This file is indexed.

/etc/prelude-lml/ruleset/single.rules is in prelude-lml-rules 4.1.0-1.

This file is owned by root:root, with mode 0o644.

The actual contents of the file can be viewed below.

  1
  2
  3
  4
  5
  6
  7
  8
  9
 10
 11
 12
 13
 14
 15
 16
 17
 18
 19
 20
 21
 22
 23
 24
 25
 26
 27
 28
 29
 30
 31
 32
 33
 34
 35
 36
 37
 38
 39
 40
 41
 42
 43
 44
 45
 46
 47
 48
 49
 50
 51
 52
 53
 54
 55
 56
 57
 58
 59
 60
 61
 62
 63
 64
 65
 66
 67
 68
 69
 70
 71
 72
 73
 74
 75
 76
 77
 78
 79
 80
 81
 82
 83
 84
 85
 86
 87
 88
 89
 90
 91
 92
 93
 94
 95
 96
 97
 98
 99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
#FULLNAME: Single rules
#VERSION: 1.0
#DESCRIPTION: Single and standalone rules that don't match up with any particular ruleset. All of these rules are single, standalone rules that don't match up with any particular ruleset. All of these rules are single, standalone rules that don't match up with any particular ruleset.

#####
#
# Copyright (C) 2004 Yoann Vandoorselaere <yoann@prelude-siem.org>
# All Rights Reserved
#
# RulesID "Execution attempt"
# Copyright (C) 2002 Brad Spengler <spender@grsecurity.net>
# All Rights Reserved
#
# RulesID 403, 411
# Copyright (C) 2004-2005 G Ramon Gomez <gene at gomezbrothers dot com>
# All Rights Reserved
#
# RulesID 410
# Copyright (C) 2005 M LeBlanc <mleblanc at cpan dot org>
# All Rights Reserved
#
# This file is part of the Prelude-LML program.
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation; either version 2, or (at your option)
# any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License along
# with this program; if not, write to the Free Software Foundation, Inc.,
# 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
#
#####

#DESCRIPTION:Promiscuous mode detected
#CATEGORY:Network Security
#LOG:Mar 28 12:30:01 gtsdmzuxids1 kernel: device eth1 entered promiscuous mode
regex=device (\S+) entered promiscuous mode; \
 classification.text=Promiscuous mode detected; \
 id=400; \
 revision=1; \
 analyzer(0).name=kernel; \
 analyzer(0).class=Kernel; \
 assessment.impact.completion=succeeded; \
 assessment.impact.type=other; \
 assessment.impact.severity=low; \
 assessment.impact.description=A sniffer is probably running on this machine; \
 target(0).interface=$1; \
 last

#DESCRIPTION:PAX - Execution attempt
#CATEGORY:Command Execution
#LOG:Apr  9 20:56:41 emma kernel: PAX: From 1.2.3.4: execution attempt in: /usr/lib/paxtest/shlibtest.so, 25891000-25892000 00001000
regex=From (\S+): execution attempt in:; \
 add_context=PAX_OVERFLOW_SOURCE; \
 source(0).node.address(>>).address = $1; \
 silent; last

#DESCRIPTION:PAX - Possible buffer overflow
#CATEGORY:Monitoring
#LOG:Sep  6 18:21:18 amoeba PAX: terminating task: /usr/X11R6/bin/glxinfo(glxinfo):7661, uid/euid: 9999/9999, PC: 25755afc, SP: 5bc95e2c
#LOG:Oct 13 20:56:41 emma kernel: PAX: terminating task: /usr/bin/localedef(localedef):5208, uid/euid: 0/0, EIP: BFF4C330, ESP: BFF4C21C
regex=terminating task: ([^(]+)\(([^)]+)\):(\d+), uid/euid: (\d+)/(\d+); \
 optional_context=PAX_OVERFLOW_SOURCE; \
 destroy_context=PAX_OVERFLOW_SOURCE; \
 classification.text=Possible buffer overflow; \
 id=402; \
 revision=2; \
 analyzer(0).name=PAX; \
 analyzer(0).manufacturer=www.grsecurity.net; \
 analyzer(0).class=Memory Violation; \
 assessment.impact.completion=failed; \
 assessment.impact.type=file; \
 assessment.impact.severity=high; \
 source(0).process.path = $1; \
 source(0).process.name=$2; \
 source(0).process.pid=$3; \
 source(0).user.category=application; \
 source(0).user.user_id(0).type=current-user; \
 source(0).user.user_id(0).number=$4; \
 source(0).user.user_id(1).type=original-user; \
 source(0).user.user_id(1).number=$5; \
 assessment.impact.description=A possible buffer overflow occured in $1.  You should consider this an attack against your system.; \
 last

#DESCRIPTION:Oracle - Command audit
#CATEGORY:Command Execution
#LOG:Apr 13 11:31:55 12.34.56.78 oracle.pr[info] 34  Audit trail: ACTION : 'connect internal' OSPRIV : DBA CLIENT USER: linc CLIENT TERMINAL: DB3  STATUS: SUCCEEDED ( 0 )  .
regex=Audit trail: ACTION : ('.+') OSPRIV : DBA CLIENT USER: (\S+) CLIENT TERMINAL: (\S+); \
 classification.text=Command audit; \
 id=403; \
 revision=2; \
 analyzer(0).name=Database; \
 analyzer(0).manufacturer=Oracle; \
 analyzer(0).class=Database; \
 assessment.impact.severity=low; \
 assessment.impact.completion=succeeded; \
 assessment.impact.type=admin; \
 assessment.impact.description=The command $1 was executed; \
 source(0).user.category=application; \
 source(0).user.user_id(0).type=original-user; \
 source(0).user.user_id(0).name=$2; \
 source(0).node.name=$3; \
 additional_data(0).type=string; \
 additional_data(0).meaning=Command; \
 additional_data(0).data=$1; \
 last

#DESCRIPTION:Xinetd - TFTP Session
#CATEGORY:Authentication
#LOG:Apr 28 08:56:46 somehost xinetd[17300]: START: tftp pid=10590 from=12.34.56.78
regex=START: tftp pid=(\d+) from=([\d\.]+); \
 classification.text=TFTP Session; \
 id=404; \
 revision=1; \
 analyzer(0).name=xinetd; \
 analyzer(0).class=Service; \
 assessment.impact.severity=low; \
 assessment.impact.completion=succeeded; \
 assessment.impact.type=user; \
 assessment.impact.description=A TFTP session was initiated; \
 source(0).node.address(0).category=ipv4-addr; \
 source(0).node.address(0).address=$2; \
 source(0).service.iana_protocol_name=udp; \
 source(0).service.iana_protocol_number=17; \
 target(0).service.port=69; \
 target(0).service.name=tftp; \
 target(0).service.iana_protocol_name=udp; \
 target(0).service.iana_protocol_number=17; \
 target(0).process.pid=$1; \
 last

#DESCRIPTION:P3Scan - Virus found
#CATEGORY:Malware
#LOG:Jun 14 05:38:52 oahu p3scan[5973]: '/var/spool/p3scan/children/5973/p3scan.Pu3u8g' contains a virus (Infection: W32/Zafi.B@mm)!
#LOG:Jul 13 19:44:44 localhost p3scan[529]: '/var/spool/p3scan/children/529/p3scan.ASA1Cl' contains a virus (Worm.Mytob.GH)!
regex='(\S+)' contains a virus \((Infection: )?(\S+)\); \
 classification.text=Virus found: $3; \
 id=405; \
 revision=2; \
 analyzer(0).name=P3Scan; \
 analyzer(0).manufacturer=p3scan.sourceforge.net; \
 analyzer(0).class=Antivirus; \
 assessment.impact.severity=high; \
 assessment.impact.type=file; \
 assessment.impact.completion=succeeded; \
 assessment.impact.description=A virus has been identified by P3Scan; \
 additional_data(0).type=string; \
 additional_data(0).meaning=File; \
 additional_data(0).data=$1; \
 last

#DESCRIPTION:Syslogd (startup|shutdown) succeeded
#CATEGORY:Service Management
#LOG:Jun 22 12:58:25 mail syslog: syslogd shutdown succeeded
#LOG:Jun 22 12:58:55 mail syslog: syslogd startup succeeded
regex=syslogd (startup|shutdown) succeeded; \
 classification.text=Syslog $1; \
 id=406; \
 revision=1; \
 analyzer(0).name=syslog; \
 analyzer(0).class=Service; \
 assessment.impact.severity=low; \
 assessment.impact.type=dos; \
 assessment.impact.completion=succeeded; \
 assessment.impact.description=The syslogd service reported a $1; \
 last

#DESCRIPTION:DLink Syslog - Packet denied
#CATEGORY:Packet Filtering
#LOG:Apr 11 19:59:02 penguin dlink-syslog[28178]: Apr/11/2005 14:26:01 Drop TCP packet from WAN 80.231.184.68:3685  12.34.56.78:17300 Rule: Default deny
#LOG:Apr 11 19:59:02 penguin dlink-syslog[28178]: Apr/11/2005 15:08:57 Drop UDP packet from WAN 218.83.153.58:54234  12.34.56.78:1026 Rule: Default deny
regex=Drop (TCP|UDP) packet from ([LW]AN) ([\d\.]+):(\d+)  ([\d\.]+):(\d+) Rule: (.+); \
 classification.text=Packet denied; \
 id=407; \
 revision=2; \
 analyzer(0).name=Wireless Router; \
 analyzer(0).manufacturer=D-Link; \
 analyzer(0).class=Firewall; \
 assessment.impact.severity=medium; \
 assessment.impact.description=A packet was dropped by D-Link rule "$7".; \
 source(0).interface=$2; \
 source(0).service.iana_protocol_name=$1; \
 source(0).node.address(0).category=ipv4-addr; \
 source(0).node.address(0).address=$3; \
 source(0).service.port=$4; \
 target(0).service.iana_protocol_name=$1; \
 target(0).node.address(0).category=ipv4-addr; \
 target(0).node.address(0).address=$5; \
 target(0).service.port=$6; \
 additional_data(0).type=string; \
 additional_data(0).meaning=ACL; \
 additional_data(0).data=$7; \
 last

#DESCRIPTION:Identd - Ident response issued
#CATEGORY:Authentication
#LOG:Apr 17 17:44:59 mail identd[27274]: reply to 82.96.64.2: 3937, 6667 : USERID : OTHER :[75PrAJ2FwE4EG1wv3UoKG55njQibNgOU]
regex=reply to ([\d\.]+): (\d+), (\d+) : USERID : \S+ :(.+); \
 classification.text=Ident response issued; \
 id=408; \
 revision=2; \
 analyzer(0).name=identd; \
 assessment.impact.severity=low; \
 assessment.impact.completion=succeeded; \
 assessment.impact.type=other; \
 assessment.impact.description=identd issued a response to $1.; \
 source(0).user.user_id(0).type=current-user; \
 source(0).user.user_id(0).name=$4; \
 target(0).node.address(0).category=ipv4-addr; \
 target(0).node.address(0).address=$1; \
 additional_data(0).type=integer; \
 additional_data(0).meaning=Ident session source port; \
 additional_data(0).data=$2; \
 additional_data(1).type=string; \
 additional_data(1).meaning=Ident session destination port; \
 additional_data(1).data=$3; \
 last

#DESCRIPTION:Systrace - Deny User
#CATEGORY:Authentication
#LOG:Apr 17 05:43:08 src@sphere systrace: deny user: neonman, prog: /usr/bin/groups, pid: 27090(7)[6914], policy: /usr/bin/groups, filters: 0, syscall: native-sigaction(46), args: 12
#LOG:Apr 17 05:43:08 src@sphere systrace: deny user: neonman, prog: /usr/bin/groups, pid: 27090(7)[6914], policy: /usr/bin/groups, filters: 0, syscall: native-kill(37), pidname: <unknown>, signame: SIGABRT
regex=deny user: (\S+), prog: (\D+), pid: \d+\(\d+\)\[(\d+)\], policy: (\S+) filters: (\d+), syscall: (\S+),; \
 classification.text=$4 attempt denied; \
 id=409; \
 revision=2; \
 analyzer(0).name=systrace; \
 assessment.impact.severity=medium; \
 assessment.impact.completion=failed; \
 assessment.impact.type=other; \
 assessment.impact.description=systrace blocked a $6 attempt against $2.; \
 source(0).user.user_id(0).type=current-user; \
 source(0).user.user_id(0).name=$1; \
 target(0).process.pid=$3; \
 target(0).process.name=$2; \
 additional_data(0).type=string; \
 additional_data(0).meaning=ACL; \
 additional_data(0).data=$4; \
 additional_data(1).type=integer; \
 additional_data(1).meaning=Filters; \
 additional_data(1).data=$5; \
 additional_data(2).type=string; \
 additional_data(2).meaning=System call; \
 additional_data(2).data=$6; \
 last

#DESCRIPTION:PureFTPD - Authentication failed
#CATEGORY:Authentication
#LOG:May 10 15:24:21 mighty pure-ftpd: (?@127.0.0.1) [WARNING] Authentication failed for user [asdfasdf]
regex=([\d\.]+)\) \[WARNING\] Authentication failed for user \[(.+)\]; \
 classification.text=FTP login; \
 id=410; \
 revision=2; \
 analyzer(0).name=PureFTPD; \
 analyzer(0).manufacturer=www.pureftpd.org; \
 analyzer(0).class=Service; \
 assessment.impact.completion=failed; \
 assessment.impact.type=user; \
 assessment.impact.severity=medium; \
 assessment.impact.description=Someone tried to login to your FTP server as a non-existant user '$2' but failed; \
 source(0).node.address(0).category=ipv4-addr; \
 source(0).node.address(0).address=$1; \
 source(0).service.iana_protocol_name=tcp; \
 source(0).service.iana_protocol_number=6; \
 target(0).service.port=21; \
 target(0).service.name=ftp; \
 target(0).service.iana_protocol_name=tcp; \
 target(0).service.iana_protocol_number=6; \
 target(0).user.user_id(0).type=target-user; \
 target(0).user.user_id(0).name=$2; \
 last

#DESCRIPTION:Yum - Package (Installed|Updated)
#CATEGORY:Update
#LOG:Oct 19 16:44:12 localhost yum: Installed: mysql-server.i386 4.1.20-1.RHEL4.1
#LOG:Oct 20 09:03:55 localhost yum: Updated: tzdata.noarch 2006m-2.el4
#LOG:Feb 17 11:37:36 Installed: python-lxml-3.0.1-1.rhel6.x86_64
#LOG:Feb 17 13:35:35 Installed: tree-1.5.3-2.el6.x86_64
#LOG:Feb 17 11:57:14 Updated: glibc-devel-2.12-1.149.el6_6.5.x86_64
#LOG:Feb 17 12:11:52 Updated: nss-softokn-freebl-3.14.3-22.el6_6.x86_64
regex=(Installed|Updated): (\S+)[-| ]([^-]*-[^-]*)$; \
 classification.text=Package $1; \
 id=411; \
 revision=1; \
 analyzer(0).name=yum; \
 analyzer(0).manufacturer=http://linux.duke.edu/projects/yum/; \
 analyzer(0).class=Package Manager; \
 assessment.impact.completion=succeeded; \
 assessment.impact.type=file; \
 assessment.impact.severity=low; \
 assessment.impact.description=The package $2 was $1 to version $3.; \
 additional_data(0).type=string; \
 additional_data(0).meaning=Package; \
 additional_data(0).data=$2; \
 additional_data(1).type=string; \
 additional_data(1).meaning=Package version; \
 additional_data(1).data=$3; \
 last

#DESCRIPTION:Yum - Package Erased
#CATEGORY:Update
#LOG:Oct 05 18:39:58 Erased: libreoffice-presenter-screen
#LOG:Nov 26 19:01:28 Erased: ossec-hids-server
regex=Erased: (\S+); \
 classification.text=Package Erased; \
 id=412; \
 revision=1; \
 analyzer(0).name=yum; \
 analyzer(0).manufacturer=http://linux.duke.edu/projects/yum/; \
 analyzer(0).class=Packet Manager; \
 assessment.impact.completion=succeeded; \
 assessment.impact.type=file; \
 assessment.impact.severity=low; \
 assessment.impact.description=The package $1 was Erased.; \
 additional_data(0).type=string; \
 additional_data(0).meaning=Package; \
 additional_data(0).data=$1; \
 last

#DESCRIPTION:Operating system halted
#CATEGORY:Monitoring
#LOG:Oct 13 14:27:36 CentOS shutdown[2142]: shutting down for system halt
regex=shutting down for system (?:halt|reboot); \
 id=414; \
 revision=1; \
 classification.text=Operating system halted; \
 assessment.impact.completion=succeeded; \
 assessment.impact.severity=info; \
 assessment.impact.type=other; \
 assessment.impact.description=An operating system has been halted; \
 last

#DESCRIPTION:Operating system started
#CATEGORY:Monitoring
#LOG:Nov  4 16:00:34 CentOS kernel: [    0.000000] Command line: BOOT_IMAGE=/vmlinuz-2.6.32.59-custom64.grsec.mediumsec+build-20120614193912 root=/dev/mapper/VG_Debian-LV--Root ro clocksource=acpi_pm quiet
regex=kernel: .*Command line: BOOT_IMAGE=; \
 id=415; \
 revision=1; \
 classification.text=Operating system started; \
 assessment.impact.completion=succeeded; \
 assessment.impact.severity=info; \
 assessment.impact.type=other; \
 assessment.impact.description=An operating system has been started; \
 last