Within the last two weeks something happened to one of my sensors and I can no longer SSH into it. I've checked the UFW configuration and my IP address is on the "allow in" list, but whenever I try to SSH in, I get "Network is unreachable" on the SSH client and I see a corresponding "Connection blocked by Tcp Wrappers" alert in Squert. I don't think it's a router (at the network level) issue since my SSH connections are causing Squert alerts.
--
Follow Security Onion on Twitter!
https://twitter.com/securityonion
---
You received this message because you are subscribed to the Google Groups "security-onion" group.
To unsubscribe from this group and stop receiving emails from it, send an email to security-onion+unsubscribe@googlegroups.com.
To post to this group, send email to security-onion@googlegroups.com.
Visit this group at https://groups.google.com/group/security-onion.
For more options, visit https://groups.google.com/d/optout.
I am not clear, though, on why it dropped me in the first place...perhaps I had too many failed login attempts? (I haven't changed the default rules)
-Terry
Hi Terry:
I got the similar issue, where I can connect to SO Server with any IP address but mine. I followed your instructions and found my IP address in "/var/ossec/logs/active-responses.log".
I removed my address from this log file. I also added my IP in OSSEC white list.
But I guess I am making some mistake, its not a log file where I should be removing my IP from? Can you please help? where is this IP address and how to remove from that block list?
The way I solved my problem (and I recognize this was the caveman approach) was to add a couple cron jobs that reboot the sensor twice daily.
I ended up having to whitelist each of my sensors in the /var/ossec/etc/ossec.conf file even though I had already added them using so-allow. I still don't understand why this would be necessary and haven't seen mention of this in documentation that I've looked at. Here's an example of the syntax for the white_list section of the file.
<!--Sensor addresses added 10 May 2018 by me-->
<global>
<white_list>10.x.x.x</white_list>
</global>
<global>
<white_list>10.x.x.x</white_list>
</global>
<global>
<white_list>10.x.x.x</white_list>
</global>
<global>
<white_list>10.x.x.x</white_list>
</global>
</ossec_config> ## This is the closing tag for the file itself. New whitelist entries go above that.
I tried entering IP addresses in a single, comma-separated entry but that did not work. I did notice, however, that the IP addresses for the analyst consoles that I allowed via so-allow already appeared as whitelist entries in this file but the sensors did not. Maybe there is a bug in the so-allow script? Maybe it is designed that way on purpose?
Josh
--
Follow Security Onion on Twitter!
https://twitter.com/securityonion
---
You received this message because you are subscribed to the Google Groups "security-onion" group.
To unsubscribe from this group and stop receiving emails from it, send an email to security-onion+unsubscribe@googlegroups.com.
To post to this group, send email to security-onion@googlegroups.com.
Visit this group at https://groups.google.com/group/security-onion.
For more options, visit https://groups.google.com/d/optout.