-
Notifications
You must be signed in to change notification settings - Fork 99
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Wazuh manager with dynamic link installation path issue after upgrading to 4.3.x #1695
Comments
WorkaroundFind the ID of the
Find all users
I hope this could be helpful. |
Reproducing the issueThis issue was reproduced following the described steps above. First, we have a fresh CentOS 7 box where Wazuh has been uninstalled and all the groups and users were removed. passwd_content_pre_installroot:x:0:0:root:/root:/bin/bash
bin:x:1:1:bin:/bin:/sbin/nologin
daemon:x:2:2:daemon:/sbin:/sbin/nologin
adm:x:3:4:adm:/var/adm:/sbin/nologin
lp:x:4:7:lp:/var/spool/lpd:/sbin/nologin
sync:x:5:0:sync:/sbin:/bin/sync
shutdown:x:6:0:shutdown:/sbin:/sbin/shutdown
halt:x:7:0:halt:/sbin:/sbin/halt
mail:x:8:12:mail:/var/spool/mail:/sbin/nologin
operator:x:11:0:operator:/root:/sbin/nologin
games:x:12:100:games:/usr/games:/sbin/nologin
ftp:x:14:50:FTP User:/var/ftp:/sbin/nologin
nobody:x:99:99:Nobody:/:/sbin/nologin
systemd-network:x:192:192:systemd Network Management:/:/sbin/nologin
dbus:x:81:81:System message bus:/:/sbin/nologin
polkitd:x:999:998:User for polkitd:/:/sbin/nologin
rpc:x:32:32:Rpcbind Daemon:/var/lib/rpcbind:/sbin/nologin
tss:x:59:59:Account used by the trousers package to sandbox the tcsd daemon:/dev/null:/sbin/nologin
rpcuser:x:29:29:RPC Service User:/var/lib/nfs:/sbin/nologin
nfsnobody:x:65534:65534:Anonymous NFS User:/var/lib/nfs:/sbin/nologin
sshd:x:74:74:Privilege-separated SSH:/var/empty/sshd:/sbin/nologin
postfix:x:89:89::/var/spool/postfix:/sbin/nologin
chrony:x:998:995::/var/lib/chrony:/sbin/nologin
vagrant:x:1000:1000:vagrant:/home/vagrant:/bin/bash group_content_pre_installroot:x:0:
bin:x:1:
daemon:x:2:
sys:x:3:
adm:x:4:
tty:x:5:
disk:x:6:
lp:x:7:
mem:x:8:
kmem:x:9:
wheel:x:10:
cdrom:x:11:
mail:x:12:postfix
man:x:15:
dialout:x:18:
floppy:x:19:
games:x:20:
tape:x:33:
video:x:39:
ftp:x:50:
lock:x:54:
audio:x:63:
nobody:x:99:
users:x:100:
utmp:x:22:
utempter:x:35:
input:x:999:
systemd-journal:x:190:
systemd-network:x:192:
dbus:x:81:
polkitd:x:998:
rpc:x:32:
printadmin:x:997:
ssh_keys:x:996:
tss:x:59:
rpcuser:x:29:
nfsnobody:x:65534:
sshd:x:74:
postdrop:x:90:
postfix:x:89:
chrony:x:995:
vagrant:x:1000:vagrant Then a Wazuh v4.2.7 was installed using the debug mode for passwd_content_pre_upgraderoot:x:0:0:root:/root:/bin/bash
bin:x:1:1:bin:/bin:/sbin/nologin
daemon:x:2:2:daemon:/sbin:/sbin/nologin
adm:x:3:4:adm:/var/adm:/sbin/nologin
lp:x:4:7:lp:/var/spool/lpd:/sbin/nologin
sync:x:5:0:sync:/sbin:/bin/sync
shutdown:x:6:0:shutdown:/sbin:/sbin/shutdown
halt:x:7:0:halt:/sbin:/sbin/halt
mail:x:8:12:mail:/var/spool/mail:/sbin/nologin
operator:x:11:0:operator:/root:/sbin/nologin
games:x:12:100:games:/usr/games:/sbin/nologin
ftp:x:14:50:FTP User:/var/ftp:/sbin/nologin
nobody:x:99:99:Nobody:/:/sbin/nologin
systemd-network:x:192:192:systemd Network Management:/:/sbin/nologin
dbus:x:81:81:System message bus:/:/sbin/nologin
polkitd:x:999:998:User for polkitd:/:/sbin/nologin
rpc:x:32:32:Rpcbind Daemon:/var/lib/rpcbind:/sbin/nologin
tss:x:59:59:Account used by the trousers package to sandbox the tcsd daemon:/dev/null:/sbin/nologin
rpcuser:x:29:29:RPC Service User:/var/lib/nfs:/sbin/nologin
nfsnobody:x:65534:65534:Anonymous NFS User:/var/lib/nfs:/sbin/nologin
sshd:x:74:74:Privilege-separated SSH:/var/empty/sshd:/sbin/nologin
postfix:x:89:89::/var/spool/postfix:/sbin/nologin
chrony:x:998:995::/var/lib/chrony:/sbin/nologin
vagrant:x:1000:1000:vagrant:/home/vagrant:/bin/bash
ossec:x:997:994::/var/ossec:/sbin/nologin
ossecr:x:996:994::/var/ossec:/sbin/nologin
ossecm:x:995:994::/var/ossec:/sbin/nologin
group_content_pre_upgraderoot:x:0:
bin:x:1:
daemon:x:2:
sys:x:3:
adm:x:4:
tty:x:5:
disk:x:6:
lp:x:7:
mem:x:8:
kmem:x:9:
wheel:x:10:
cdrom:x:11:
mail:x:12:postfix
man:x:15:
dialout:x:18:
floppy:x:19:
games:x:20:
tape:x:33:
video:x:39:
ftp:x:50:
lock:x:54:
audio:x:63:
nobody:x:99:
users:x:100:
utmp:x:22:
utempter:x:35:
input:x:999:
systemd-journal:x:190:
systemd-network:x:192:
dbus:x:81:
polkitd:x:998:
rpc:x:32:
printadmin:x:997:
ssh_keys:x:996:
tss:x:59:
rpcuser:x:29:
nfsnobody:x:65534:
sshd:x:74:
postdrop:x:90:
postfix:x:89:
chrony:x:995:
vagrant:x:1000:vagrant
ossec:x:994:ossec,ossecr,ossecm
Finally, the Wazuh manager was upgraded to v4.3.5 using the debug mode for passwd_content_post_upgraderoot:x:0:0:root:/root:/bin/bash
bin:x:1:1:bin:/bin:/sbin/nologin
daemon:x:2:2:daemon:/sbin:/sbin/nologin
adm:x:3:4:adm:/var/adm:/sbin/nologin
lp:x:4:7:lp:/var/spool/lpd:/sbin/nologin
sync:x:5:0:sync:/sbin:/bin/sync
shutdown:x:6:0:shutdown:/sbin:/sbin/shutdown
halt:x:7:0:halt:/sbin:/sbin/halt
mail:x:8:12:mail:/var/spool/mail:/sbin/nologin
operator:x:11:0:operator:/root:/sbin/nologin
games:x:12:100:games:/usr/games:/sbin/nologin
ftp:x:14:50:FTP User:/var/ftp:/sbin/nologin
nobody:x:99:99:Nobody:/:/sbin/nologin
systemd-network:x:192:192:systemd Network Management:/:/sbin/nologin
dbus:x:81:81:System message bus:/:/sbin/nologin
polkitd:x:999:998:User for polkitd:/:/sbin/nologin
rpc:x:32:32:Rpcbind Daemon:/var/lib/rpcbind:/sbin/nologin
tss:x:59:59:Account used by the trousers package to sandbox the tcsd daemon:/dev/null:/sbin/nologin
rpcuser:x:29:29:RPC Service User:/var/lib/nfs:/sbin/nologin
nfsnobody:x:65534:65534:Anonymous NFS User:/var/lib/nfs:/sbin/nologin
sshd:x:74:74:Privilege-separated SSH:/var/empty/sshd:/sbin/nologin
postfix:x:89:89::/var/spool/postfix:/sbin/nologin
chrony:x:998:995::/var/lib/chrony:/sbin/nologin
vagrant:x:1000:1000:vagrant:/home/vagrant:/bin/bash
wazuh:x:994:993::/var/ossec:/sbin/nologin
group_content_post_upgraderoot:x:0:
bin:x:1:
daemon:x:2:
sys:x:3:
adm:x:4:
tty:x:5:
disk:x:6:
lp:x:7:
mem:x:8:
kmem:x:9:
wheel:x:10:
cdrom:x:11:
mail:x:12:postfix
man:x:15:
dialout:x:18:
floppy:x:19:
games:x:20:
tape:x:33:
video:x:39:
ftp:x:50:
lock:x:54:
audio:x:63:
nobody:x:99:
users:x:100:
utmp:x:22:
utempter:x:35:
input:x:999:
systemd-journal:x:190:
systemd-network:x:192:
dbus:x:81:
polkitd:x:998:
rpc:x:32:
printadmin:x:997:
ssh_keys:x:996:
tss:x:59:
rpcuser:x:29:
nfsnobody:x:65534:
sshd:x:74:
postdrop:x:90:
postfix:x:89:
chrony:x:995:
vagrant:x:1000:vagrant
ossec:x:994:
wazuh:x:993:wazuh
We can see in files_with_ossec_group_post_upgrade[root@localhost ossec]# find /var/ossec/ -group ossec -exec ls -l {} \;
-rw-r-----. 1 997 ossec 98304 Jun 23 21:06 /var/ossec/api/configuration/security/rbac.db
-rw-rw----. 1 997 ossec 19888 Jun 23 21:06 /var/ossec/etc/lists/amazon/aws-eventnames.cdb
-rw-rw----. 1 997 ossec 2265 Jun 23 21:06 /var/ossec/etc/lists/audit-keys.cdb
-rw-rw----. 1 997 ossec 6461 Jun 23 21:06 /var/ossec/etc/lists/security-eventchannel.cdb
-rw-rw----. 1 root ossec 9959 Jun 23 21:05 /var/ossec/etc/ossec.conf
-rw-rw----. 1 996 ossec 899420 Jun 23 21:15 /var/ossec/etc/shared/default/merged.mg
-rw-r-----. 2 997 ossec 327402 Jun 23 21:15 ossec-alerts-23.json
-rw-r-----. 2 997 ossec 544197 Jun 23 21:15 ossec-alerts-23.log
-rw-r-----. 2 997 ossec 544197 Jun 23 21:15 /var/ossec/logs/alerts/2022/Jun/ossec-alerts-23.log
-rw-r-----. 2 997 ossec 327402 Jun 23 21:15 /var/ossec/logs/alerts/2022/Jun/ossec-alerts-23.json
-rw-r-----. 2 997 ossec 544197 Jun 23 21:15 /var/ossec/logs/alerts/alerts.log
-rw-r-----. 2 997 ossec 327402 Jun 23 21:15 /var/ossec/logs/alerts/alerts.json
-rw-r-----. 2 997 ossec 0 Jun 23 21:06 ossec-archive-23.log
-rw-r-----. 2 997 ossec 0 Jun 23 21:06 /var/ossec/logs/archives/2022/Jun/ossec-archive-23.log
-rw-r-----. 2 997 ossec 0 Jun 23 21:06 /var/ossec/logs/archives/archives.log
-rw-r-----. 2 997 ossec 0 Jun 23 21:06 ossec-firewall-23.log
-rw-r-----. 2 997 ossec 0 Jun 23 21:06 /var/ossec/logs/firewall/2022/Jun/ossec-firewall-23.log
-rw-r-----. 2 997 ossec 0 Jun 23 21:06 /var/ossec/logs/firewall/firewall.log
-rw-rw----. 1 997 ossec 0 Jun 23 21:05 /var/ossec/logs/active-responses.log
-rw-r-----. 1 995 ossec 0 Jun 23 21:05 /var/ossec/logs/integrations.log
-rw-rw----. 1 root ossec 15367 Jun 23 21:16 /var/ossec/logs/ossec.log
srw-rw----. 1 root ossec 0 Jun 23 21:07 /var/ossec/queue/alerts/execq
srw-rw----. 1 996 ossec 0 Jun 23 21:07 /var/ossec/queue/alerts/cfgarq
srw-rw----. 1 996 ossec 0 Jun 23 21:07 /var/ossec/queue/alerts/ar
srw-rw----. 1 root ossec 0 Jun 23 21:07 /var/ossec/queue/alerts/cfgaq
-rw-r-----. 1 997 ossec 2351104 Jun 23 21:13 /var/ossec/queue/db/000.db
-rw-r-----. 1 997 ossec 913 Jun 23 21:13 last-entry
-rw-r-----. 1 997 ossec 913 Jun 23 21:13 /var/ossec/queue/diff/localhost/535/last-entry
-rw-rw----. 1 root ossec 1482752 Jun 23 21:10 /var/ossec/queue/fim/db/fim.db
-rw-rw----. 1 root ossec 0 Jun 23 21:10 /var/ossec/queue/fim/db/fim.db-journal
-rw-r-----. 1 997 ossec 0 Jun 23 21:06 /var/ossec/queue/fts/hostinfo
-rw-r-----. 1 997 ossec 0 Jun 23 21:06 /var/ossec/queue/fts/fts-queue
-rw-r-----. 1 997 ossec 0 Jun 23 21:06 /var/ossec/queue/fts/ig-queue
-rw-r--r--. 1 root ossec 507 Jun 23 21:15 /var/ossec/queue/logcollector/file_status.json
-rw-r--r--. 1 996 ossec 0 Jun 23 21:06 /var/ossec/queue/rids/sender_counter
srw-rw----. 1 root ossec 0 Jun 23 21:07 /var/ossec/queue/sockets/auth
srw-rw----. 1 root ossec 0 Jun 23 21:07 /var/ossec/queue/sockets/com
srw-rw----. 1 997 ossec 0 Jun 23 21:07 /var/ossec/queue/sockets/queue
srw-rw----. 1 root ossec 0 Jun 23 21:07 /var/ossec/queue/sockets/syscheck
srw-rw----. 1 997 ossec 0 Jun 23 21:07 /var/ossec/queue/sockets/analysis
srw-rw----. 1 997 ossec 0 Jun 23 21:07 /var/ossec/queue/sockets/logtest
srw-rw----. 1 996 ossec 0 Jun 23 21:07 /var/ossec/queue/sockets/request
srw-rw----. 1 root ossec 0 Jun 23 21:07 /var/ossec/queue/sockets/logcollector
srw-rw----. 1 root ossec 0 Jun 23 21:07 /var/ossec/queue/sockets/download
srw-rw----. 1 root ossec 0 Jun 23 21:07 /var/ossec/queue/sockets/wmodules
srw-rw----. 1 root ossec 0 Jun 23 21:07 /var/ossec/queue/sockets/control
srw-rw----. 1 997 ossec 0 Jun 23 21:07 /var/ossec/queue/sockets/monitor
-rw-r--r--. 1 root ossec 151552 Jun 23 21:07 /var/ossec/queue/syscollector/db/local.db
-rw-r-----. 1 997 ossec 57344 Jun 23 21:06 /var/ossec/queue/tasks/tasks.db
srw-rw----. 1 root ossec 0 Jun 23 21:07 /var/ossec/queue/tasks/upgrade
srw-rw----. 1 root ossec 0 Jun 23 21:07 /var/ossec/queue/tasks/task
-rw-------. 1 root ossec 0 Jun 23 21:15 /var/ossec/queue/agents-timestamp files_with_ossec_user_post_upgrade[root@localhost ossec]# find /var/ossec/ -user 997 -exec ls -l {} \;
-rw-r-----. 1 997 ossec 98304 Jun 23 21:06 /var/ossec/api/configuration/security/rbac.db
-rw-rw----. 1 997 ossec 19888 Jun 23 21:06 /var/ossec/etc/lists/amazon/aws-eventnames.cdb
-rw-rw----. 1 997 ossec 2265 Jun 23 21:06 /var/ossec/etc/lists/audit-keys.cdb
-rw-rw----. 1 997 ossec 6461 Jun 23 21:06 /var/ossec/etc/lists/security-eventchannel.cdb
-rw-r-----. 2 997 ossec 327402 Jun 23 21:15 ossec-alerts-23.json
-rw-r-----. 2 997 ossec 544197 Jun 23 21:15 ossec-alerts-23.log
-rw-r-----. 2 997 ossec 544197 Jun 23 21:15 /var/ossec/logs/alerts/2022/Jun/ossec-alerts-23.log
-rw-r-----. 2 997 ossec 327402 Jun 23 21:15 /var/ossec/logs/alerts/2022/Jun/ossec-alerts-23.json
-rw-r-----. 2 997 ossec 544197 Jun 23 21:15 /var/ossec/logs/alerts/alerts.log
-rw-r-----. 2 997 ossec 327402 Jun 23 21:15 /var/ossec/logs/alerts/alerts.json
-rw-r-----. 2 997 ossec 0 Jun 23 21:06 ossec-archive-23.log
-rw-r-----. 2 997 ossec 0 Jun 23 21:06 /var/ossec/logs/archives/2022/Jun/ossec-archive-23.log
-rw-r-----. 2 997 ossec 0 Jun 23 21:06 /var/ossec/logs/archives/archives.log
-rw-r-----. 2 997 ossec 0 Jun 23 21:06 ossec-firewall-23.log
-rw-r-----. 2 997 ossec 0 Jun 23 21:06 /var/ossec/logs/firewall/2022/Jun/ossec-firewall-23.log
-rw-r-----. 2 997 ossec 0 Jun 23 21:06 /var/ossec/logs/firewall/firewall.log
-rw-rw----. 1 997 ossec 0 Jun 23 21:05 /var/ossec/logs/active-responses.log
-rw-r-----. 1 997 ossec 2351104 Jun 23 21:13 /var/ossec/queue/db/000.db
-rw-r-----. 1 997 ossec 913 Jun 23 21:13 last-entry
-rw-r-----. 1 997 ossec 913 Jun 23 21:13 /var/ossec/queue/diff/localhost/535/last-entry
-rw-r-----. 1 997 ossec 0 Jun 23 21:06 /var/ossec/queue/fts/hostinfo
-rw-r-----. 1 997 ossec 0 Jun 23 21:06 /var/ossec/queue/fts/fts-queue
-rw-r-----. 1 997 ossec 0 Jun 23 21:06 /var/ossec/queue/fts/ig-queue
srw-rw----. 1 997 ossec 0 Jun 23 21:07 /var/ossec/queue/sockets/queue
srw-rw----. 1 997 ossec 0 Jun 23 21:07 /var/ossec/queue/sockets/analysis
srw-rw----. 1 997 ossec 0 Jun 23 21:07 /var/ossec/queue/sockets/logtest
srw-rw----. 1 997 ossec 0 Jun 23 21:07 /var/ossec/queue/sockets/monitor
-rw-r-----. 1 997 ossec 57344 Jun 23 21:06 /var/ossec/queue/tasks/tasks.db Root cause analysisThese changes were introduced in #716: Change default user and group. Upgrade fails when using symbolic linksThis happens because the upgrade script runs the find commands in the following way: the line
Is translated to
But This is described here https://pubs.opengroup.org/onlinepubs/9699919799/xrat/V4_xbd_chap03.html#tag_21_03_00_59 ossec group isn't removed after the upgradeThis happens because there is a bug in the SPECS file for rpm (all distributions should be checked). wazuh-packages/rpms/SPECS/wazuh-manager.spec Lines 459 to 461 in 1cf85f1
But the correct expression to verify the existence of the group should be wazuh-packages/rpms/SPECS/wazuh-manager.spec Line 445 in 1cf85f1
|
Update
Tests
|
TestingBuild packageshttps://ci.wazuh.info/job/Packages_builder_tier/2238/ Test Installhttps://ci.wazuh.info/job/Test_install_tier/ Solaris11
AIX
Test upgradehttps://ci.wazuh.info/job/Test_upgrade_tier/1984/ Solaris11
AIX
Upgrade with symlinksRPM manager
RPM agent
DEB manager
DEB agent
AIX
Solaris11
|
Description
Hello Team,
I am having this issue after upgrading the Wazuh Manager from any 4.2.x version:
Steps to reproduce
/var/ossec
folder to the mount pointEvidences
Configuration:
Misconfigurations
Conclusion
It seems the use of a symbolic link for the Wazuh Manager folder it breaks the ownership of the files when upgrading.
The text was updated successfully, but these errors were encountered: