<rule id="100101" level="15">
<if_level>7</if_level>
<options>no_email_alert</options>
<srcip>10.10.10.10</srcip>
<description>Do not send emails for our scanner alerts</description>
</rule> <rule id="100101" level="0">
<if_level>1</if_level>
<srcip>10.10.10.10</srcip>
<description>Ignoring all alerts triggered by our scanner</description>
</rule>--
---
You received this message because you are subscribed to the Google Groups "ossec-list" group.
To unsubscribe from this group and stop receiving emails from it, send an email to ossec-list+...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/ossec-list/85801125-b8d7-471b-869c-adea3d36cf2e%40googlegroups.com.
The whitelist works with active response. If you have OSSEC blocking misbehaving IPs on your firewall, you definitely have to whitelist the scanner IP. Past experience with one scanner I won’t promote here has shown that you might have to also whitelist its FQDN.
If you just want to stop the deluge of emails, a local rule as shown by Bruce is the way to go.
Valère Binet
--
To view this discussion on the web visit https://groups.google.com/d/msgid/ossec-list/8716F0A9-5475-4E86-B26E-5B0142619AC5%40mail.nih.gov.
ossec-logtest -vTo unsubscribe from this group and stop receiving emails from it, send an email to ossec...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/ossec-list/85801125-b8d7-471b-869c-adea3d36cf2e%40googlegroups.com.
--
---
You received this message because you are subscribed to the Google Groups "ossec-list" group.
To unsubscribe from this group and stop receiving emails from it, send an email to ossec...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/ossec-list/8716F0A9-5475-4E86-B26E-5B0142619AC5%40mail.nih.gov.
To unsubscribe from this group and stop receiving emails from it, send an email to ossec-list+...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/ossec-list/c71972c9-759a-4594-8d18-01a6d1ab5562%40googlegroups.com.
Rule Order / Heirachy – The order in which rules are evaluated can seem somewhat complex:
1. When a rule matches a log record, if it has no children then that is the final rule match. Otherwise, the child rules of that rule are evaluated.
2. Child rules are evaluated in the order of descending severity level with the exception that level zero child rules are looked at first.
3. Once a child rule matches, none of the other child rules of the same parent will be considered. Instead, analysis drops down to the level of checking child rules of the child that just matched.
4. This process continues until a rule matches that has no children or no matching children.
5. When multiple children of the same severity level are involved, they are evaluated in load order (the order the rule files are loaded and the order the rules appear in the rule files).
<!-- Default Log and Email Alert Levels -->
<alerts>
<log_alert_level>1</log_alert_level>
<email_alert_level>7</email_alert_level>
</alerts><group name="global,override,">
<rule id="110000" level="15">
<if_level>7</if_level>
<options>no_email_alert</options>
<srcip>192.168.1.100</srcip>
<description>Ignoring all alerts triggered by our scanner</description>
</rule>
</group>2020/03/11 09:03:48 ossec-testrule: INFO: Reading decoder file etc/asa_decoder.xml.
2020/03/11 09:03:48 ossec-testrule: INFO: Reading decoder file etc/decoder.xml.
2020/03/11 09:03:48 ossec-testrule: INFO: Reading the lists file: 'etc/lists/nessus_cloud.whitelist'
2020/03/11 09:03:48 ossec-testrule: INFO: Started (pid: 20120).
ossec-testrule: Type one log per line.
Mar 10 20:00:13 a-sv-prd-oss-01 sshd[39101]: Bad protocol version identification '\026\003\001\003\241\001' from 192.168.1.100 port 36632
**Phase 1: Completed pre-decoding.
full event: 'Mar 10 20:00:13 a-sv-prd-oss-01 sshd[39101]: Bad protocol version identification '\026\003\001\003\241\001' from 192.168.1.100 port 36632'
hostname: 'a-sv-prd-oss-01'
program_name: 'sshd'
log: 'Bad protocol version identification '\026\003\001\003\241\001' from 192.168.1.100 port 36632'
**Phase 2: Completed decoding.
decoder: 'sshd'
srcip: '192.168.1.100'
srcport: '36632'
**Rule debugging:
Trying rule: 1 - Generic template for all syslog rules.
*Rule 1 matched.
*Trying child rules.
Trying rule: 5500 - Grouping of the pam_unix rules.
Trying rule: 5556 - unix_chkpwd grouping.
Trying rule: 5700 - SSHD messages grouped.
*Rule 5700 matched.
*Trying child rules.
Trying rule: 5709 - Useless SSHD message without an user/ip and context.
Trying rule: 5711 - Useless/Duplicated SSHD message without a user/ip.
Trying rule: 5721 - System disconnected from sshd.
Trying rule: 5722 - ssh connection closed.
Trying rule: 5723 - SSHD key error.
Trying rule: 5724 - SSHD key error.
Trying rule: 5725 - Host ungracefully disconnected.
Trying rule: 5727 - Attempt to start sshd when something already bound to the port.
Trying rule: 5729 - Debug message.
Trying rule: 5732 - Possible port forwarding failure.
Trying rule: 5733 - User entered incorrect password.
Trying rule: 5734 - sshd could not load one or more host keys.
Trying rule: 5735 - Failed write due to one host disappearing.
Trying rule: 5736 - Connection reset or aborted.
Trying rule: 5750 - sshd could not negotiate with client.
Trying rule: 5756 - sshd subsystem request failed.
Trying rule: 100101 - Ignoring rules triggered by Nessus scanning server
Trying rule: 110000 - Ignoring all alerts triggered by our scanner
*Rule 110000 matched.
**Phase 3: Completed filtering (rules).
Rule id: '110000'
Level: '0'
Description: 'Ignoring all alerts triggered by our scanner'To view this discussion on the web visit https://groups.google.com/d/msgid/ossec-list/c71972c9-759a-4594-8d18-01a6d1ab5562%40googlegroups.com.
To unsubscribe from this group and stop receiving emails from it, send an email to ossec-list+...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/ossec-list/7441f0ee-9326-4e3d-980d-5da9dc5111ca%40googlegroups.com.