An Open Source Host-based Intrusion Detection System

Edit Package ossec-hids
https://www.ossec.net

OSSEC HIDS is an Open Source Host-based Intrusion Detection
System. It performs log analysis, integrity checking, rootkit
detection, time-based alerting and active response.

Refresh
Refresh
Source Files
Filename Size Changed
ossec-hids-3.6.0.tar.gz 0001921753 1.83 MB
ossec-hids-3.6.0.tar.gz.asc 0000000833 833 Bytes
ossec-hids-location.patch 0000028853 28.2 KB
ossec-hids-rpmlintrc 0000000062 62 Bytes
ossec-hids.changes 0000019227 18.8 KB
ossec-hids.keyring 0000003092 3.02 KB
ossec-hids.logrotate 0000000177 177 Bytes
ossec-hids.service 0000000309 309 Bytes
ossec-hids.spec 0000017104 16.7 KB
ossec-init.conf 0000000074 74 Bytes
sysconfig.ossec-hids 0000000318 318 Bytes
sysconfig.ossec-hids-client 0000000106 106 Bytes
sysconfig.ossec-hids-server 0000000107 107 Bytes
Revision 6 (latest revision is 14)
Lars Vogdt's avatar Lars Vogdt (lrupp) committed (revision 6)
- update to 3.6.0
  + Its that time of year again, our annual independent security audit! Joining our
    previous two years auditors, Apple Security and OVH Internet is security
    researcher Daniel McCarney (@cpu) who performed a very in depth analysis on our
    IDS engine updates (PCRE2, and more). With a project as critical as OSSEC in
    securing cloud and enterprise assets its very important to us to have
    independent assessments of the framework. So again we want to thank all of our
    auditors, old and new for their contribution to the project.
- from 3.5.0
  + This would have been a minor 3.4.1 update if it wasnt for Boris Lukashev of
    https://www.sempervictus.com contributing a much needed update to multi-line
    log analysis. Previous usage of multi-line in OSSEC in the past was limited
    in processing events that did not use indentiation, a fairly common 
    modern practice for readability. 
    This update adds a new type: multi-line_indented to handle this condition 
    (Example: postgresql).
  + Maintenance fixes in this release also address issue #1781, which affected
    maild when calling an external program, and add support for Fedora 31
- from 3.4.0
  Big changes in this release add support for the following new platforms:
  + Debian buster
  + Fedora 30
  + RHEL 8
  + (Much awaited!) Centos 8
  @jubois has completed the first round of pcre2 rule updates. This is a very
  exciting change to the overall IDS engine in OSSEC and opens the platform up to
  much more complex (and faster!) search functionality.
  + Last but not least, @ddpbsd has a long awaited fix for agentd/maild when
    ipv6 is disabled and/or hostnames are used instead of IPs in PR#1698. Thanks
    again to all our community contributors, and dedicated team members for their
Comments 0
openSUSE Build Service is sponsored by