auth

This section shows the options for the registration service.

Options

disabled

Toggles the execution of the Auth daemon on or off.

Default value

no

Allowed values

yes, no

remote_enrollment

Allow listening for new agents on TLS port (1515 by default).

Default value

yes

Allowed values

yes, no

port

Defines the TCP port number for listening to connections.

Default value

1515

Allowed values

0 - 65535

ipv6

New in version 4.4.0.

Enables IPv6 support.

Default value

no

Allowed values

yes, no

use_source_ip

Toggles the use of the client's source IP address or the use of "any" to add an agent.

Default value

no

Allowed values

yes, no

force

The agent replacement options are configured inside this tag. All conditions must be satisfied to perform the replacement.

<force>
  <enabled>yes</enabled>
  <disconnected_time enabled="yes">1h</disconnected_time>
  <after_registration_time>1h</after_registration_time>
  <key_mismatch>yes</key_mismatch>
</force>

enabled

Toggles whether or not to force the insertion of an agent if there is a duplicate name or IP address. This will remove the old agent with the same name or IP address.

Default value

yes

Allowed values

yes, no

disconnected_time

This option, when enabled, specifies that the replacement will be performed only for agents that have been disconnected longer than the value configured in the setting. This option should be disabled to replace any agent regardless of its state.

Default value

1h

Allowed values

Any number greater than or equal to zero. Allowed suffixes (s, m, h, d).

Attributes:

enabled

Default value

yes

Allowed values

yes, no

Value no means to force replacement even for active agents.

Value 0 means to force the replacement of any disconnected agent.

after_registration_time

Specifies that the agent replacement will be performed only when the time passed since the agent registration is greater than the value configured in the setting.

Default value

1h

Allowed values

Any number greater than or equal to zero. Allowed suffixes (s, m, h, d).

Value 0 means to always force replacement.

key_mismatch

This option defines that the agent replacement occurs when the key held by the agent is different from the one registered by the manager.

Default value

yes

Allowed values

yes, no

purge

Toggles the deletion of client keys on or off when agents are removed.

Default value

yes

Allowed values

yes, no

When set to no, removed agents will remain in the client keys file marked as removed. When set to yes, the client keys file will be purged.

use_password

Toggles shared password authentication on or off.

Default value

no

Allowed values

yes, no

When enabled, the shared password will be read from the /var/ossec/etc/authd.pass file.

If this file does not exist, a random password will be generated.

ssl_agent_ca

Specifies the path to the CA certificate used to verify clients. It can be referred to a relative path under the ThreatLockDown installation directory or a full path.

Allowed values

Any valid path

ssl_verify_host

Toggles source host verification on and off when a CA certificate is specified. This means that the client source IP address will be validated using the Common Name field.

Default value

no

Allowed values

yes, no

ssl_manager_cert

Specifies the path to the server SSL certificate. It can be referred to a relative path under the ThreatLockDown installation directory or a full path.

Default value

etc/sslmanager.cert

Allowed values

Any valid path

ssl_manager_key

Specifies the path to the server's SSL key. It can be referred to a relative path under the ThreatLockDown installation directory or a full path.

Default value

etc/sslmanager.key

Allowed values

Any valid path

ssl_auto_negotiate

Toggles whether or not to auto select the SSL/TLS method.

Default value

no

Allowed values

yes, no

By default only TLS v1.2 is allowed. When set to yes the system will negotiate the most secure common method with the client.

In older systems, where the manager does not support TLS v1.2, this option will be enabled automatically.

ciphers

Sets the list of ciphers for network communication using SSL.

Default value

HIGH:!ADH:!EXP:!MD5:!RC4:!3DES:!CAMELLIA:@STRENGTH

The format of this parameter is described in SSL ciphers.

key_request

New in version 4.4.0.

The key request settings are configured inside this tag. Read more about this feature at agent key request.

<key_request>
  <enabled>yes</enabled>
  <exec_path>/usr/bin/python /home/script.py</exec_path>
  <socket>/path/to/socket</socket>
  <timeout>60</timeout>
  <threads>1</threads>
  <queue_size>1024</queue_size>
</key_request>

Configuration options of the key request feature.

enabled

Enable the key request.

Default value

no

Allowed values

yes, no

timeout

Maximum time for waiting a response from the executable.

Default value

60

Allowed values

A positive number in seconds

exec_path

Full path to the executable.

Default value

none

Allowed values

A string indicating the full path

socket

Full path to the Unix domain socket.

Default value

none

Allowed values

A string indicating the full path to a Unix domain socket

threads

Number of threads for dispatching the external keys requests.

Default value

1

Allowed values

A positive number indicating the number of threads [1..32]

queue_size

Indicates the maximum size of the queue for fetching external keys.

Default value

1024

Allowed values

A positive number indicating the queue size [1..220000]

agents

allow_higher_versions

New in version 4.6.0.

Accept agents with a later version than the current manager.

Default value

no

Allowed values

yes, no

Note

This option only works when connection is set to secure.

Default configuration

<auth>
  <disabled>no</disabled>
  <remote_enrollment>yes</remote_enrollment>
  <port>1515</port>
  <use_source_ip>no</use_source_ip>
  <force>
    <enabled>yes</enabled>
    <disconnected_time enabled="yes">1h</disconnected_time>
    <after_registration_time>1h</after_registration_time>
    <key_mismatch>yes</key_mismatch>
  </force>
  <purge>yes</purge>
  <use_password>no</use_password>
  <ciphers>HIGH:!ADH:!EXP:!MD5:!RC4:!3DES:!CAMELLIA:@STRENGTH</ciphers>
  <!-- <ssl_agent_ca></ssl_agent_ca> -->
  <ssl_verify_host>no</ssl_verify_host>
  <ssl_manager_cert>etc/sslmanager.cert</ssl_manager_cert>
  <ssl_manager_key>etc/sslmanager.key</ssl_manager_key>
  <ssl_auto_negotiate>no</ssl_auto_negotiate>
</auth>