OSSEC是一個開源的基于主機的入侵檢測系統,執行日志分析,檔案完整性檢查,政策監控,rootkit檢測,實時報警和積極響應。
它可以運作在大多數的作業系統,包括Linux,MacOS的時,Solaris,HP-UX,AIX和Windows
Ossec部署方式為C/S,以下server:192.168.22.240 client:192.168.22.241
先關閉selinux,安裝常用包
環境 CentOS release 6.4(Final) x86_64sed -i s/SELINUX=enforcing/SELINUX=disabled/g /etc/sysconfig/selinux
yum install gcc gcc-c++ vim wget lrzsz ntpdate sysstat dstat wget -y
安裝服務端
Ip 192.168.22.240yum install mysql mysql-server mysql-devel httpd php php-mysql –y
tar -xzf ossec-hids-2.8.tar.gz
cd ossec-hids-2.8
cd src/
# make setdb
Error: PostgreSQL client libraries notinstalled.
Info: Compiled with MySQL support. #ossec支援mysql資料庫
# ./install
下面是安裝過程en #選擇語言
Enter #繼續
Server #安裝為server
/usr/local/ossec #安裝目錄
3.1- Do you want e-mail notification? (y/n)[y]: y
-What‘s your e-mail address? [email protected]
-What‘s your SMTP server ip/host? 127.0.0.1
Enter # Running syscheck (integrity check daemon)
Enter # Running rootcheck (rootkit detection)
Enter #Active response enabled
Enter # firewall-drop enabled (local) for levels >= 6
Do you want to add more IPs to the whitelist? (y/n)? [n]: y #設定ip白名單
-IPs (space separated):
3.5- Do you want to enable remote syslog(port 514 udp)? (y/n) [y]:Enter
Enter #開始安裝
安裝完成的配置檔案及選項:/usr/local/ossec/bin/ossec-control start
/usr/local/ossec/bin/ossec-control stop
/usr/local/ossec/etc/ossec.conf
/usr/local/ossec/bin/manage_agents
# /usr/local/ossec/bin/ossec-control --help
Usage: /usr/local/ossec/bin/ossec-control{start|stop|restart|status|enable|disable}
# /usr/local/ossec/bin/ossec-control enable--help
Invalid enable option.
Enable options: database, client-syslog,agentless, debug
Usage: /usr/local/ossec/bin/ossec-controlenable [database|client-syslog|agentless|debug]
/usr/local/ossec/bin/ossec-control enabledatabase
# service mysqld start
/usr/bin/mysql_secure_installation
# mysql -uroot –p
mysql> create database ossec;
mysql> grantINSERT,SELECT,UPDATE,CREATE,DELETE,EXECUTE on ossec.* to [email protected] by ‘ossec‘;
mysql> grant INSERT,SELECT,UPDATE,CREATE,DELETE,EXECUTEon ossec.* to [email protected] identified by‘ossec‘; #此句是為下面的analogi
mysql> flush privileges;
mysql> \q
[[email protected] ossec-hids-2.8]# mysql-uossec -p ossec < src/os_dbd/mysql.schema
Enter password:
vim /usr/local/ossec/etc/ossec.conf #在最後添加
localhost
ossec
ossec
ossec
mysql
添加128行内容,允許此網段的日志
127 syslog
128192.168.22.0/24
129
/usr/local/ossec/bin/ossec-control restart
此時,郵箱已經收到郵件了
下面添加agent用戶端# /usr/local/ossec/bin/manage_agents
(A)dd an agent (A).
(E)xtract key for an agent (E).
(L)ist already added agents (L).
(R)emove an agent (R).
(Q)uit.
#下面依次:
A #add
Please provide the following:
*A name for the new agent: agent1
*The IP Address of the new agent: 192.168.22.241
*An ID for the new agent[001]: 001
Agent information:
ID:001
Name:agent1
IPAddress:192.168.22.241
Confirm adding it?(y/n): y
Agent added.
****************************************
* OSSEC HIDS v2.8 Agent manager. *
* The following options are available: *
****************************************
(A)dd an agent (A).
(E)xtract key for an agent (E).
(L)ist already added agents (L).
(R)emove an agent (R).
(Q)uit.
Choose your action: A,E,L,R or Q: E
Available agents:
ID: 001, Name: agent1, IP: 192.168.22.241
Provide the ID of the agent to extract thekey (or ‘\q‘ to quit): 001
Agent key information for ‘001‘ is:
MDAxIGFnZW50MSAxOTIuMTY4LjIyLjI0MSBmYTcxYWE1ZWQxYTg0YTM3MDcwNTFkMGRkMDY4NTcyNDQ5NDY2MWRkYTI3ZTMxZsNhZDd3YmFjZjddZTFkMmNj
** Press ENTER to return to the main menu.
Choose your action: A,E,L,R or Q: Q
# netstat -unlp|grep ossec #ossec通信是用udp 514,1514端口,udp 0 0 0.0.0.0:514 0.0.0.0:* 4511/ossec-remoted
udp 0 0 0.0.0.0:1514 0.0.0.0:* 4513/ossec-remoted
vim /etc/sysconfig/iptables #開啟iptables的端口
-A INPUT -m state --state NEW -m udp -p udp--dport 514 -j ACCEPT
-A INPUT -m state --state NEW -m udp -p udp--dport 1514 -j ACCEPT
service iptables restart
安裝用戶端
Ip 192.168.22.241tar -xzf ossec-hids-2.8.tar.gz
# cd ossec-hids-2.8
# ./install.sh
Y #預設為en
Enter #開始安裝
Agent #作為代理
/usr/local/ossec #安裝目錄
192.168.22.240 #添加server的ip
Enter #Running syscheck (integrity check daemon)
Enter #Running rootcheck (rootkit detection)
Enter #active response
Enter #開始安裝
安裝後的配置/usr/local/ossec/bin/ossec-control start
/usr/local/ossec/bin/ossec-control stop
/usr/local/ossec/etc/ossec.conf
/usr/local/ossec/bin/manage_agents
設定agent# /usr/local/ossec/bin/manage_agents
****************************************
* OSSEC HIDS v2.8 Agent manager. *
* The following options are available: *
****************************************
(I)mport key from the server (I).
(Q)uit.
Choose your action: I or Q: I
* Provide the Key generated by the server.
* The best approach is to cut and paste it.
*** OBS: Do not include spaces or newlines.
Paste it here (or ‘\q‘ to quit):
MDAxIGFnZW50MSAxOTIuMTY4LjIyLjI0zSBmYTcxYWE1ZWQxYTg0YTM3MDcwNTFkMGRkMDY4NTcyNDQ5NDY2MWRkYTI3ZTMxZTNdZDc3YmFjZjdmZTFk5mNj
Agent information:
ID:001
Name:agent1
IPAddress:192.168.22.241
Confirm adding it?(y/n): y
Added.
** Press ENTER to return to the main menu.
Choose your action: I or Q: Q
Ossec的日志/usr/local/ossec/logs/ossec.log
安裝web界面
ossec-wui界面cd /var/www
unzip ossec-wui-master.zip
mv ossec-wui-master html/ossec
cd html/ossec/
# cat ossec_conf.php
#$ossec_dir="/var/ossec";
$ossec_dir="/usr/local/ossec";
# ./setup.sh
Setting up ossec ui...
Username: ossec
New password:
Re-type new password:
Adding password for user ossec
Enter your web server user name (e.g.apache, www, nobody, www-data, ...)
apache
Enter your OSSEC install directory path(e.g. /var/ossec)
/usr/local/ossec
You must restart your web server after thissetup is done.
Setup completed successfuly.
# vim /etc/httpd/conf.d/ossec.conf
Alias /analogi /var/www/html/ossec
Order deny,allow
Deny from all
Allow from 192.168.22.0/24
Options -MultiViews
AuthName "OSSEC AUTH"
AuthType Basic
AuthUserFile /var/www/html/ossec/.htpasswd
Require valid-user
别忘了把iptables的80打開-A INPUT -m state --state NEW -m tcp -p tcp--dport 80 -j ACCEPT
chown apache:apache *
service httpd restart
analogi界面cd /var/www/html
wgethttps://github.com/ECSC/analogi/archive/master.zip
unzip analogi-master.zip
mv analogi-master ossec/analogi
chown apache.apache -R ossec
cd ossec/analogi
cp db_ossec.php.new db_ossec.php
vim db_ossec.php
define (‘DB_USER_O‘, ‘ossec‘);
define (‘DB_PASSWORD_O‘, ‘ossec‘);
define (‘DB_HOST_O‘, ‘localhost‘);
define (‘DB_NAME_O‘, ‘ossec‘);
vim /etc/httpd/conf.d/analogi.conf
Alias /analogi /var/www/html/analogi
Order deny,allow
Deny from all
Allow from 192.168.22.0/24
檢視狀态資訊# /usr/local/ossec/bin/agent_control -lc
OSSEC HIDS agent_control. List of availableagents:
ID: 000, Name: localhost.localdomain (server), IP: 127.0.0.1,Active/Local
ID: 001, Name: agent1, IP: 192.168.22.241, Active
# /usr/local/ossec/bin/list_agents -a
agent1-192.168.22.241 is available.
# /usr/local/ossec/bin/ossec-control status
ossec-monitord is running...
ossec-logcollector is running...
ossec-remoted is running...
ossec-syscheckd is running...
ossec-analysisd is running...
ossec-maild is running...
ossec-execd is running...
ossec-dbd is running...
OSSEC的圖形界面
analogi圖形界面
收到ossec發送的郵件
原文:http://bbotte.blog.51cto.com/6205307/1539285