Hi Plankskes,
Please send the output of the following (redacting sensitive info
where necessary):
sudo sostat
Also, please send the output of this command:
tail -100 /var/log/nsm/securityonion/sguild.log
Thanks,
Doug
On Tue, Jul 24, 2012 at 8:09 AM, Plankskes <
koenvand...@gmail.com> wrote:
> We are running SO in a server/sensor setup and the first day everything is running fine. After one day we noticed that on the server the sguild is running but apparently there is no process listening on inbound connection on port 7734 or 7736.
>
> root@server:~# ufw status
> Status: active
>
> To Action From
> -- ------ ----
> 22/tcp ALLOW Anywhere
> 8000/tcp ALLOW Anywhere
> 443/tcp ALLOW Anywhere
> 7734/tcp ALLOW Anywhere
> 7736/tcp ALLOW Anywhere
> 3000/tcp ALLOW Anywhere
> root@server:~# service nsm status
> Status: securityonion
> * sguil server
> Status: HIDS
> * ossec_agent (sguil)
> root@server:~# netstat -tul
> Active Internet connections (only servers)
> Proto Recv-Q Send-Q Local Address Foreign Address State
> tcp 0 0 localhost:55046 *:* LISTEN
> tcp 0 0 localhost:mysql *:* LISTEN
> tcp 0 0 *:ssh *:* LISTEN
> tcp 0 0 localhost:ipp *:* LISTEN
> tcp6 0 0 [::]:9876 [::]:* LISTEN
> tcp6 0 0 [::]:ssh [::]:* LISTEN
> tcp6 0 0 localhost:ipp [::]:* LISTEN
> tcp6 0 0 [::]:3000 [::]:* LISTEN
> tcp6 0 0 [::]:https [::]:* LISTEN
> udp 0 0 *:58726 *:*
> udp 0 0 *:mdns *:*
> udp 0 0 server.jetair.be:ntp *:*
> udp 0 0 localhost:ntp *:*
> udp 0 0 *:ntp *:*
> udp6 0 0 fe80::21c:c4ff:fe77:ntp [::]:*
> udp6 0 0 localhost:ntp [::]:*
> udp6 0 0 [::]:ntp [::]:*
>
>
> We also can’t see any alerts in snorby after one day. I rebooted both server and sensor, with no result. Apparently all nsm services are running and there is an active ssh connection between the sensor and the server
>
> root@sensor:~# service nsm status
> Status: sensor-eth1
> * pcap_agent (sguil)
> * sancp_agent (sguil)
> * snort_agent (sguil)
> * pads_agent (sguil)
> * snort (alert data)
> * barnyard2 (spooler, unified2 format)
> * sancp (session data)
> * pads (asset info)
> * daemonlogger (full packet data)
> * argus
> * http_agent (sguil)
> Status: HIDS
> * ossec_agent (sguil)
> Status: Bro
> Name Type Host Status Pid Peers Started
> bro standalone localhost running 16332 0 24 Jul 11:15:12
> root@sensor:~# pgrep -lf autossh
> 1534 /usr/lib/autossh/autossh -M 0 -q -N -o ServerAliveInterval 60 -o ServerAliveCountMax 3 -i /root/.ssh/securityonion -L 3306:
127.0.0.1:3306 sens...@server.domain.be
>
> --
>
>
--
Doug Burks
http://securityonion.blogspot.com