From 8e5f1da414a06ae6a577e5e16e501e260269aca1 Mon Sep 17 00:00:00 2001
From: Pawel Krawczyk
Date: Thu, 8 Jan 2015 23:51:24 +0000
Subject: [PATCH] add OpenWRT documentation
---
README.md | 15 +++++++++++++++
1 file changed, 15 insertions(+)
diff --git a/README.md b/README.md
index 3ba59e1..9f2dce7 100644
--- a/README.md
+++ b/README.md
@@ -84,6 +84,21 @@ Example OSSEC configuration:
5720
+Another script `router-drop.sh` will perform the same action on a remote router over SSH. This is useful in case of embedded routers where OSSEC agent installation is unfeasibile. OpenWRT logs (over syslog) to a more powerful Linux box with OSSEC installed. On alerts the active response script installed that blocks uoffending IP addresses on the router:
+
+```
+ +---------+ ----- syslog -------> +-------+
+--| OpenWRT | | Linux |
+ | | | OSSEC |
+ +---------+ <- active response -- +-------+
+
+```
+
+The `router-drop.sh` script requires two configuration steps:
+
+* configure the `ROUTER` variable to a SSH string for root login to the router (e.g. *root@gw.example.com*)
+* install SSH keys to actually log in; the keys need to be installed on root account as this is where active response script are running
+
## Samples
Number of blacklisted IP addresses: