Advertisement
Guest User

psad.conf

a guest
Apr 9th, 2013
274
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 22.75 KB | None | 0 0
  1. #
  2. ##############################################################################
  3. #
  4. # This is the configuration file for psad (the Port Scan Attack Detector).
  5. # Normally this file gets installed at /etc/psad/psad.conf, but can be put
  6. # anywhere in the filesystem and then the path can be specified on the
  7. # command line argument "-c <file>" to psad. All three psad daemons (psad,
  8. # kmsgsd, and psadwatchd) reference this config file.
  9. #
  10. # Each line has the form "<variable name> <value>;". Note the semi-
  11. # colon after the <value>. All characters after the semicolon will be
  12. # ignored to provide space for comments.
  13. #
  14. ##############################################################################
  15. #
  16. # $Id: psad.conf 2297 2010-07-14 21:02:07Z mbr $
  17. #
  18.  
  19. ### Supports multiple email addresses (as a comma separated
  20. ### list).
  21. EMAIL_ADDRESSES juanchiviotti@gmail.com,gastonroca@gmail.com;
  22.  
  23. ### Machine hostname
  24. HOSTNAME transportecabo;
  25.  
  26. ### Specify the home and external networks. Note that by default the
  27. ### ENABLE_INTF_LOCAL_NETS is enabled, so psad automatically detects
  28. ### all of the directly connected subnets and uses this information as
  29. ### the HOME_NET variable.
  30. HOME_NET any;
  31. EXTERNAL_NET any;
  32.  
  33. ### The FW_SEARCH_ALL variable controls has psad will parse iptables
  34. ### messages. If it is set to "Y" then psad will parse all iptables
  35. ### messages for evidence of scan activity. If it is set to "N" then
  36. ### psad will only parse those iptables messages that contain logging
  37. ### prefixes specified by the FW_MSG_SEARCH variable below. Logging
  38. ### prefixes are set with the --log-prefix command line option to iptables.
  39. ### Setting FW_SEARCH_ALL to "N" is useful for having psad only analyze
  40. ### iptables messages that are logged out of a specific iptables chain
  41. ### (multiple strings can be searched for, see the comment above the
  42. ### FW_MSG_SEARCH variable below) or a specific logging rule for example.
  43. ### FW_SEARCH_ALL is set to "Y" by default since usually people want psad
  44. ### to parse all iptables messages.
  45. FW_SEARCH_ALL Y;
  46.  
  47. ### The FW_MSG_SEARCH variable can be modified to look for logging messages
  48. ### that are specific to your firewall configuration (specified by the
  49. ### "--log-prefix" option. For example, if your firewall uses the
  50. ### string "Audit" for packets that have been blocked, then you could
  51. ### set FW_MSG_SEARCH to "Audit"; The default string to search for is
  52. ### "DROP". Both psad and kmsgsd reference this file. NOTE: You can
  53. ### specify this variable multiple times to have psad search for multiple
  54. ### strings. For example to have psad search for the strings "Audit" and
  55. ### "Reject", you would use the following two lines:
  56. #FW_MSG_SEARCH Audit;
  57. #FW_MSG_SEARCH REJECT;
  58. FW_MSG_SEARCH DROP;
  59.  
  60. ### Set the type of syslog daemon that is used. The SYSLOG_DAEMON
  61. ### variable accepts four possible values: syslogd, syslog-ng, ulogd,
  62. ### or metalog.
  63. SYSLOG_DAEMON syslogd;
  64.  
  65. ### What type of interface configuration do you use? This this variable to
  66. ### "iproute2" if you want to use the iproute2 type configuration.
  67. ### iproute2 does not use aliases for multi-homed interfaces and
  68. ### ifconfig does not show secondary addresses for multi-homed interfaces.
  69. #IFCFGTYPE iproute2;
  70. IFCFGTYPE ifconfig;
  71.  
  72. ### Danger levels. These represent the total number of
  73. ### packets required for a scan to reach each danger level.
  74. ### A scan may also reach a danger level if the scan trips
  75. ### a signature or if the scanning ip is listed in
  76. ### auto_ips so a danger level is automatically
  77. ### assigned.
  78. DANGER_LEVEL1 5; ### Number of packets.
  79. DANGER_LEVEL2 15;
  80. DANGER_LEVEL3 150;
  81. DANGER_LEVEL4 1500;
  82. DANGER_LEVEL5 10000;
  83.  
  84. ### Set the interval (in seconds) psad will use to sleep before
  85. ### checking for new iptables log messages
  86. CHECK_INTERVAL 5;
  87.  
  88. ### Search for snort "sid" values generated by fwsnort
  89. ### or snort2iptables
  90. SNORT_SID_STR SID;
  91.  
  92. ### Set the minimum range of ports that must be scanned before
  93. ### psad will send an alert. The default is 1 so that at
  94. ### least two port must be scanned (p2-p1 >= 1). This can be set
  95. ### to 0 if you want psad to be extra paranoid, or 30000 if not.
  96. PORT_RANGE_SCAN_THRESHOLD 1;
  97.  
  98. ### If "Y", means that scans will never timeout. This is useful
  99. ### for catching scans that take place over long periods of time
  100. ### where the attacker is trying to slip beneath the IDS thresholds.
  101. ENABLE_PERSISTENCE Y;
  102.  
  103. ### This is used only if ENABLE_PERSISTENCE = "N";
  104. SCAN_TIMEOUT 3600; ### seconds
  105.  
  106. ### If "Y", means all signatures will be shown since
  107. ### the scan started instead of just the current ones.
  108. SHOW_ALL_SIGNATURES N;
  109.  
  110. ### Allow reporting methods to be enabled/restricted. This keyword can
  111. ### accept values of "nosyslog" (don't write any messages to syslog),
  112. ### "noemail" (don't send any email messages), or "ALL" (to generate both
  113. ### syslog and email messages). "ALL" is the default. Both "nosyslog"
  114. ### and "noemail" can be combined with a comma to disable all logging
  115. ### and alerting.
  116. ALERTING_METHODS ALL;
  117.  
  118. ### By default, psad acquires iptables log data from the /var/log/psad/fwdata
  119. ### file which is written to by kmsgsd. However, psad can just read an
  120. ### existing file that syslog writes iptables log data to (commonly
  121. ### /var/log/messages). On some systems, having syslog communicate log data
  122. ### to kmsgsd can be problematic (syslog configs and external factors such
  123. ### as Apparmor and SELinux can play a role here), so using this feature can
  124. ### simplify a psad deployment.
  125. ENABLE_SYSLOG_FILE Y;
  126. IPT_WRITE_FWDATA Y;
  127. IPT_SYSLOG_FILE /var/log/messages;
  128.  
  129. ### When enabled, this instructs psad to write the "msg" field
  130. ### associated with Snort rule matches to syslog.
  131. ENABLE_SIG_MSG_SYSLOG Y;
  132. SIG_MSG_SYSLOG_THRESHOLD 10;
  133. SIG_SID_SYSLOG_THRESHOLD 10;
  134.  
  135. ### TTL values are decremented depending on the number of hops
  136. ### the packet has taken before it hits the firewall. We will
  137. ### assume packets will not jump through more than 20 hops on
  138. ### average.
  139. MAX_HOPS 20;
  140.  
  141. ### Do not include any timestamp included within kernel logging
  142. ### messages (Ubuntu systems commonly have this)
  143. IGNORE_KERNEL_TIMESTAMP Y;
  144.  
  145. ### FIXME: try to mitigate the affects of the iptables connection
  146. ### tracking bug by ignoring tcp packets that have the ack bit set.
  147. ### Read the "BUGS" section of the psad man page. Note that
  148. ### if a packet matches a snort SID generated by fwsnort (see
  149. ### http://www.cipherdyne.org/fwsnort/)
  150. ### then psad will see it even if the ack bit is set. See the
  151. ### SNORT_SID_STR variable.
  152. IGNORE_CONNTRACK_BUG_PKTS Y;
  153.  
  154. ### define a set of ports to ignore (this is useful particularly
  155. ### for port knocking applications since the knock sequence will
  156. ### look to psad like a scan). This variable may be defined as
  157. ### a comma-separated list of port numbers or port ranges and
  158. ### corresponding protocol, For example, to have psad ignore all
  159. ### tcp in the range 61000-61356 and udp ports 53 and 5000, use:
  160. ### IGNORE_PORTS tcp/61000-61356, udp/53, udp/5000;
  161. IGNORE_PORTS NONE;
  162.  
  163. ### allow entire protocols to be ignored. This keyword can accept
  164. ### a comma separated list of protocols. Each protocol must match
  165. ### the protocol that is specified in a Netfilter log message (case
  166. ### insensitively, so both "TCP" or "tcp" is ok).
  167. ### IGNORE_PROTOCOL tcp,udp;
  168. IGNORE_PROTOCOLS NONE;
  169.  
  170. ### allow packets to be ignored based on interface (this is the
  171. ### "IN" interface in Nefilter logging messages).
  172. IGNORE_INTERFACES NONE;
  173.  
  174. ### Ignore these specific logging prefixes
  175. IGNORE_LOG_PREFIXES NONE;
  176.  
  177. ### Minimum danger level a scan must reach before any logging or
  178. ### alerting is done. The EMAIL_ALERT_DANGER_LEVEL variable below
  179. ### only refers to email alerts; the MIN_DANGER_LEVEL variable
  180. ### applies to everything from email alerts to whether or not the
  181. ### IP directory is created within /var/log/psad/. Hence
  182. ### MIN_DANGER_LEVEL should be set less than or equal to the value
  183. ### assigned to the EMAIL_ALERT_DANGER_LEVEL variable.
  184. MIN_DANGER_LEVEL 1;
  185.  
  186. ### Only send email alert if danger level >= to this value.
  187. EMAIL_ALERT_DANGER_LEVEL 1;
  188.  
  189. ### Treat all subnets on local interfaces as part of HOME_NET (this
  190. ### means that these networks do not have to be manually defined)
  191. ENABLE_INTF_LOCAL_NETS Y;
  192.  
  193. ### Include MAC addresses in email alert
  194. ENABLE_MAC_ADDR_REPORTING N;
  195.  
  196. ### Look for the Netfilter logging rule (fwcheck_psad is executed)
  197. ENABLE_FW_LOGGING_CHECK Y;
  198.  
  199. ### Send no more than this number of emails for a single
  200. ### scanning source IP. Note that enabling this feature may cause
  201. ### alerts for real attacks to not be generated if an attack is sent
  202. ### after the email threshold has been reached for an IP address.
  203. ### This is why the default is set to "0".
  204. EMAIL_LIMIT 0;
  205.  
  206. ### By default, psad maintains a counter for each scanning source address,
  207. ### but by enabling this variable psad will maintain email counters for
  208. ### each victim address that is scanned as well.
  209. ENABLE_EMAIL_LIMIT_PER_DST N;
  210.  
  211. ### If "Y", send a status email message when an IP has reached the
  212. ### EMAIL_LIMIT threshold.
  213. EMAIL_LIMIT_STATUS_MSG Y;
  214.  
  215. ### If "Y", send email for all newly logged packets from the same
  216. ### source ip instead of just when a danger level increases.
  217. ALERT_ALL Y;
  218.  
  219. ### If "Y", then psad will import old scan source ip directories
  220. ### as current scans instead of moving the directories into the
  221. ### archive directory.
  222. IMPORT_OLD_SCANS N;
  223.  
  224. ### syslog facility and priority (the defaults are usually ok)
  225. ### The SYSLOG_FACILITY variable can be set to one of LOG_LOCAL{0-7}, and
  226. ### SYSLOG_PRIORITY can be set to one of LOG_INFO, LOG_DEBUG, LOG_NOTICE,
  227. ### LOG_WARNING, LOG_ERR, LOG_CRIT, LOG_ALERT, or LOG_EMERG
  228. SYSLOG_IDENTITY psad;
  229. SYSLOG_FACILITY LOG_LOCAL7;
  230. SYSLOG_PRIORITY LOG_INFO;
  231.  
  232. ### Port thresholds for logging and -S and -A output.
  233. TOP_PORTS_LOG_THRESHOLD 500;
  234. STATUS_PORTS_THRESHOLD 20;
  235.  
  236. ### Signature thresholds for logging and -S and -A output.
  237. TOP_SIGS_LOG_THRESHOLD 500;
  238. STATUS_SIGS_THRESHOLD 50;
  239.  
  240. ### Attackers thresholds for logging and -S and -A output.
  241. TOP_IP_LOG_THRESHOLD 500;
  242. STATUS_IP_THRESHOLD 25;
  243.  
  244. ### Specify how often to log the TOP_* information (i.e. how many
  245. ### CHECK_INTERVAL iterations before the data is logged again).
  246. TOP_SCANS_CTR_THRESHOLD 1;
  247.  
  248. ### Send scan logs to dshield.org. This is disabled by default,
  249. ### but is a good idea to enable it (subject to your site security
  250. ### policy) since the DShield service helps to track the bad guys.
  251. ### For more information visit http://www.dshield.org
  252. ENABLE_DSHIELD_ALERTS N;
  253.  
  254. ### dshield.org alert email address; this should not be changed
  255. ### unless the guys at DShield have changed it.
  256. DSHIELD_ALERT_EMAIL reports@dshield.org;
  257.  
  258. ### Time interval (hours) to send email alerts to dshield.org.
  259. ### The default is 6 hours, and cannot be less than 1 hour or
  260. ### more than 24 hours.
  261. DSHIELD_ALERT_INTERVAL 6; ### hours
  262.  
  263. ### If you have a DShield user id you can set it here. The
  264. ### default is "0".
  265. DSHIELD_USER_ID 0;
  266.  
  267. ### If you want the outbound DShield email to appear as though it
  268. ### is coming from a particular user address then set it here.
  269. DSHIELD_USER_EMAIL NONE;
  270.  
  271. ### Threshold danger level for DShield data; a scan must reach this
  272. ### danger level before associated packets will be included in an
  273. ### alert to DShield. Note that zero is the default since this
  274. ### will allow DShield to apply its own logic to determine what
  275. ### constitutes a scan (_all_ iptables log messages will be included
  276. ### in DShield email alerts).
  277. DSHIELD_DL_THRESHOLD 0;
  278.  
  279. ### List of servers. Fwsnort supports the same variable resolution as
  280. #### Snort.
  281. HTTP_SERVERS $HOME_NET;
  282. SMTP_SERVERS $HOME_NET;
  283. DNS_SERVERS $HOME_NET;
  284. SQL_SERVERS $HOME_NET;
  285. TELNET_SERVERS $HOME_NET;
  286.  
  287. #### AOL AIM server nets
  288. AIM_SERVERS [64.12.24.0/24, 64.12.25.0/24, 64.12.26.14/24, 64.12.28.0/24, 64.12.29.0/24, 64.12.161.0/24, 64.12.163.0/24, 205.188.5.0/24, 205.188.9.0/24];
  289.  
  290. ### Configurable port numbers
  291. HTTP_PORTS 80;
  292. SHELLCODE_PORTS !80;
  293. ORACLE_PORTS 1521;
  294.  
  295. ### If this is enabled, then psad will die if a rule in the
  296. ### /etc/psad/signatures file contains an unsupported option (otherwise
  297. ### a syslog warning will be generated).
  298. ENABLE_SNORT_SIG_STRICT Y;
  299.  
  300. ### If "Y", enable automated IDS response (auto manages
  301. ### firewall rulesets).
  302. ENABLE_AUTO_IDS N;
  303.  
  304. ### Block all traffic from offending IP if danger
  305. ### level >= to this value
  306. AUTO_IDS_DANGER_LEVEL 5;
  307.  
  308. ### Set the auto-blocked timeout in seconds (the default
  309. ### is one hour).
  310. AUTO_BLOCK_TIMEOUT 3600;
  311.  
  312. ### Enable regex checking on log prefixes for active response
  313. ENABLE_AUTO_IDS_REGEX N;
  314.  
  315. ### Only block if the Netfilter log message matches the following regex
  316. AUTO_BLOCK_REGEX ESTAB; ### from fwsnort logging prefixes
  317.  
  318. ### Control whether "renew" auto-block emails get sent. This is disabled
  319. ### by default because lots of IPs could have been blocked, and psad
  320. ### should not generate a renew email for each of them.
  321. ENABLE_RENEW_BLOCK_EMAILS N;
  322.  
  323. ### By setting this variable to N, all auto-blocking emails can be
  324. ### suppressed.
  325. ENABLE_AUTO_IDS_EMAILS Y;
  326.  
  327. ### Enable iptables blocking (only gets enabled if
  328. ### ENABLE_AUTO_IDS is also set)
  329. IPTABLES_BLOCK_METHOD Y;
  330.  
  331. ### Specify chain names to which iptables blocking rules will be
  332. ### added with the IPT_AUTO_CHAIN{n} keyword. There is no limit on the
  333. ### number of IPT_AUTO_CHAIN{n} keywords; just increment the {n} number
  334. ### to add an additional IPT_AUTO_CHAIN requirement. The format for this
  335. ### variable is: <Target>,<Direction>,<Table>,<From_chain>,<Jump_rule_position>, \
  336. ### <To_chain>,<Rule_position>.
  337. ### "Target": Can be any legitimate Netfilter target, but should usually
  338. ### just be "DROP".
  339. ### "Direction": Can be "src", "dst", or "both", which correspond to the
  340. ### INPUT, OUTPUT, and FORWARD chains.
  341. ### "Table": Can be any Netfilter table, but the default is "filter".
  342. ### "From_chain": Is the chain from which packets will be jumped.
  343. ### "Jump_rule_position": Defines the position within the From_chain where
  344. ### the jump rule is added.
  345. ### "To_chain": Is the chain to which packets will be jumped. This is the
  346. ### main chain where psad rules are added.
  347. ### "Rule_position": Defines the position where rule are added within the
  348. ### To_chain.
  349. ###
  350. ### The following defaults make sense for most installations, but note
  351. ### it is possible to include blocking rules in, say, the "nat" table
  352. ### using this functionality as well. The following three lines provide
  353. ### usage examples:
  354. #IPT_AUTO_CHAIN1 DROP, src, filter, INPUT, 1, PSAD_BLOCK_INPUT, 1;
  355. #IPT_AUTO_CHAIN2 DROP, dst, filter, OUTPUT, 1, PSAD_BLOCK_OUTPUT, 1;
  356. #IPT_AUTO_CHAIN3 DROP, both, filter, FORWARD, 1, PSAD_BLOCK_FORWARD, 1;
  357. IPT_AUTO_CHAIN1 DROP, src, filter, INPUT, 1, PSAD_BLOCK_INPUT, 1;
  358. IPT_AUTO_CHAIN2 DROP, dst, filter, OUTPUT, 1, PSAD_BLOCK_OUTPUT, 1;
  359. IPT_AUTO_CHAIN3 DROP, both, filter, FORWARD, 1, PSAD_BLOCK_FORWARD, 1;
  360.  
  361. ### Flush all existing rules in the psad chains at psad start time.
  362. FLUSH_IPT_AT_INIT Y;
  363.  
  364. ### Prerequisite check for existence of psad chains and jump rules
  365. IPTABLES_PREREQ_CHECK 1;
  366.  
  367. ### Enable tcp wrappers blocking (only gets enabled if
  368. ### ENABLE_AUTO_IDS is also set)
  369. TCPWRAPPERS_BLOCK_METHOD N;
  370.  
  371. ### Set the whois timeout
  372. WHOIS_TIMEOUT 60; ### seconds
  373.  
  374. ### Set the number of times an ip can be seen before another whois
  375. ### lookup is issued.
  376. WHOIS_LOOKUP_THRESHOLD 20;
  377.  
  378. ### Use this option to force all whois information to contain ascii-only data.
  379. ### Sometime whois information for IP addresses in China and other countries
  380. ### can contain non-ascii data. If this option is enabled, then any non-
  381. ### ascii characters will be replaced with "NA".
  382. ENABLE_WHOIS_FORCE_ASCII N;
  383.  
  384. ### This variable forces all whois lookups to be done against the source IP
  385. ### even when they are associated with a directly connected local network. IT
  386. ### is usually a good idea to leave this setting as the default of 'N'.
  387. ENABLE_WHOIS_FORCE_SRC_IP N;
  388.  
  389. ### Set the number of times an ip can be seen before another dns
  390. ### lookup is issued.
  391. DNS_LOOKUP_THRESHOLD 20;
  392.  
  393. ### Enable psad to run an external script or program (use at your
  394. ### own risk!)
  395. ENABLE_EXT_SCRIPT_EXEC N;
  396.  
  397. ### Define an external program to run after a scan is caught.
  398. ### Note that the scan source ip can be specified on the command
  399. ### line to the external program through the use of the "SRCIP"
  400. ### string (along with some appropriate switch for the program).
  401. ### Of course this is only useful if the external program knows
  402. ### what to do with this information.
  403. ### Example: EXTERNAL_SCRIPT /path/to/script --ip SRCIP -v;
  404. EXTERNAL_SCRIPT /bin/true;
  405.  
  406. ### Control execution of EXTERNAL_SCRIPT (only once per IP, or
  407. ### every time a scan is detected for an ip).
  408. EXEC_EXT_SCRIPT_PER_ALERT N;
  409.  
  410. ### Disk usage variables
  411. DISK_CHECK_INTERVAL 300; ### seconds
  412.  
  413. ### This can be set to 0 to disable disk checking altogether
  414. DISK_MAX_PERCENTAGE 95;
  415.  
  416. ### This can be set to 0 to have psad not place any limit on the
  417. ### number of times it will attempt to remove data from
  418. ### /var/log/psad/.
  419. DISK_MAX_RM_RETRIES 10;
  420.  
  421. ### Enable archiving of old scan directories at psad startup.
  422. ENABLE_SCAN_ARCHIVE N;
  423.  
  424. ### Truncate fwdata file at startup
  425. TRUNCATE_FWDATA Y;
  426.  
  427. ### Only archive scanning IP directories that have reached a danger
  428. ### level greater than or equal to this value. Archiving old
  429. ### scanning ip directories only takes place at psad startup.
  430. MIN_ARCHIVE_DANGER_LEVEL 1;
  431.  
  432. ### Email subject line config. Change these prefixes if you want
  433. ### psad to generate email alerts that say something other than
  434. ### the following.
  435. MAIL_ALERT_PREFIX [psad-alert];
  436. MAIL_STATUS_PREFIX [psad-status];
  437. MAIL_ERROR_PREFIX [psad-error];
  438. MAIL_FATAL_PREFIX [psad-fatal];
  439.  
  440. ### URL for getting the latest psad signatures
  441. SIG_UPDATE_URL http://www.cipherdyne.org/psad/signatures;
  442.  
  443. ### These next two are psadwatchd vars
  444. PSADWATCHD_CHECK_INTERVAL 5; ### seconds
  445. PSADWATCHD_MAX_RETRIES 10;
  446.  
  447. ### Directories
  448. PSAD_DIR /var/log/psad;
  449. PSAD_RUN_DIR /var/run/psad;
  450. PSAD_FIFO_DIR /var/lib/psad;
  451. PSAD_LIBS_DIR /usr/lib/psad;
  452. PSAD_CONF_DIR /etc/psad;
  453. PSAD_ERR_DIR $PSAD_DIR/errs;
  454. CONF_ARCHIVE_DIR $PSAD_CONF_DIR/archive;
  455. SCAN_DATA_ARCHIVE_DIR $PSAD_DIR/scan_archive;
  456. ANALYSIS_MODE_DIR $PSAD_DIR/ipt_analysis;
  457. SNORT_RULES_DIR $PSAD_CONF_DIR/snort_rules;
  458.  
  459. ### Files
  460. FW_DATA_FILE $PSAD_DIR/fwdata;
  461. ULOG_DATA_FILE $PSAD_DIR/ulogd.log;
  462. FW_CHECK_FILE $PSAD_DIR/fw_check;
  463. DSHIELD_EMAIL_FILE $PSAD_DIR/dshield.email;
  464. SIGS_FILE $PSAD_CONF_DIR/signatures;
  465. ICMP_TYPES_FILE $PSAD_CONF_DIR/icmp_types;
  466. AUTO_DL_FILE $PSAD_CONF_DIR/auto_dl;
  467. SNORT_RULE_DL_FILE $PSAD_CONF_DIR/snort_rule_dl;
  468. POSF_FILE $PSAD_CONF_DIR/posf;
  469. P0F_FILE $PSAD_CONF_DIR/pf.os;
  470. IP_OPTS_FILE $PSAD_CONF_DIR/ip_options;
  471. PSAD_FIFO_FILE $PSAD_FIFO_DIR/psadfifo;
  472. ETC_HOSTS_DENY_FILE /etc/hosts.deny;
  473. ETC_SYSLOG_CONF /etc/syslog.conf;
  474. ETC_RSYSLOG_CONF /etc/rsyslog.conf;
  475. ETC_SYSLOGNG_CONF /etc/syslog-ng/syslog-ng.conf;
  476. ETC_METALOG_CONF /etc/metalog/metalog.conf;
  477. STATUS_OUTPUT_FILE $PSAD_DIR/status.out;
  478. ANALYSIS_OUTPUT_FILE $PSAD_DIR/analysis.out;
  479. INSTALL_LOG_FILE $PSAD_DIR/install.log;
  480.  
  481. ### PID files
  482. PSAD_PID_FILE $PSAD_RUN_DIR/psad.pid;
  483. PSAD_CMDLINE_FILE $PSAD_RUN_DIR/psad.cmd;
  484. KMSGSD_PID_FILE $PSAD_RUN_DIR/kmsgsd.pid;
  485. PSADWATCHD_PID_FILE $PSAD_RUN_DIR/psadwatchd.pid;
  486.  
  487. ### List of ips that have been auto blocked by iptables
  488. ### or tcpwrappers (the auto blocking feature is disabled by
  489. ### default, see the psad man page and the ENABLE_AUTO_IDS
  490. ### variable).
  491. AUTO_BLOCK_IPT_FILE $PSAD_DIR/auto_blocked_iptables;
  492. AUTO_BLOCK_TCPWR_FILE $PSAD_DIR/auto_blocked_tcpwr;
  493.  
  494. ### File used internally by psad to add Netfilter blocking
  495. ### rules to a running psad process
  496. AUTO_IPT_SOCK $PSAD_RUN_DIR/auto_ipt.sock;
  497.  
  498. FW_ERROR_LOG $PSAD_ERR_DIR/fwerrorlog;
  499. PRINT_SCAN_HASH $PSAD_DIR/scan_hash;
  500.  
  501. ### /proc interface for controlling ip forwarding
  502. PROC_FORWARD_FILE /proc/sys/net/ipv4/ip_forward;
  503.  
  504. ### Packet counters for tcp, udp, and icmp protocols
  505. PACKET_COUNTER_FILE $PSAD_DIR/packet_ctr;
  506.  
  507. ### Top scanned ports
  508. TOP_SCANNED_PORTS_FILE $PSAD_DIR/top_ports;
  509.  
  510. ### Top signature matches
  511. TOP_SIGS_FILE $PSAD_DIR/top_sigs;
  512.  
  513. ### Top attackers
  514. TOP_ATTACKERS_FILE $PSAD_DIR/top_attackers;
  515.  
  516. ### Counter file for Dshield alerts
  517. DSHIELD_COUNTER_FILE $PSAD_DIR/dshield_ctr;
  518.  
  519. ### Counter file for iptables prefixes
  520. IPT_PREFIX_COUNTER_FILE $PSAD_DIR/ipt_prefix_ctr;
  521.  
  522. ### iptables command output and error collection files; these are
  523. ### used by IPTables::ChainMgr
  524. IPT_OUTPUT_FILE $PSAD_DIR/psad.iptout;
  525. IPT_ERROR_FILE $PSAD_DIR/psad.ipterr;
  526.  
  527. ### system binaries
  528. iptablesCmd /sbin/iptables;
  529. shCmd /bin/sh;
  530. wgetCmd /usr/bin/wget;
  531. gzipCmd /bin/gzip;
  532. mknodCmd /bin/mknod;
  533. psCmd /bin/ps;
  534. mailCmd /bin/mail;
  535. sendmailCmd /usr/sbin/sendmail;
  536. ifconfigCmd /sbin/ifconfig;
  537. ipCmd /sbin/ip;
  538. killallCmd /usr/bin/killall;
  539. netstatCmd /bin/netstat;
  540. unameCmd /bin/uname;
  541. whoisCmd /usr/bin/whois_psad;
  542. dfCmd /bin/df;
  543. fwcheck_psadCmd /usr/sbin/fwcheck_psad;
  544. psadwatchdCmd /usr/sbin/psadwatchd;
  545. kmsgsdCmd /usr/sbin/kmsgsd;
  546. psadCmd /usr/sbin/psad;
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement