Skip to content

Conversation

@kamil-certat
Copy link
Contributor

Severity is expected in IntelMQ for a long time and partially, it's already used by e.g. ShadowServer reports. This implementation is based on their understanding of the field, but with explicit mentioning that operators could adjust it based on their knowledge.

This is not intended to be an ultimate severity classification, but a help for first triage of received events.

As the topic has already been discussed in #2365, I do not open a separated IEP for that. The discussion didn't have a clear outcome, but since then the severity information from Shadowserver has already been implemented and is in use by at least some IntelMQ instances. Implementing it in the default IDF helps wider adoption and prioritisation.

Compatibility: as no bot uses the field by default at the moment, there is no incompatibility risk if the local operator uses modified IDF schema or stores all data in e.g. SQL database. To prevent issues, until the next major release the official bots using the field should fall back to extra.<field name> if the field does not exist in the local IDF.

Close #2365

@kamil-certat kamil-certat requested a review from sebix March 3, 2025 14:52
@kamil-certat kamil-certat requested a review from aaronkaplan March 3, 2025 15:02
@sebix sebix added this to the 3.4.0 milestone Mar 3, 2025
Copy link
Member

@sebix sebix left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

  • missing documentation in docs/user/event.md
  • missing documentation in NEWS.md

@sebix
Copy link
Member

sebix commented Mar 7, 2025

Upgrade function in intelmq/lib/upgrades to update the harmonization.conf is missing too

@kamil-certat
Copy link
Contributor Author

@sebix What would you like to add to event.md? This file is generated by this script: https://github.com/certtools/intelmq/blob/aadc8870d95f3d690ae60982b2ea01600daf2a54/scripts/generate-event-docs.py and will be automatically updated based on the harmonisation definition

Copy link
Member

@sebix sebix left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Looks good now, thanks

@sebix
Copy link
Member

sebix commented Apr 29, 2025

@aaronkaplan Do you want to review this before merging?

@sebix sebix added the feature Indicates new feature requests or new features label Aug 18, 2025
@sebix sebix modified the milestones: 3.6.0, 3.5.0 Feature Release Aug 20, 2025
Copy link
Member

@aaronkaplan aaronkaplan left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

renameing v341 -> v342

@sebix
Copy link
Member

sebix commented Aug 25, 2025

Rebased on develop, but the version numbers in the upgrade function makes no sense

@aaronkaplan
Copy link
Member

okay, @sebix would it be a disaster if we leave the ver numbers now as is and merge?

@sebix
Copy link
Member

sebix commented Aug 26, 2025

okay, @sebix would it be a disaster if we leave the ver numbers now as is and merge?

kind of, yes. the version numbers are used by the upgrade function in intelmqctl, which writes the numbering and function names to the state file. leaving wrong numbers where would lead to confusion in the support and when debugging stuff

@sebix
Copy link
Member

sebix commented Aug 29, 2025

@aaronkaplan this PR is waiting for your approval

Copy link
Member

@aaronkaplan aaronkaplan left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

looks good. I wonder if we should not document it also in docs.

And here is the definiton that shadowserver has:

critical (typically for highly critical vulnerabilities that are being actively exploited, where failure to remediate poses a very high likelyhood of compromise. typically for RCE or changing or extracting sensitive data)

high (end of life systems, internal systems that you can log into with authentication that are meant to be internal (SMB, RDP), some data can be leaked. Drones/sinkhole events end up in this category)

medium (risk of participating in DDoS, unencrypted services requiring login, vulnerabilities requiring MITM to exploit, attacker will need to know internal systems/infrastructure in order to exploit it)

low (deviation from best practice - little to no practical way to exploit, but setup is not ideal)

info (Informational only, no concerns whatsoever)

@sebix
Copy link
Member

sebix commented Oct 24, 2025

looks good. I wonder if we should not document it also in docs.

All possible fields of an event are documented in https://docs.intelmq.org/latest/user/event/

It is generated at doc build time.

I added the severity level explanations/examples to the harmonization.conf (and thus to the docs).

Result:

image

Copy link
Member

@aaronkaplan aaronkaplan left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

thanks

kamil-certat and others added 3 commits October 24, 2025 10:23
Severity is expected in IntelMQ for a long time and partially, it's
already used by e.g. ShadowServer reports. This implementation is
based on their understanding of the field, but with explicit
mentioning that operators could adjust it based on their knowledge.

This is not intended to be an ultimate severity classification,
but a help for first triage of recived events.

Close certtools#2365
Co-authored-by: Sebastian <[email protected]>
update first
noninteractive apt call
@sebix sebix merged commit f712bc6 into certtools:develop Oct 24, 2025
20 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

data-format feature Indicates new feature requests or new features

Projects

None yet

Development

Successfully merging this pull request may close these issues.

Needed in the IDF (intelmq data format): severity

3 participants