09-15 08:49:20.172000884 +0200 ++++ ./tests/prelude-lml.conf 2017-01-28 18:20:30.037567378 +0100 +@@ -3,51 +3,5 @@ + prefix-regex = "^(?P.{15}) (?P\S+) (?:(?P\S+?)(?:\[(?P[0-9]+)\])?: )?" + file = - + +-[format=apache] +-time-format = "%d/%b/%Y:%H:%M:%S" +-prefix-regex = "(?P\S+) \S+ \S+ \[(?P.{20}) [+-].{4}\] " +-file = - +- +-[format=apache-error] +-#[Sat Mar 12 22:56:12 2005] [error] [client 127.0.0.1] +-time-format = "%a %b %d %H:%M:%S %Y" +-prefix-regex = "^\[(?P.{24})\]" +-file = - +- +-[format=checkpoint] +-time-format = "%d%b%Y %H:%M:%S" +-prefix-regex = "^(?P.{20})" +-file = - +- +-[format=squid] +-#2005/11/28 06:00:44| +-time-format = "%Y/%m/%d %H:%M:%S" +-prefix-regex = "^(?P.{19})\| " +-file = - +- +-[format=honeyd] +-#2006-08-18-12:21:12.1239 +-time-format = "%Y-%m-%d-%H:%M:%S" +-prefix-regex = "^(?P.{19})\." +-file = - +- +-[format=honeytrap] +-#[2007-05-26 16:48:09] +-time-format = "%Y-%m-%d %H:%M:%S" +-prefix-regex = "^\[(?P.{19})\]" +-file = - +- +-[format=kojoney] +-#2007/04/12 21:57 CEST +-time-format = "%Y/%m/%d %H:%M" +-prefix-regex = "^(?P.{16}) " +-file = - +- +-[format=rishi] +-#2007-05-20 12:49:57,644 +-time-format = "%Y-%m-%d %H:%M:%S" +-prefix-regex = "^(?P.{19})," +-file = - +- + [Pcre] +-ruleset=../plugins/pcre/ruleset/pcre.rules ++ruleset=./regex.test +diff -Nru tests/regex.test tests/regex.test +--- ./tests/regex.test 1970-01-01 01:00:00.000000000 +0100 ++++ ./tests/regex.test 2017-01-28 18:20:17.921837067 +0100 +@@ -0,0 +1,340 @@ ++#FULLNAME: SSH ++#VERSION: 1.0 ++#DESCRIPTION: SSH, is a cryptographic (encrypted) network protocol to allow remote login and other network services to operate securely over an unsecured network. ++ ++##### ++# ++# Copyright (C) 2002,2004 Nicolas Delon ++# Copyright (C) 2005 G Ramon Gomez ++# All Rights Reserved ++# ++# This program is free software; you can redistribute it and/or modify ++# it under the terms of the GNU General Public License as published by ++# the Free Software Foundation; either version 2, or (at your option) ++# any later version. ++# ++# This program is distributed in the hope that it will be useful, ++# but WITHOUT ANY WARRANTY; without even the implied warranty of ++# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the ++# GNU General Public License for more details. ++# ++# You should have received a copy of the GNU General Public License along ++# with this program; if not, write to the Free Software Foundation, Inc., ++# 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA. ++# ++##### ++ ++################### ++# Logging succeed # ++################### ++ ++#LOG:Dec 8 14:45:17 itguxweb1 sshd[32112]: Accepted publickey for root from 12.34.56.78 port 56634 ssh2 ++regex=for root from|user root; \ ++ id=1907; \ ++ assessment.impact.type=admin; \ ++ assessment.impact.severity=medium; \ ++ silent; chained ++ ++#LOG:Dec 8 14:45:17 itguxweb1 sshd[32112]: Accepted publickey for root from 12.34.56.78 port 56634 ssh2 ++#LOG:Jan 14 03:30:44 mail sshd[20298]: Accepted publickey for root from fec0:0:201::3 port 63018 ssh2 ++#LOG:Jan 14 03:30:44 mail sshd[20298]: Accepted publickey for john from fec0:0:201::3 port 63018 ssh2 ++#LOG:Dec 10 10:33:19 itguxweb2 sshd[29738]: Accepted password for ekwong from 12.34.56.78 port 39852 ssh2 ++regex=Accepted (\S+) for (\S+) from (\S+) port (\d+); \ ++ classification.text=Remote Login; \ ++ optgoto=1907; \ ++ id=1908; \ ++ revision=3; \ ++ analyzer(0).name=sshd; \ ++ analyzer(0).manufacturer=OpenSSH; \ ++ analyzer(0).class=Authentication; \ ++ assessment.impact.severity=low; \ ++ assessment.impact.completion=succeeded; \ ++ assessment.impact.type=user; \ ++ assessment.impact.description=User $2 logged in from $3 port $4 using the $1 method; \ ++ source(0).node.address(0).address=$3; \ ++ source(0).service.port=$4; \ ++ source(0).service.iana_protocol_name=tcp; \ ++ source(0).service.iana_protocol_number=6; \ ++ target(0).service.port=22; \ ++ target(0).service.name=ssh; \ ++ target(0).service.iana_protocol_name=tcp; \ ++ target(0).service.iana_protocol_number=6; \ ++ target(0).user.category=os-device; \ ++ target(0).user.user_id(0).type=target-user; \ ++ target(0).user.user_id(0).name=$2; \ ++ additional_data(0).type=string; \ ++ additional_data(0).meaning=Authentication method; \ ++ additional_data(0).data=$1; \ ++ last; ++ ++ ++################ ++# Login failed # ++################ ++ ++#LOG:Dec 9 16:00:35 itguxweb2 sshd[24541]: Failed password for root from 12.34.56.78 port 1806 ++#LOG:Dec 9 21:29:56 devel5 sshd[17554]: Failed password for akarade from 12.34.56.78 port 4214 ++regex=Failed (\S+) for (\S+) from (\S+) port (\d+); \ ++ optgoto=1907; \ ++ classification.text=Remote Login; \ ++ id=1902; \ ++ revision=3; \ ++ analyzer(0).name=sshd; \ ++ analyzer(0).manufacturer=OpenSSH; \ ++ analyzer(0).class=Authentication; \ ++ assessment.impact.severity=medium; \ ++ assessment.impact.completion=failed; \ ++ assessment.impact.type=user; \ ++ assessment.impact.description=Someone tried to login as $2 from $3 port $4 using the $1 method; \ ++ source(0).node.address(0).address=$3; \ ++ source(0).service.port=$4; \ ++ source(0).service.iana_protocol_name=tcp; \ ++ source(0).service.iana_protocol_number=6; \ ++ target(0).service.port=22; \ ++ target(0).service.name=ssh; \ ++ target(0).service.iana_protocol_name=tcp; \ ++ target(0).service.iana_protocol_number=6; \ ++ target(0).user.category=os-device; \ ++ target(0).user.user_id(0).type=target-user; \ ++ target(0).user.user_id(0).name=$2; \ ++ additional_data(0).type=string; \ ++ additional_data(0).meaning=Authentication method; \ ++ additional_data(0).data=$1; \ ++ last ++ ++ ++############################################## ++# Invalid (not existing) user tried to login # ++############################################## ++ ++#LOG:Jan 20 14:10:02 blah sshd[25443]: Invalid user admin from 213.201.222.134 ++regex=(Illegal|Invalid) user (\S+) from (\S+); \ ++ classification.text=User login failed with an invalid user; \ ++ id=1904; \ ++ revision=2; \ ++ analyzer(0).name=sshd; \ ++ analyzer(0).manufacturer=OpenSSH; \ ++ analyzer(0).class=Authentication; \ ++ assessment.impact.severity=medium; \ ++ assessment.impact.completion=failed; \ ++ assessment.impact.type=user; \ ++ assessment.impact.description=Someone tried to login with the invalid user "$2" from $3; \ ++ source(0).node.address(0).address=$3; \ ++ source(0).service.iana_protocol_name=tcp; \ ++ source(0).service.iana_protocol_number=6; \ ++ target(0).service.port=22; \ ++ target(0).service.name=ssh; \ ++ target(0).service.iana_protocol_name=tcp; \ ++ target(0).service.iana_protocol_number=6; \ ++ target(0).user.category=os-device; \ ++ target(0).user.user_id(0).type=target-user; \ ++ target(0).user.user_id(0).name=$2; \ ++ last ++ ++################################################################################## ++# User listed in DenyGroups or DenyUsers (sshd_config directives) tried to login # ++################################################################################## ++ ++#LOG:Jan 6 22:50:24 localhost sshd[15489]: User nobody not allowed because none of user's groups are listed in AllowGroups ++regex=User (\S+) not allowed because (.*)listed in (\w+); \ ++ classification.text=User login failed with a denied user; \ ++ id=1905; \ ++ revision=3; \ ++ analyzer(0).name=sshd; \ ++ analyzer(0).manufacturer=OpenSSH; \ ++ analyzer(0).class=Authentication; \ ++ assessment.impact.severity=medium; \ ++ assessment.impact.completion=failed; \ ++ assessment.impact.type=user; \ ++ assessment.impact.description=User $1 failed to login because $2 listed in $3; \ ++ source(0).service.iana_protocol_name=tcp; \ ++ source(0).service.iana_protocol_number=6; \ ++ target(0).service.port=22; \ ++ target(0).service.name=ssh; \ ++ target(0).service.iana_protocol_name=tcp; \ ++ target(0).service.iana_protocol_number=6; \ ++ target(0).user.category=os-device; \ ++ target(0).user.user_id(0).type=target-user; \ ++ target(0).user.user_id(0).name=$1; \ ++ additional_data(0).type=string; \ ++ additional_data(0).meaning=ACL; \ ++ additional_data(0).data=$3; \ ++ additional_data(1).type=string; \ ++ additional_data(1).meaning=Failure reason; \ ++ additional_data(1).data=$2 listed in $3; \ ++ last ++ ++################################################################## ++# Sshd did not receive the identification string from the client # ++# (maybe a ssh server recognition) # ++################################################################## ++ ++#LOG:Jun 10 09:51:57 server sshd[9100]: Did not receive identification string from 1.2.3.4 ++regex=Did not receive identification string from (\S+); \ ++ classification.text=Server recognition; \ ++ id=1906; \ ++ revision=2; \ ++ analyzer(0).name=sshd; \ ++ analyzer(0).manufacturer=OpenSSH; \ ++ analyzer(0).class=Authentication; \ ++ assessment.impact.severity=medium; \ ++ assessment.impact.completion=failed; \ ++ assessment.impact.type=recon; \ ++ assessment.impact.description=$1 is probably making a server recognition; \ ++ source(0).node.address(0).address=$1; \ ++ source(0).service.iana_protocol_name=tcp; \ ++ source(0).service.iana_protocol_number=6; \ ++ target(0).service.port=22; \ ++ target(0).service.name=ssh; \ ++ target(0).service.iana_protocol_name=tcp; \ ++ target(0).service.iana_protocol_number=6; \ ++ additional_data(0).type=string; \ ++ additional_data(0).meaning=Failure reason; \ ++ additional_data(0).data=Did not receive identification string; \ ++ last ++ ++######################################################################### ++# Forbidden root login # ++# (directive PermitRootLogin and keyword "no" or "forced-commands-only" # ++# of the sshd_config file) # ++######################################################################### ++ ++#LOG:Jan 5 01:31:41 www sshd[1643]: ROOT LOGIN REFUSED FROM 1.2.3.4 ++regex=ROOT LOGIN REFUSED FROM (\S+); \ ++ classification.text=Admin login; \ ++ id=1909; \ ++ revision=2; \ ++ analyzer(0).name=sshd; \ ++ analyzer(0).manufacturer=OpenSSH; \ ++ analyzer(0).class=Authentication; \ ++ assessment.impact.severity=medium; \ ++ assessment.impact.completion=failed; \ ++ assessment.impact.type=admin; \ ++ assessment.impact.description=Root tried to login while it is forbidden; \ ++ source(0).node.address(0).address=$1; \ ++ source(0).service.iana_protocol_name=tcp; \ ++ source(0).service.iana_protocol_number=6; \ ++ target(0).service.port=22; \ ++ target(0).service.name=ssh; \ ++ target(0).service.iana_protocol_name=tcp; \ ++ target(0).service.iana_protocol_number=6; \ ++ target(0).user.category=os-device; \ ++ target(0).user.user_id(0).type=target-user; \ ++ target(0).user.user_id(0).name=root; \ ++ last ++ ++ ++# Re: Generic Message Exchange Authentication For SSH ++# ++#LOG:Jan 14 08:19:21 ras sshd[22774]: input_userauth_request: invalid user remote-mail ++regex=input_userauth_request: (illegal|invalid) user (\S+); \ ++ classification.text=Invalid user in authentication request; \ ++ id=1910; \ ++ revision=3; \ ++ analyzer(0).name=sshd; \ ++ analyzer(0).manufacturer=OpenSSH; \ ++ analyzer(0).class=Authentication; \ ++ assessment.impact.severity=medium; \ ++ assessment.impact.completion=failed; \ ++ assessment.impact.type=user; \ ++ assessment.impact.description=General purpose authentication request was blocked. Reason: invalid user $2; \ ++ source(0).service.iana_protocol_name=tcp; \ ++ source(0).service.iana_protocol_number=6; \ ++ target(0).service.port=22; \ ++ target(0).service.name=ssh; \ ++ target(0).service.iana_protocol_name=tcp; \ ++ target(0).service.iana_protocol_number=6; \ ++ target(0).user.category=os-device; \ ++ target(0).user.user_id(0).type=target-user; \ ++ target(0).user.user_id(0).name=$2; \ ++ additional_data(0).type=string; \ ++ additional_data(0).meaning=Failure reason; \ ++ additional_data(0).data=$1 user; \ ++ last ++ ++# Re: Generic Message Exchange Authentication For SSH ++# ++# This rule catches several other combinations that can be output by ++# input_userauth_request() in auth2.c ++#LOG:Jan 14 08:19:21 ras sshd[22774]: input_userauth_request: invalid user remote-mail ++regex=input_userauth_request: (.+); \ ++ classification.text=Invalid user in authentication request; \ ++ id=1911; \ ++ revision=2; \ ++ analyzer(0).name=sshd; \ ++ analyzer(0).manufacturer=OpenSSH; \ ++ analyzer(0).class=Authentication; \ ++ assessment.impact.severity=medium; \ ++ assessment.impact.completion=failed; \ ++ assessment.impact.type=user; \ ++ assessment.impact.description=General purpose authentication request was blocked. Reason: $1; \ ++ source(0).service.iana_protocol_name=tcp; \ ++ source(0).service.iana_protocol_number=6; \ ++ target(0).service.port=22; \ ++ target(0).service.name=ssh; \ ++ target(0).service.iana_protocol_name=tcp; \ ++ target(0).service.iana_protocol_number=6; \ ++ target(0).user.category=os-device; \ ++ last ++ ++#LOG:Dec 9 18:48:29 itguxweb2 sshd[29536]: Failed password for illegal user ROOT from 12.34.56.78 port 2886 ++#LOG:Jan 14 08:19:21 ras sshd[22774]: Failed none for invalid user remote-mail from 192.168.1.22 port 65407 ssh2 ++#LOG:Jan 14 11:29:17 ras sshd[18163]: Failed publickey for invalid user fred from fec0:0:201::3 port 62788 ssh2 ++#LOG:Jan 14 11:29:17 ras sshd[18163]: Failed publickey for invalid user fred from 1.2.3.4 port 62788 ssh2 ++#LOG:Jan 14 11:29:17 ras sshd[18163]: Failed publickey for invalid user fred from hostname port 62788 ssh2 ++regex=Failed (\S+) for (illegal|invalid) user (\S+) from (\S+) port (\d+); \ ++ classification.text=Remote Login; \ ++ optgoto=1907; \ ++ id=1912; \ ++ revision=3; \ ++ analyzer(0).name=sshd; \ ++ analyzer(0).manufacturer=OpenSSH; \ ++ analyzer(0).class=Authentication; \ ++ assessment.impact.severity=medium; \ ++ assessment.impact.completion=failed; \ ++ assessment.impact.type=admin; \ ++ assessment.impact.description=Someone tried to login as $3 from $4 port $5 using the $1 method; \ ++ source(0).node.address(0).address=$4; \ ++ source(0).service.port=$5; \ ++ source(0).service.iana_protocol_name=tcp; \ ++ source(0).service.iana_protocol_number=6; \ ++ target(0).service.port=22; \ ++ target(0).service.name=ssh; \ ++ target(0).service.iana_protocol_name=tcp; \ ++ target(0).service.iana_protocol_number=6; \ ++ target(0).user.category=os-device; \ ++ target(0).user.user_id(0).type=target-user; \ ++ target(0).user.user_id(0).name=$3; \ ++ additional_data(0).type=string; \ ++ additional_data(0).meaning=Authentication method; \ ++ additional_data(0).data=$1; \ ++ additional_data(1).type=string; \ ++ additional_data(1).meaning=Failure reason; \ ++ additional_data(1).data=$2 user; \ ++ last ++ ++#LOG:Oct 2 14:40:05 suse-9.2 sshd[18725]: error: PAM: Authentication failure for root from unknown.anywhere.net ++#LOG:Oct 2 14:46:52 suse-9.2 sshd[18804]: error: PAM: Authentication failure for foobar from unknown.anywhere.net ++regex=error: PAM: Authentication failure for (\S+) from (\S+); \ ++ classification.text=Remote Login; \ ++ optgoto=1907; \ ++ id=1914; \ ++ revision=2; \ ++ analyzer(0).name=sshd; \ ++ analyzer(0).manufacturer=OpenSSH; \ ++ analyzer(0).class=Authentication; \ ++ assessment.impact.severity=medium; \ ++ assessment.impact.completion=failed; \ ++ assessment.impact.type=user; \ ++ assessment.impact.description=Someone tried to login as $1 from $2; \ ++ source(0).node.name=$2; \ ++ source(0).service.iana_protocol_name=tcp; \ ++ source(0).service.iana_protocol_number=6; \ ++ target(0).service.port=22; \ ++ target(0).service.name=ssh; \ ++ target(0).service.iana_protocol_name=tcp; \ ++ target(0).service.iana_protocol_number=6; \ ++ target(0).user.category=os-device; \ ++ target(0).user.user_id(0).type=target-user; \ ++ target(0).user.user_id(0).name=$1; \ ++ last diff --git a/prelude-lml-4.1.0-fix_etc_perms.patch b/prelude-lml-4.1.0-fix_etc_perms.patch new file mode 100644 index 0000000..28bba70 --- /dev/null +++ b/prelude-lml-4.1.0-fix_etc_perms.patch @@ -0,0 +1,39 @@ +--- ./Makefile.in 2016-09-15 09:03:01.116000884 +0200 ++++ ./Makefile.in 2017-01-26 07:38:35.217447516 +0100 +@@ -1762,9 +1762,9 @@ + + + install-data-local: +- $(INSTALL) -m 700 -d $(DESTDIR)$(configdir); +- $(INSTALL) -m 700 -d $(DESTDIR)$(lml_run_dir); +- $(INSTALL) -m 700 -d $(DESTDIR)$(metadata_dir) ++ $(INSTALL) -m 755 -d $(DESTDIR)$(configdir); ++ $(INSTALL) -m 755 -d $(DESTDIR)$(lml_run_dir); ++ $(INSTALL) -m 755 -d $(DESTDIR)$(metadata_dir) + @if test -f $(DESTDIR)$(configdir)/prelude-lml.conf; then \ + echo "********************************************************************************"; \ + echo; \ +@@ -1772,9 +1772,9 @@ + echo "Installing default configuration in $(DESTDIR)$(configdir)/prelude-lml.conf-dist"; \ + echo; \ + echo "********************************************************************************"; \ +- $(INSTALL) -m 600 $(top_srcdir)/prelude-lml.conf $(DESTDIR)$(configdir)/prelude-lml.conf-dist; \ ++ $(INSTALL) -m 644 $(top_srcdir)/prelude-lml.conf $(DESTDIR)$(configdir)/prelude-lml.conf-dist; \ + else \ +- $(INSTALL) -m 600 $(top_srcdir)/prelude-lml.conf $(DESTDIR)$(configdir)/; \ ++ $(INSTALL) -m 644 $(top_srcdir)/prelude-lml.conf $(DESTDIR)$(configdir)/; \ + fi + @if test -f $(DESTDIR)$(configdir)/plugins.rules; then \ + echo "********************************************************************************"; \ +@@ -1783,9 +1783,9 @@ + echo "Installing default configuration in $(DESTDIR)$(configdir)/plugins.rules-dist"; \ + echo; \ + echo "********************************************************************************"; \ +- $(INSTALL) -m 600 $(top_srcdir)/plugins.rules $(DESTDIR)$(configdir)/plugins.rules-dist; \ ++ $(INSTALL) -m 644 $(top_srcdir)/plugins.rules $(DESTDIR)$(configdir)/plugins.rules-dist; \ + else \ +- $(INSTALL) -m 600 $(top_srcdir)/plugins.rules $(DESTDIR)$(configdir)/; \ ++ $(INSTALL) -m 644 $(top_srcdir)/plugins.rules $(DESTDIR)$(configdir)/; \ + fi + + uninstall-local: diff --git a/prelude-lml-4.1.0-gnutls_priority_set_direct.patch b/prelude-lml-4.1.0-gnutls_priority_set_direct.patch new file mode 100644 index 0000000..92b06ed --- /dev/null +++ b/prelude-lml-4.1.0-gnutls_priority_set_direct.patch @@ -0,0 +1,11 @@ +--- ./src/tcp-server-tls.c 2016-09-15 08:49:20.172000884 +0200 ++++ ./src/tcp-server-tls.c2 2017-02-07 01:10:30.904772287 +0100 +@@ -489,7 +489,7 @@ + #else + # define TLS_DH_STR "+ANON-DH" + #endif +- const char *pstring = "NORMAL:" TLS_DH_STR; ++ const char *pstring = "@SYSTEM:" TLS_DH_STR; + + gnutls_set_default_priority(session); + diff --git a/prelude-lml.spec b/prelude-lml.spec index 798bd5d..25674af 100644 --- a/prelude-lml.spec +++ b/prelude-lml.spec @@ -1,10 +1,10 @@ # Notes about rpmlint # - crypto-policy-non-compliance-gnutls-{1,2} fixed with patch -# prelude-lml-4.0.0-gnutls_priority_set_direct.patch +# prelude-lml-4.1.0-gnutls_priority_set_direct.patch Name: prelude-lml -Version: 4.0.0 -Release: 3%{?dist} +Version: 4.1.0 +Release: 1%{?dist} Summary: Log analyzer sensor with IDMEF output # Prelude is GPL-2.0+ # libmissing is LGPL-2.1+ @@ -14,11 +14,11 @@ Source0: https://www.prelude-siem.org/pkg/src/%{version}/%{name}-%{versio Source1: %{name}.service Source2: %{name}-tmpfiles.conf # https://www.prelude-siem.org/issues/862 -Patch0: prelude-lml-4.0.0-gnutls_priority_set_direct.patch +Patch0: prelude-lml-4.1.0-gnutls_priority_set_direct.patch # https://www.prelude-siem.org/issues/870 -Patch1: prelude-lml-4.0.0-fix_etc_perms.patch +Patch1: prelude-lml-4.1.0-fix_etc_perms.patch # https://www.prelude-siem.org/issues/872 -Patch2: prelude-lml-4.0.0-fix_check.patch +Patch2: prelude-lml-4.1.0-fix_check.patch %{?systemd_requires} BuildRequires: chrpath BuildRequires: systemd @@ -35,8 +35,8 @@ BuildRequires: valgrind # Upstream do not use explicit version of gnulib, just checkout # and update files. In libprelude 4.0.0, the checkout has been done -# on 2017-01-05 -Provides: bundled(gnulib) = 20170105 +# on 2017-07-10 +Provides: bundled(gnulib) = 20170710 %description The Prelude Log Monitoring Lackey (LML) is the host-based sensor program part of @@ -137,6 +137,9 @@ make check %doc ChangeLog README NEWS AUTHORS %changelog +* Tue Apr 24 2018 Thomas Andrejak - 4.1.0-1 +- Bump version 4.1.0 + * Fri Feb 09 2018 Fedora Release Engineering - 4.0.0-3 - Rebuilt for https://fedoraproject.org/wiki/Fedora_28_Mass_Rebuild diff --git a/sources b/sources index 781d265..0a4e75e 100644 --- a/sources +++ b/sources @@ -1 +1 @@ -SHA512 (prelude-lml-4.0.0.tar.gz) = e2ae3a754f722b19110a32ae9ab7d0d9ce5ceb256c04a2b56f6549802d605cfa741cef4687c8883b585a0dd59f3507ee2d1275f4eb05050d10d24ad068522ef8 +SHA512 (prelude-lml-4.1.0.tar.gz) = e34d542e3b9e12873f9e2a19e2573b32e2b686574cbc8678cefbb198d7397695f8a2512effb58be9e6703663158c2294d741e0f6f8db23c5541e58bdd3c7f035