|Latest Stable Release|
|Server – Linux/BSD||ossec-hids-2.7.1.tar.gz – Release Note||Checksum|
|Agent – Windows||ossec-agent-win32-2.7.1.exe||Checksum|
|Virtual Appliance||ossec-virtual-appliance.tar.gz – README||Checksum|
|Server 2.7 – Linux/BSD||ossec-hids-2.7.tar.gz – Release Note||Checksum|
|Agent 2.7 – Windows||ossec-agent-win32-2.7.exe||Checksum|
|Web UI 0.3||ossec-wui-0.3.tar.gz||Checksum – Sig|
|Server 2.6 – Linux/BSD||ossec-hids-2.6.tar.gz||Checksum – Sig|
|Agent 2.6 – Windows||ossec-agent-win32-2.6.exe||Checksum – Sig|
RPMs for RHEL, CentOS, Fedora and others
# wget -q -O - https://www.atomicorp.com/installers/atomic |sh
# yum install ossec-hids ossec-hids-server (or ossec-hids-client for the agent)
Before you install any package from our project, we recommend that you verify it using our PGP key. Follow these two steps if you are not used to using gpg. You first need to import our public key:
ossec-test# wget http://www.ossec.net/files/OSSEC-PGP-KEY.asc
ossec-test# gpg –import OSSEC-PGP-KEY.asc
And then verify each file against its signature:
ossec-test# gpg –verify file.sig file
You should get the following result:
gpg: Signature made Tue 19 Jul 2011 03:13:58 PM BRT using RSA key ID A3901351
gpg: Good signature from "Daniel B. Cid "
Primary key fingerprint: 6F11 9E06 487A AF17 C84C E48A 456B 17CF A390 1351
*Note that the key expiration date was changed lately. If you get an warning saying “gpg: Note: This key has expired!”, make sure to update the key and run the “import” command again (as specified above).
If you find ossec useful and would like to contribute back to the community, please contact us. We have a lot of work to do and any help is appreciated.