An Open Source Host-based Intrusion Detection System
https://www.ossec.net
OSSEC HIDS is an Open Source Host-based Intrusion Detection
System. It performs log analysis, integrity checking, rootkit
detection, time-based alerting and active response.
-
1
derived packages
- Download package
-
Checkout Package
osc -A https://api.opensuse.org checkout server:monitoring/ossec-hids && cd $_
- Create Badge
Refresh
Refresh
Source Files
Filename | Size | Changed |
---|---|---|
ossec-hids-3.6.0.tar.gz | 0001921753 1.83 MB | |
ossec-hids-3.6.0.tar.gz.asc | 0000000833 833 Bytes | |
ossec-hids-location.patch | 0000028853 28.2 KB | |
ossec-hids-rpmlintrc | 0000000062 62 Bytes | |
ossec-hids.changes | 0000019227 18.8 KB | |
ossec-hids.keyring | 0000003092 3.02 KB | |
ossec-hids.logrotate | 0000000177 177 Bytes | |
ossec-hids.service | 0000000309 309 Bytes | |
ossec-hids.spec | 0000017104 16.7 KB | |
ossec-init.conf | 0000000074 74 Bytes | |
sysconfig.ossec-hids | 0000000318 318 Bytes | |
sysconfig.ossec-hids-client | 0000000106 106 Bytes | |
sysconfig.ossec-hids-server | 0000000107 107 Bytes |
Revision 6 (latest revision is 14)
Lars Vogdt (lrupp)
committed
(revision 6)
- update to 3.6.0 + Its that time of year again, our annual independent security audit! Joining our previous two years auditors, Apple Security and OVH Internet is security researcher Daniel McCarney (@cpu) who performed a very in depth analysis on our IDS engine updates (PCRE2, and more). With a project as critical as OSSEC in securing cloud and enterprise assets its very important to us to have independent assessments of the framework. So again we want to thank all of our auditors, old and new for their contribution to the project. - from 3.5.0 + This would have been a minor 3.4.1 update if it wasnt for Boris Lukashev of https://www.sempervictus.com contributing a much needed update to multi-line log analysis. Previous usage of multi-line in OSSEC in the past was limited in processing events that did not use indentiation, a fairly common modern practice for readability. This update adds a new type: multi-line_indented to handle this condition (Example: postgresql). + Maintenance fixes in this release also address issue #1781, which affected maild when calling an external program, and add support for Fedora 31 - from 3.4.0 Big changes in this release add support for the following new platforms: + Debian buster + Fedora 30 + RHEL 8 + (Much awaited!) Centos 8 @jubois has completed the first round of pcre2 rule updates. This is a very exciting change to the overall IDS engine in OSSEC and opens the platform up to much more complex (and faster!) search functionality. + Last but not least, @ddpbsd has a long awaited fix for agentd/maild when ipv6 is disabled and/or hostnames are used instead of IPs in PR#1698. Thanks again to all our community contributors, and dedicated team members for their
Comments 0