From: <op...@ni...> - 2010-08-10 22:39:24
|
Hello, Having found out that 1.4.4 does not support vsftpd I quickly compiled 1.5 rc4 for my system. While syslog-ng log parsing works like a charm, I have problems with the Log Sucker. I started sshguard in debug mode: env SSHGUARD_DEBUG=foo sshguard -l /var/log/auth.log Then I made some bogus ftp and ssh connections from another machine: Read line from '/var/log/auth.log'. Starting parse Entering state 0 Reading a token: --accepting rule at line 110 ("Aug 10 23:57:37 charlie vsftpd[1]: ") Next token is token SYSLOG_BANNER_PID () Shifting token SYSLOG_BANNER_PID () Entering state 1 Reading a token: --accepting rule at line 220 ("pam_unix") Next token is token WORD () Error: popping token SYSLOG_BANNER_PID () Stack now 0 Cleanup: discarding lookahead token WORD () Stack now 0 Read line from '/var/log/auth.log'. Starting parse Entering state 0 Reading a token: --accepting rule at line 110 ("Aug 10 23:59:42 charlie sshd[5509]: ") Next token is token SYSLOG_BANNER_PID () Shifting token SYSLOG_BANNER_PID () Entering state 1 Reading a token: --accepting rule at line 220 ("pam_unix") Next token is token WORD () Error: popping token SYSLOG_BANNER_PID () Stack now 0 Cleanup: discarding lookahead token WORD () Stack now 0 It looks like the log entry is truncated. I am using syslog-ng 3.1.1. If I start sshguard without -l and feed it the line then it works properly: Aug 10 23:57:39 charlie vsftpd[1]: [fijam] FAIL LOGIN: Client "192.168.1.11" Starting parse Entering state 0 Reading a token: --accepting rule at line 196 ("Aug 10 23:57:39 charlie vsftpd[1]: [fijam] FAIL LOGIN: Client "") Next token is token VSFTPD_LOGINERR_PREF () Shifting token VSFTPD_LOGINERR_PREF () Entering state 22 Reading a token: --accepting rule at line 201 ("192.168.1.11") Next token is token IPv4 () Shifting token IPv4 () Entering state 50 Reducing stack by rule 23 (line 203): $1 = token IPv4 () -> $$ = nterm addr () Stack now 0 22 Entering state 69 Reading a token: --accepting rule at line 197 (""") Next token is token VSFTPD_LOGINERR_SUFF () Shifting token VSFTPD_LOGINERR_SUFF () Entering state 82 Reducing stack by rule 47 (line 339): $1 = token VSFTPD_LOGINERR_PREF () $2 = nterm addr () $3 = token VSFTPD_LOGINERR_SUFF () -> $$ = nterm vsftpdmsg () Stack now 0 Entering state 45 Reducing stack by rule 21 (line 179): $1 = nterm vsftpdmsg () -> $$ = nterm msg_single () Stack now 0 Entering state 28 Reducing stack by rule 9 (line 163): $1 = nterm msg_single () -> $$ = nterm logmsg () Stack now 0 Entering state 27 Reducing stack by rule 4 (line 125): $1 = nterm logmsg () -> $$ = nterm text () Stack now 0 Entering state 23 Reading a token: --(end of buffer or a NUL) --accepting rule at line 221 (" ") --(end of buffer or a NUL) --EOF (start condition 0) Now at end of input. Stack now 0 23 Cleanup: popping nterm text () Matched address 192.168.1.11:4 attacking service 330, dangerousness 10. Purging stale attackers. If you require any more info please let me know. Regards, J. |