Rocksolid Light

Welcome to novaBBS (click a section below)

mail  files  register  newsreader  groups  login

Message-ID:  

6 May, 2024: The networking issue during the past two days has been identified and fixed.


computers / comp.os.vms / ossec

SubjectAuthor
* ossecplugh
`* Re: ossecArne Vajhøj
 `* Re: ossecplugh
  `* Re: ossecArne Vajhøj
   `* Re: ossecplugh
    `* Re: ossecArne Vajhøj
     `* Re: ossecplugh
      `- Re: ossecplugh

1
ossec

<e4c52a36-1a39-49f3-9cba-6bd47dcb60f2n@googlegroups.com>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=27372&group=comp.os.vms#27372

  copy link   Newsgroups: comp.os.vms
X-Received: by 2002:a05:620a:288a:b0:746:7aed:38cf with SMTP id j10-20020a05620a288a00b007467aed38cfmr603053qkp.1.1680876104275;
Fri, 07 Apr 2023 07:01:44 -0700 (PDT)
X-Received: by 2002:a05:622a:1a0a:b0:3e3:f70f:fb13 with SMTP id
f10-20020a05622a1a0a00b003e3f70ffb13mr781598qtb.6.1680876104003; Fri, 07 Apr
2023 07:01:44 -0700 (PDT)
Path: i2pn2.org!i2pn.org!usenet.blueworldhosting.com!diablo1.usenet.blueworldhosting.com!peer02.iad!feed-me.highwinds-media.com!news.highwinds-media.com!news-out.google.com!nntp.google.com!postnews.google.com!google-groups.googlegroups.com!not-for-mail
Newsgroups: comp.os.vms
Date: Fri, 7 Apr 2023 07:01:43 -0700 (PDT)
Injection-Info: google-groups.googlegroups.com; posting-host=172.110.168.218; posting-account=uNeudQoAAACm0ETOCzPNrvtq-73lRbuD
NNTP-Posting-Host: 172.110.168.218
User-Agent: G2/1.0
MIME-Version: 1.0
Message-ID: <e4c52a36-1a39-49f3-9cba-6bd47dcb60f2n@googlegroups.com>
Subject: ossec
From: jchim...@gmail.com (plugh)
Injection-Date: Fri, 07 Apr 2023 14:01:44 +0000
Content-Type: text/plain; charset="UTF-8"
X-Received-Bytes: 1049
 by: plugh - Fri, 7 Apr 2023 14:01 UTC

I don't see any attempts for VMS.

I like working with it on Linux. What are some VMS alternatives?

Re: ossec

<u0q5ls$vgv0$2@dont-email.me>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=27382&group=comp.os.vms#27382

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!eternal-september.org!feeder.eternal-september.org!.POSTED!not-for-mail
From: arn...@vajhoej.dk (Arne Vajhøj)
Newsgroups: comp.os.vms
Subject: Re: ossec
Date: Fri, 7 Apr 2023 18:32:24 -0400
Organization: A noiseless patient Spider
Lines: 18
Message-ID: <u0q5ls$vgv0$2@dont-email.me>
References: <e4c52a36-1a39-49f3-9cba-6bd47dcb60f2n@googlegroups.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Fri, 7 Apr 2023 22:32:29 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="1ea438bd602e879549f6b1c25da422c4";
logging-data="1033184"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1864cuh1qFl5rZCJ1fvEuGv/3aYaOQYqqE="
User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:102.0) Gecko/20100101
Thunderbird/102.9.1
Cancel-Lock: sha1:zTLJ+IKcQgV1iyt1WrftdO5Wjn4=
In-Reply-To: <e4c52a36-1a39-49f3-9cba-6bd47dcb60f2n@googlegroups.com>
Content-Language: en-US
 by: Arne Vajhøj - Fri, 7 Apr 2023 22:32 UTC

On 4/7/2023 10:01 AM, plugh wrote:
> I don't see any attempts for VMS.
>
> I like working with it on Linux. What are some VMS alternatives?

You mean https://github.com/ossec/ossec-hids ?

For VMS itself then I suspect most people just use the
audit log directly.

It would probably be interesting to integrate that (audit log)
into ossec, because ossec already know how to process some
log files that are not VMS specific but may exist on VMS
like Apache logs and combining information could be
valuable.

Arne

Re: ossec

<5d89b2ea-57e0-4f4f-bb76-89c40ed81eaen@googlegroups.com>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=27383&group=comp.os.vms#27383

  copy link   Newsgroups: comp.os.vms
X-Received: by 2002:a05:620a:25ca:b0:746:83cd:8d1d with SMTP id y10-20020a05620a25ca00b0074683cd8d1dmr1094437qko.6.1680914247901;
Fri, 07 Apr 2023 17:37:27 -0700 (PDT)
X-Received: by 2002:a05:620a:4593:b0:74a:598b:9241 with SMTP id
bp19-20020a05620a459300b0074a598b9241mr852907qkb.10.1680914247653; Fri, 07
Apr 2023 17:37:27 -0700 (PDT)
Path: i2pn2.org!i2pn.org!usenet.blueworldhosting.com!diablo1.usenet.blueworldhosting.com!peer03.iad!feed-me.highwinds-media.com!news.highwinds-media.com!news-out.google.com!nntp.google.com!postnews.google.com!google-groups.googlegroups.com!not-for-mail
Newsgroups: comp.os.vms
Date: Fri, 7 Apr 2023 17:37:27 -0700 (PDT)
In-Reply-To: <u0q5ls$vgv0$2@dont-email.me>
Injection-Info: google-groups.googlegroups.com; posting-host=2001:ac8:23:85:0:0:0:a01e;
posting-account=uNeudQoAAACm0ETOCzPNrvtq-73lRbuD
NNTP-Posting-Host: 2001:ac8:23:85:0:0:0:a01e
References: <e4c52a36-1a39-49f3-9cba-6bd47dcb60f2n@googlegroups.com> <u0q5ls$vgv0$2@dont-email.me>
User-Agent: G2/1.0
MIME-Version: 1.0
Message-ID: <5d89b2ea-57e0-4f4f-bb76-89c40ed81eaen@googlegroups.com>
Subject: Re: ossec
From: jchim...@gmail.com (plugh)
Injection-Date: Sat, 08 Apr 2023 00:37:27 +0000
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
X-Received-Bytes: 2807
 by: plugh - Sat, 8 Apr 2023 00:37 UTC

On Friday, April 7, 2023 at 3:32:31 PM UTC-7, Arne Vajhøj wrote:
> On 4/7/2023 10:01 AM, plugh wrote:
> > I don't see any attempts for VMS.
> >
> > I like working with it on Linux. What are some VMS alternatives?
> You mean https://github.com/ossec/ossec-hids ?
Yes.

> For VMS itself then I suspect most people just use the
> audit log directly.
.... which probably doesn't include the "active response" component. Without automation, issuing such responses manually is probably a non-starter. ossec's response subsystem is what I'm looking at for VMS. I think all that's necessary for the "hids" subsystem is to mount a VMS log directory in *nix. The parser is available now under the ossec server subsystem.

> It would probably be interesting to integrate that (audit log)
> into ossec, because ossec already know how to process some
> log files that are not VMS specific but may exist on VMS
> like Apache logs and combining information could be
> valuable.
I'm not going to underestimate the work to build an ossec agent. I'd like think it would mesh well with VMS customer needs. It would involve the usual pain porting *nix code to VMS; which would be the ossec agent code.

The server/agent model works in that architecture's favor. The spin-offs from ossec-hids seem well on their way, but basically iterations on the same theme. I don't see an advantage to porting anything but the agent; which /should/ work with the various forks,

Right now, I'm just poking around. I saw some FT notice; which milestone piqued my interest.

Re: ossec

<u0s6ai$1b1kn$1@dont-email.me>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=27392&group=comp.os.vms#27392

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!eternal-september.org!feeder.eternal-september.org!.POSTED!not-for-mail
From: arn...@vajhoej.dk (Arne Vajhøj)
Newsgroups: comp.os.vms
Subject: Re: ossec
Date: Sat, 8 Apr 2023 12:55:42 -0400
Organization: A noiseless patient Spider
Lines: 51
Message-ID: <u0s6ai$1b1kn$1@dont-email.me>
References: <e4c52a36-1a39-49f3-9cba-6bd47dcb60f2n@googlegroups.com>
<u0q5ls$vgv0$2@dont-email.me>
<5d89b2ea-57e0-4f4f-bb76-89c40ed81eaen@googlegroups.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Date: Sat, 8 Apr 2023 16:55:46 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="1ea438bd602e879549f6b1c25da422c4";
logging-data="1410711"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1/bcaaQksIG1tUYpXf28ko4m1syuJqCqG8="
User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:102.0) Gecko/20100101
Thunderbird/102.9.1
Cancel-Lock: sha1:SAr6vKGSBDnJRHGzOPe/lycCLV4=
Content-Language: en-US
In-Reply-To: <5d89b2ea-57e0-4f4f-bb76-89c40ed81eaen@googlegroups.com>
 by: Arne Vajhøj - Sat, 8 Apr 2023 16:55 UTC

On 4/7/2023 8:37 PM, plugh wrote:
> On Friday, April 7, 2023 at 3:32:31 PM UTC-7, Arne Vajhøj wrote:
>> On 4/7/2023 10:01 AM, plugh wrote:
>>> I don't see any attempts for VMS.
>>>
>>> I like working with it on Linux. What are some VMS alternatives?
>> You mean https://github.com/ossec/ossec-hids ?
> Yes.
>
>> For VMS itself then I suspect most people just use the
>> audit log directly.
>
> ... which probably doesn't include the "active response" component.
> Without automation, issuing such responses manually is probably a
> non-starter. ossec's response subsystem is what I'm looking at for
> VMS.

So ossec does not just detect intrusion but take action?

What would the actions be?

(I don't know the product)

VMS already block access if its intrusion detection get triggered.

> I think all that's necessary for the "hids" subsystem is to
> mount a VMS log directory in *nix. The parser is available now under
> the ossec server subsystem.
I am not sure that NFS mounting the directories where the critical
log files on VMS reside would be improving security.

>> It would probably be interesting to integrate that (audit log)
>> into ossec, because ossec already know how to process some
>> log files that are not VMS specific but may exist on VMS
>> like Apache logs and combining information could be
>> valuable.

> I'm not going to underestimate the work to build an ossec agent. I'd
> like think it would mesh well with VMS customer needs. It would
> involve the usual pain porting *nix code to VMS; which would be the
> ossec agent code.
>
> The server/agent model works in that architecture's favor. The
> spin-offs from ossec-hids seem well on their way, but basically
> iterations on the same theme. I don't see an advantage to porting
> anything but the agent; which /should/ work with the various forks,
As usual with open source in the end it will depend on whether
there are people willing to put in some hours.

Arne

Re: ossec

<cebbdd0f-9c68-4ac8-b7d3-62bcb895d22bn@googlegroups.com>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=27397&group=comp.os.vms#27397

  copy link   Newsgroups: comp.os.vms
X-Received: by 2002:a05:622a:1a25:b0:3d4:63fa:3db4 with SMTP id f37-20020a05622a1a2500b003d463fa3db4mr1631194qtb.5.1680976347516;
Sat, 08 Apr 2023 10:52:27 -0700 (PDT)
X-Received: by 2002:ad4:4e4b:0:b0:56e:fbbe:515f with SMTP id
eb11-20020ad44e4b000000b0056efbbe515fmr554258qvb.10.1680976347322; Sat, 08
Apr 2023 10:52:27 -0700 (PDT)
Path: i2pn2.org!i2pn.org!weretis.net!feeder8.news.weretis.net!proxad.net!feeder1-2.proxad.net!209.85.160.216.MISMATCH!news-out.google.com!nntp.google.com!postnews.google.com!google-groups.googlegroups.com!not-for-mail
Newsgroups: comp.os.vms
Date: Sat, 8 Apr 2023 10:52:26 -0700 (PDT)
In-Reply-To: <u0s6ai$1b1kn$1@dont-email.me>
Injection-Info: google-groups.googlegroups.com; posting-host=172.110.168.218; posting-account=uNeudQoAAACm0ETOCzPNrvtq-73lRbuD
NNTP-Posting-Host: 172.110.168.218
References: <e4c52a36-1a39-49f3-9cba-6bd47dcb60f2n@googlegroups.com>
<u0q5ls$vgv0$2@dont-email.me> <5d89b2ea-57e0-4f4f-bb76-89c40ed81eaen@googlegroups.com>
<u0s6ai$1b1kn$1@dont-email.me>
User-Agent: G2/1.0
MIME-Version: 1.0
Message-ID: <cebbdd0f-9c68-4ac8-b7d3-62bcb895d22bn@googlegroups.com>
Subject: Re: ossec
From: jchim...@gmail.com (plugh)
Injection-Date: Sat, 08 Apr 2023 17:52:27 +0000
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
 by: plugh - Sat, 8 Apr 2023 17:52 UTC

On Saturday, April 8, 2023 at 9:55:49 AM UTC-7, Arne Vajhøj wrote:
> On 4/7/2023 8:37 PM, plugh wrote:
> > On Friday, April 7, 2023 at 3:32:31 PM UTC-7, Arne Vajhøj wrote:
> >> On 4/7/2023 10:01 AM, plugh wrote:
> >>> I don't see any attempts for VMS.
> >>>
> >>> I like working with it on Linux. What are some VMS alternatives?
> >> You mean https://github.com/ossec/ossec-hids ?
> > Yes.
> >
> >> For VMS itself then I suspect most people just use the
> >> audit log directly.
> >
> > ... which probably doesn't include the "active response" component.
> > Without automation, issuing such responses manually is probably a
> > non-starter. ossec's response subsystem is what I'm looking at for
> > VMS.
> So ossec does not just detect intrusion but take action?
>
> What would the actions be?
>
> (I don't know the product)
>
> VMS already block access if its intrusion detection get triggered.

Agreed. I'd forgotten about VMS intrusion detection and response; which works for login sessions and is one aspect. You can probably work out other intrusions: email, web... There's also file monitoring which is probably there as well. You'd mentioned them earlier.
The ossec actions include the equivalent blocking of unauthorized login attempts (via nft or iptables) as well as blocks for unauthorized URL access and unauthorized email access. The list of intrusions and responses is limited by what you can log and your imagination.
> > I think all that's necessary for the "hids" subsystem is to
> > mount a VMS log directory in *nix. The parser is available now under
> > the ossec server subsystem.
> I am not sure that NFS mounting the directories where the critical
> log files on VMS reside would be improving security.

I disagree. I'm sure there's a way to safely mount disks R/O remotely even under VMS; which techniques depend on your definition of "secure". If that's what you're proposing for not researching porting the server architecture, fine. If VMS is too spavined to handle connections from a *nix server than this topic isn't worth discussing.

Re: ossec

<u0sc52$1bv6n$1@dont-email.me>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=27400&group=comp.os.vms#27400

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!eternal-september.org!feeder.eternal-september.org!.POSTED!not-for-mail
From: arn...@vajhoej.dk (Arne Vajhøj)
Newsgroups: comp.os.vms
Subject: Re: ossec
Date: Sat, 8 Apr 2023 14:35:10 -0400
Organization: A noiseless patient Spider
Lines: 34
Message-ID: <u0sc52$1bv6n$1@dont-email.me>
References: <e4c52a36-1a39-49f3-9cba-6bd47dcb60f2n@googlegroups.com>
<u0q5ls$vgv0$2@dont-email.me>
<5d89b2ea-57e0-4f4f-bb76-89c40ed81eaen@googlegroups.com>
<u0s6ai$1b1kn$1@dont-email.me>
<cebbdd0f-9c68-4ac8-b7d3-62bcb895d22bn@googlegroups.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Date: Sat, 8 Apr 2023 18:35:14 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="1ea438bd602e879549f6b1c25da422c4";
logging-data="1440983"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1+/e07DRs6/ZzW1gtWzx/PzCPn2MIEJizU="
User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:102.0) Gecko/20100101
Thunderbird/102.9.1
Cancel-Lock: sha1:FP38KXgkrldXtiSLGgJtpNyyw6k=
Content-Language: en-US
In-Reply-To: <cebbdd0f-9c68-4ac8-b7d3-62bcb895d22bn@googlegroups.com>
 by: Arne Vajhøj - Sat, 8 Apr 2023 18:35 UTC

On 4/8/2023 1:52 PM, plugh wrote:
> On Saturday, April 8, 2023 at 9:55:49 AM UTC-7, Arne Vajhøj wrote:
>> On 4/7/2023 8:37 PM, plugh wrote:
>>> I think all that's necessary for the "hids" subsystem is to
>>> mount a VMS log directory in *nix. The parser is available now under
>>> the ossec server subsystem.
>> I am not sure that NFS mounting the directories where the critical
>> log files on VMS reside would be improving security.
>
> I disagree. I'm sure there's a way to safely mount disks R/O remotely
> even under VMS; which techniques depend on your definition of
> "secure". If that's what you're proposing for not researching porting
> the server architecture, fine. If VMS is too spavined to handle
> connections from a *nix server than this topic isn't worth
> discussing.
security.audit$journal, accountng.dat and various log files
are in sys$manager. RDB put a log file in SYS$SYSTEM.
Apache log files are in APACHE$SPECIFIC:[LOGS], which is
disk:[SYS0.SYSCOMMON.APACHE.SPECIFIC.node.LOGS].

I do not like the idea of NFS mounting those directories
not even readonly with appropriate access control - too risky
that some critical information could leak out that way.

Another way to to get information over to ossec has to be found.
IMHO.

Arne

Re: ossec

<342f2188-7e3c-4507-8b02-4b2d727be9a3n@googlegroups.com>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=27403&group=comp.os.vms#27403

  copy link   Newsgroups: comp.os.vms
X-Received: by 2002:a05:620a:2404:b0:748:60fe:fd53 with SMTP id d4-20020a05620a240400b0074860fefd53mr1951506qkn.7.1680982082915;
Sat, 08 Apr 2023 12:28:02 -0700 (PDT)
X-Received: by 2002:ac8:580e:0:b0:3de:bafb:82c1 with SMTP id
g14-20020ac8580e000000b003debafb82c1mr2028935qtg.3.1680982082711; Sat, 08 Apr
2023 12:28:02 -0700 (PDT)
Path: i2pn2.org!i2pn.org!weretis.net!feeder8.news.weretis.net!proxad.net!feeder1-2.proxad.net!209.85.160.216.MISMATCH!news-out.google.com!nntp.google.com!postnews.google.com!google-groups.googlegroups.com!not-for-mail
Newsgroups: comp.os.vms
Date: Sat, 8 Apr 2023 12:28:02 -0700 (PDT)
In-Reply-To: <u0sc52$1bv6n$1@dont-email.me>
Injection-Info: google-groups.googlegroups.com; posting-host=172.110.168.218; posting-account=uNeudQoAAACm0ETOCzPNrvtq-73lRbuD
NNTP-Posting-Host: 172.110.168.218
References: <e4c52a36-1a39-49f3-9cba-6bd47dcb60f2n@googlegroups.com>
<u0q5ls$vgv0$2@dont-email.me> <5d89b2ea-57e0-4f4f-bb76-89c40ed81eaen@googlegroups.com>
<u0s6ai$1b1kn$1@dont-email.me> <cebbdd0f-9c68-4ac8-b7d3-62bcb895d22bn@googlegroups.com>
<u0sc52$1bv6n$1@dont-email.me>
User-Agent: G2/1.0
MIME-Version: 1.0
Message-ID: <342f2188-7e3c-4507-8b02-4b2d727be9a3n@googlegroups.com>
Subject: Re: ossec
From: jchim...@gmail.com (plugh)
Injection-Date: Sat, 08 Apr 2023 19:28:02 +0000
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
 by: plugh - Sat, 8 Apr 2023 19:28 UTC

On Saturday, April 8, 2023 at 11:35:17 AM UTC-7, Arne Vajhøj wrote:
> On 4/8/2023 1:52 PM, plugh wrote:
> > On Saturday, April 8, 2023 at 9:55:49 AM UTC-7, Arne Vajhøj wrote:
> >> On 4/7/2023 8:37 PM, plugh wrote:
> >>> I think all that's necessary for the "hids" subsystem is to
> >>> mount a VMS log directory in *nix. The parser is available now under
> >>> the ossec server subsystem.
> >> I am not sure that NFS mounting the directories where the critical
> >> log files on VMS reside would be improving security.
> >
> > I disagree. I'm sure there's a way to safely mount disks R/O remotely
> > even under VMS; which techniques depend on your definition of
> > "secure". If that's what you're proposing for not researching porting
> > the server architecture, fine. If VMS is too spavined to handle
> > connections from a *nix server than this topic isn't worth
> > discussing.
> security.audit$journal, accountng.dat and various log files
> are in sys$manager. RDB put a log file in SYS$SYSTEM.
> Apache log files are in APACHE$SPECIFIC:[LOGS], which is
> disk:[SYS0.SYSCOMMON.APACHE.SPECIFIC.node.LOGS].
>
> I do not like the idea of NFS mounting those directories
> not even readonly with appropriate access control - too risky
> that some critical information could leak out that way.
>
> Another way to to get information over to ossec has to be found.
> IMHO.
>
> Arne

Can we limn that fear?

Re: ossec

<668f8f5f-df63-4924-9bf2-991f31b121b4n@googlegroups.com>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=27404&group=comp.os.vms#27404

  copy link   Newsgroups: comp.os.vms
X-Received: by 2002:a05:620a:170d:b0:74a:5993:456f with SMTP id az13-20020a05620a170d00b0074a5993456fmr1936164qkb.13.1680982914657;
Sat, 08 Apr 2023 12:41:54 -0700 (PDT)
X-Received: by 2002:a05:620a:1a90:b0:73b:7c9b:35a7 with SMTP id
bl16-20020a05620a1a9000b0073b7c9b35a7mr1448966qkb.9.1680982914467; Sat, 08
Apr 2023 12:41:54 -0700 (PDT)
Path: i2pn2.org!i2pn.org!weretis.net!feeder6.news.weretis.net!newsfeed.hasname.com!usenet.blueworldhosting.com!diablo1.usenet.blueworldhosting.com!peer02.iad!feed-me.highwinds-media.com!news.highwinds-media.com!news-out.google.com!nntp.google.com!postnews.google.com!google-groups.googlegroups.com!not-for-mail
Newsgroups: comp.os.vms
Date: Sat, 8 Apr 2023 12:41:54 -0700 (PDT)
In-Reply-To: <342f2188-7e3c-4507-8b02-4b2d727be9a3n@googlegroups.com>
Injection-Info: google-groups.googlegroups.com; posting-host=172.110.168.218; posting-account=uNeudQoAAACm0ETOCzPNrvtq-73lRbuD
NNTP-Posting-Host: 172.110.168.218
References: <e4c52a36-1a39-49f3-9cba-6bd47dcb60f2n@googlegroups.com>
<u0q5ls$vgv0$2@dont-email.me> <5d89b2ea-57e0-4f4f-bb76-89c40ed81eaen@googlegroups.com>
<u0s6ai$1b1kn$1@dont-email.me> <cebbdd0f-9c68-4ac8-b7d3-62bcb895d22bn@googlegroups.com>
<u0sc52$1bv6n$1@dont-email.me> <342f2188-7e3c-4507-8b02-4b2d727be9a3n@googlegroups.com>
User-Agent: G2/1.0
MIME-Version: 1.0
Message-ID: <668f8f5f-df63-4924-9bf2-991f31b121b4n@googlegroups.com>
Subject: Re: ossec
From: jchim...@gmail.com (plugh)
Injection-Date: Sat, 08 Apr 2023 19:41:54 +0000
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
X-Received-Bytes: 3240
 by: plugh - Sat, 8 Apr 2023 19:41 UTC

On Saturday, April 8, 2023 at 12:28:04 PM UTC-7, plugh wrote:
> On Saturday, April 8, 2023 at 11:35:17 AM UTC-7, Arne Vajhøj wrote:
> > On 4/8/2023 1:52 PM, plugh wrote:
> > > On Saturday, April 8, 2023 at 9:55:49 AM UTC-7, Arne Vajhøj wrote:
> > >> On 4/7/2023 8:37 PM, plugh wrote:
> > >>> I think all that's necessary for the "hids" subsystem is to
> > >>> mount a VMS log directory in *nix. The parser is available now under
> > >>> the ossec server subsystem.
> > >> I am not sure that NFS mounting the directories where the critical
> > >> log files on VMS reside would be improving security.
> > >
> > > I disagree. I'm sure there's a way to safely mount disks R/O remotely
> > > even under VMS; which techniques depend on your definition of
> > > "secure". If that's what you're proposing for not researching porting
> > > the server architecture, fine. If VMS is too spavined to handle
> > > connections from a *nix server than this topic isn't worth
> > > discussing.
> > security.audit$journal, accountng.dat and various log files
> > are in sys$manager. RDB put a log file in SYS$SYSTEM.
> > Apache log files are in APACHE$SPECIFIC:[LOGS], which is
> > disk:[SYS0.SYSCOMMON.APACHE.SPECIFIC.node.LOGS].
> >
> > I do not like the idea of NFS mounting those directories
> > not even readonly with appropriate access control - too risky
> > that some critical information could leak out that way.
> >
> > Another way to to get information over to ossec has to be found.
> > IMHO.
> >
> > Arne
> Can we limn that fear?

I retract that question. I have a misunderstanding of the architecture.
The server does not need access to the agent's alert sources.

1
server_pubkey.txt

rocksolid light 0.9.81
clearnet tor