[1] | 1 | .TH SAMHAINRC 5 "Jul 29, 2004" "" "samhainrc manual"
|
---|
| 2 | .SH NAME
|
---|
| 3 | samhainrc \- samhain(8) configuration file
|
---|
| 4 |
|
---|
| 5 | .SH WARNING
|
---|
| 6 | .PP
|
---|
| 7 | The information in this man page is not always up to date.
|
---|
| 8 | The authoritative documentation is the user manual.
|
---|
| 9 |
|
---|
| 10 | .SH DESCRIPTION
|
---|
| 11 | .PP
|
---|
| 12 | The configuration file for
|
---|
| 13 | .BR samhain (8)
|
---|
| 14 | is named
|
---|
| 15 | .I samhainrc
|
---|
| 16 | and located in
|
---|
| 17 | .I /etc
|
---|
| 18 | by default.
|
---|
| 19 | .PP
|
---|
| 20 | It contains several sections, indicated by headings in square brackets.
|
---|
| 21 | Each section may hold zero or more
|
---|
| 22 | .BI key= value
|
---|
| 23 | pairs. Blank lines and lines starting with '#' are comments.
|
---|
| 24 | Everything before the first section and after an
|
---|
| 25 | .I "[EOF]"
|
---|
| 26 | is ignored. The file may be (clear text) signed by PGP/GnuPG, and
|
---|
| 27 | .B samhain
|
---|
| 28 | may invoke GnuPG to check the signature
|
---|
| 29 | if compiled with support for it.
|
---|
| 30 | .PP
|
---|
| 31 | Conditional inclusion of entries for some host(s) is
|
---|
| 32 | supported via any number of
|
---|
| 33 | .BI @ hostname /@ end
|
---|
| 34 | directives.
|
---|
| 35 | .BI @ hostname
|
---|
| 36 | and
|
---|
| 37 | .BI @ end
|
---|
| 38 | must each be on separate lines. Lines in between will only be
|
---|
| 39 | read if
|
---|
| 40 | .I "hostname"
|
---|
| 41 | (which may be a regular expression) matches the local host.
|
---|
| 42 | .PP
|
---|
| 43 | Likewise, conditional inclusion of entries based on system type is
|
---|
| 44 | supported via any number of
|
---|
| 45 | .BI $ sysname:release:machine /$ end
|
---|
| 46 | directives.
|
---|
| 47 | .br
|
---|
| 48 | .I "sysname:release:machine"
|
---|
| 49 | can be inferred from
|
---|
| 50 | .I "uname -srm"
|
---|
| 51 | and may be a regular expression.
|
---|
| 52 | .PP
|
---|
| 53 | Filenames/directories to check may be wildcard patterns.
|
---|
| 54 | .PP
|
---|
| 55 | Options given on the command line will override
|
---|
| 56 | those in the configuration file.
|
---|
| 57 | The recognized sections in the configuration file are as follows:
|
---|
| 58 | .PP
|
---|
| 59 | Boolean options can be set with any of 1|true|yes or 0|false|no.
|
---|
| 60 | .TP
|
---|
| 61 | .I "[ReadOnly]"
|
---|
| 62 | This section may contain
|
---|
| 63 | .br
|
---|
| 64 | .BI file= PATH
|
---|
| 65 | and
|
---|
| 66 | .br
|
---|
| 67 | .BI dir= [depth]PATH
|
---|
| 68 | entries for files and directories to check. All modifications except access
|
---|
| 69 | times will be reported for these files.
|
---|
| 70 | .I [depth] (use without brackets)
|
---|
| 71 | is an optional parameter to define a per\-directory recursion
|
---|
| 72 | depth.
|
---|
| 73 | .TP
|
---|
| 74 | .I "[LogFiles]"
|
---|
| 75 | As above, but modifications of timestamps, file size, and signature will
|
---|
| 76 | be ignored.
|
---|
| 77 | .TP
|
---|
| 78 | .I "[GrowingLogFiles]"
|
---|
| 79 | As above, but modifications of file size will only be ignored if the size has
|
---|
| 80 | .IR increased .
|
---|
| 81 | .TP
|
---|
| 82 | .I "[Attributes]"
|
---|
| 83 | As above, but only modifications of ownership and access permissions
|
---|
| 84 | will be checked.
|
---|
| 85 | .TP
|
---|
| 86 | .I "[IgnoreAll]"
|
---|
| 87 | As above, but report no modifications for
|
---|
| 88 | these files/directories. Access failures
|
---|
| 89 | will still be reported.
|
---|
| 90 | .TP
|
---|
| 91 | .I "[IgnoreNone]"
|
---|
| 92 | As above, but report all modifications for these files/directories,
|
---|
| 93 | including access time.
|
---|
| 94 | .TP
|
---|
| 95 | .I "[User0]"
|
---|
| 96 | .TP
|
---|
| 97 | .I "[User1]"
|
---|
[27] | 98 | .TP
|
---|
| 99 | .I "[User2]"
|
---|
| 100 | .TP
|
---|
| 101 | .I "[User3]"
|
---|
| 102 | .TP
|
---|
| 103 | .I "[User4]"
|
---|
[1] | 104 | These are reserved for user-defined policies.
|
---|
| 105 | .TP
|
---|
| 106 | .I "[Prelink]"
|
---|
| 107 | For prelinked executables / libraries or directories holding them.
|
---|
| 108 | .TP
|
---|
| 109 | .I "[Log]"
|
---|
| 110 | This section defines the filtering rules for logging.
|
---|
| 111 | It may contain the following entries:
|
---|
| 112 | .br
|
---|
| 113 | .BI MailSeverity= val
|
---|
| 114 | where the threshold value
|
---|
| 115 | .I val
|
---|
| 116 | may be one of
|
---|
| 117 | .IR debug ,
|
---|
| 118 | .IR info ,
|
---|
| 119 | .IR notice ,
|
---|
| 120 | .IR warn ,
|
---|
| 121 | .IR mark ,
|
---|
| 122 | .IR err ,
|
---|
| 123 | .IR crit ,
|
---|
| 124 | .IR alert ,
|
---|
| 125 | or
|
---|
| 126 | .IR none .
|
---|
| 127 | By default, everything equal to and above the threshold will be logged.
|
---|
| 128 | The specifiers
|
---|
| 129 | .IR * ,
|
---|
| 130 | .IR ! ,
|
---|
| 131 | and
|
---|
| 132 | .I =
|
---|
| 133 | are interpreted as 'all', 'all but', and 'only', respectively (like
|
---|
| 134 | in the Linux version of syslogd(8)).
|
---|
| 135 | Time stamps have the priority
|
---|
| 136 | .IR warn ,
|
---|
| 137 | system\-level errors have the priority
|
---|
| 138 | .IR err ,
|
---|
| 139 | and important start\-up messages the priority
|
---|
| 140 | .IR alert .
|
---|
| 141 | The signature key for the log file will never be logged to syslog or the
|
---|
| 142 | log file itself.
|
---|
| 143 | For failures to verify file integrity, error levels are defined
|
---|
| 144 | in the next section.
|
---|
| 145 | .br
|
---|
| 146 | .BI PrintSeverity= val,
|
---|
| 147 | .br
|
---|
| 148 | .BI LogSeverity= val,
|
---|
| 149 | .br
|
---|
| 150 | .BI ExportSeverity= val,
|
---|
| 151 | .br
|
---|
| 152 | .BI ExternalSeverity= val,
|
---|
| 153 | .br
|
---|
| 154 | .BI PreludeSeverity= val,
|
---|
| 155 | .br
|
---|
| 156 | .BI DatabaseSeverity= val,
|
---|
| 157 | and
|
---|
| 158 | .br
|
---|
| 159 | .BI SyslogSeverity= val
|
---|
| 160 | set the thresholds for logging via stdout (or
|
---|
| 161 | .IR /dev/console ),
|
---|
| 162 | log file, TCP forwarding, calling external programs,
|
---|
| 163 | and
|
---|
| 164 | .BR syslog (3).
|
---|
| 165 | .TP
|
---|
| 166 | .I "[EventSeverity]"
|
---|
| 167 | .BI SeverityReadOnly= val,
|
---|
| 168 | .br
|
---|
| 169 | .BI SeverityLogFiles= val,
|
---|
| 170 | .br
|
---|
| 171 | .BI SeverityGrowingLogs= val,
|
---|
| 172 | .br
|
---|
| 173 | .BI SeverityIgnoreNone= val,
|
---|
| 174 | .br
|
---|
| 175 | .BI SeverityIgnoreAll= val,
|
---|
| 176 | .br
|
---|
| 177 | .BI SeverityPrelink= val,
|
---|
| 178 | .br
|
---|
| 179 | .BI SeverityUser0= val,
|
---|
[27] | 180 | .br
|
---|
| 181 | .BI SeverityUser1= val,
|
---|
| 182 | .br
|
---|
| 183 | .BI SeverityUser2= val,
|
---|
| 184 | .br
|
---|
| 185 | .BI SeverityUser3= val,
|
---|
[1] | 186 | and
|
---|
| 187 | .br
|
---|
[27] | 188 | .BI SeverityUser4= val
|
---|
[1] | 189 | define the error levels for failures to verify the integrity of
|
---|
| 190 | files/directories of the respective types. I.e. if such a file shows
|
---|
| 191 | unexpected modifications, an error of level
|
---|
| 192 | .I val
|
---|
| 193 | will be generated, and logged to all facilities with a threshold of at least
|
---|
| 194 | .IR val .
|
---|
| 195 | .br
|
---|
| 196 | .BI SeverityFiles= val
|
---|
| 197 | sets the error level for file access problems, and
|
---|
| 198 | .br
|
---|
| 199 | .BI SeverityDirs= val
|
---|
| 200 | for directory access problems.
|
---|
| 201 | .br
|
---|
| 202 | .BI SeverityNames= val
|
---|
| 203 | sets the error level for obscure file names
|
---|
| 204 | (e.g. non\-printable characters), and for files
|
---|
| 205 | with invalid UIDs/GIDs.
|
---|
| 206 | .TP
|
---|
| 207 | .I "[External]"
|
---|
| 208 | .BI OpenCommand= path
|
---|
| 209 | Start the definition of an external logging program|script.
|
---|
| 210 | .br
|
---|
| 211 | .BI SetType= log|srv
|
---|
| 212 | Type/purpose of program (log for logging).
|
---|
| 213 | .br
|
---|
| 214 | .BI SetCommandline= list
|
---|
| 215 | Command line options.
|
---|
| 216 | .br
|
---|
| 217 | .BI SetEnviron= KEY=val
|
---|
| 218 | Environment for external program.
|
---|
| 219 | .br
|
---|
| 220 | .BI SetChecksum= val
|
---|
| 221 | Checksum of the external program (checked before invoking).
|
---|
| 222 | .br
|
---|
| 223 | .BI SetCredentials= username
|
---|
| 224 | User as who the program will run.
|
---|
| 225 | .br
|
---|
| 226 | .BI SetFilterNot= list
|
---|
| 227 | Words not allowed in message.
|
---|
| 228 | .br
|
---|
| 229 | .BI SetFilterAnd= list
|
---|
| 230 | Words required (ALL) in message.
|
---|
| 231 | .br
|
---|
| 232 | .BI SetFilterOr= list
|
---|
| 233 | Words required (at least one) in message.
|
---|
| 234 | .br
|
---|
| 235 | .BI SetDeadtime= seconds
|
---|
| 236 | Time between consecutive calls.
|
---|
| 237 | .TP
|
---|
| 238 | .I "[Utmp]"
|
---|
| 239 | Configuration for watching login/logout events.
|
---|
| 240 | .br
|
---|
| 241 | .BI LoginCheckActive= 0|1
|
---|
| 242 | Switch off/on login/logout reporting.
|
---|
| 243 | .br
|
---|
| 244 | .BI LoginCheckInterval= val
|
---|
| 245 | Interval (seconds) between checks for login/logout events.
|
---|
| 246 | .br
|
---|
| 247 | .BI SeverityLogin= val
|
---|
| 248 | .br
|
---|
| 249 | .BI SeverityLoginMulti= val
|
---|
| 250 | .br
|
---|
| 251 | .BI SeverityLogout= val
|
---|
| 252 | Severity levels for logins, multiple logins
|
---|
| 253 | by same user, and logouts.
|
---|
| 254 | .TP
|
---|
| 255 | .I "[Kernel]"
|
---|
| 256 | Configuration for detecting kernel rootkits.
|
---|
| 257 | .br
|
---|
| 258 | .BI KernelCheckActive= 0|1
|
---|
| 259 | Switch off/on checking of kernel syscalls to detect kernel module rootkits.
|
---|
| 260 | .br
|
---|
| 261 | .BI KernelCheckInterval= val
|
---|
| 262 | Interval (seconds) between checks.
|
---|
| 263 | .br
|
---|
| 264 | .BI SeverityKernel= val
|
---|
| 265 | Severity level for clobbered kernel syscalls.
|
---|
| 266 | .br
|
---|
| 267 | .BI KernelCheckIDT= 0|1
|
---|
| 268 | Whether to check the interrrupt descriptor table.
|
---|
| 269 | .br
|
---|
| 270 | .BI KernelSystemCall= address
|
---|
| 271 | The address of system_call (grep system_call System.map).
|
---|
| 272 | Required after a kernel update.
|
---|
| 273 | .br
|
---|
| 274 | .BI KernelProcRoot= address
|
---|
| 275 | The address of proc_root (grep ' proc_root$' System.map).
|
---|
| 276 | Required after a kernel update.
|
---|
| 277 | .br
|
---|
| 278 | .BI KernelProcRootIops= address
|
---|
| 279 | The address of proc_root_inode_operations
|
---|
| 280 | (grep proc_root_inode_operations System.map).
|
---|
| 281 | Required after a kernel update.
|
---|
| 282 | .br
|
---|
| 283 | .BI KernelProcRootLookup= address
|
---|
| 284 | The address of proc_root_lookup (grep proc_root_lookup System.map).
|
---|
| 285 | Required after a kernel update.
|
---|
| 286 | .TP
|
---|
| 287 | .I "[SuidCheck]"
|
---|
| 288 | Settings for finding SUID/SGID files on disk.
|
---|
| 289 | .br
|
---|
| 290 | .BI SuidCheckActive= 0|1
|
---|
| 291 | Switch off/on the check.
|
---|
| 292 | .br
|
---|
| 293 | .BI SuidCheckExclude= path
|
---|
| 294 | A directory (and its subdirectories)
|
---|
| 295 | to exclude from the check. Only one directory can be specified this way.
|
---|
| 296 | .br
|
---|
| 297 | .BI SuidCheckSchedule= schedule
|
---|
| 298 | Crontab-like schedule for checks.
|
---|
| 299 | .br
|
---|
| 300 | .BI SeveritySuidCheck= severity
|
---|
| 301 | Severity for events.
|
---|
| 302 | .br
|
---|
| 303 | .BI SuidCheckFps= fps
|
---|
| 304 | Limit files per seconds for SUID check.
|
---|
| 305 | .TP
|
---|
| 306 | .I "[Database]"
|
---|
| 307 | Settings for
|
---|
| 308 | .I logging
|
---|
| 309 | to a database.
|
---|
| 310 | .br
|
---|
| 311 | .BI SetDBHost= db_host
|
---|
| 312 | Host where the DB server runs (default: localhost).
|
---|
| 313 | Should be a numeric IP address for PostgreSQL.
|
---|
| 314 | .br
|
---|
| 315 | .BI SetDBName= db_name
|
---|
| 316 | Name of the database (default: samhain).
|
---|
| 317 | .br
|
---|
| 318 | .BI SetDBTable= db_table
|
---|
| 319 | Name of the database table (default: log).
|
---|
| 320 | .br
|
---|
| 321 | .BI SetDBUser= db_user
|
---|
| 322 | Connect as this user (default: samhain).
|
---|
| 323 | .br
|
---|
| 324 | .BI SetDBPassword= db_password
|
---|
| 325 | Use this password (default: none).
|
---|
| 326 | .br
|
---|
| 327 | .BI SetDBServerTstamp= true|false
|
---|
| 328 | Log server timestamp for client messages (default: true).
|
---|
| 329 | .br
|
---|
| 330 | .BI UsePersistent= true|false
|
---|
| 331 | Use a persistent connection (default: true).
|
---|
| 332 | .TP
|
---|
| 333 | .I "[Misc]"
|
---|
| 334 | .BI Daemon= no|yes
|
---|
| 335 | Detach from controlling terminal to become a daemon.
|
---|
| 336 | .br
|
---|
| 337 | .BI MessageHeader= format
|
---|
| 338 | Costom format for message header. Replacements:
|
---|
| 339 | .I %F
|
---|
| 340 | source file name,
|
---|
| 341 | .I %L
|
---|
| 342 | source file line,
|
---|
| 343 | .I %S
|
---|
| 344 | severity,
|
---|
| 345 | .I %T
|
---|
| 346 | timestamp,
|
---|
| 347 | .I %C
|
---|
| 348 | message class.
|
---|
| 349 | .br
|
---|
| 350 | .BI VersionString= string
|
---|
| 351 | Set version string to include in file signature database
|
---|
| 352 | (along with hostname and date).
|
---|
| 353 | .br
|
---|
| 354 | .BI SetReverseLookup= true|false
|
---|
| 355 | If false, skip reverse lookups when connecting to a host known by name
|
---|
| 356 | rather than IP address.
|
---|
| 357 | .br
|
---|
| 358 | .BI HideSetup= yes|no
|
---|
| 359 | Don't log name of config/database files on startup.
|
---|
| 360 | .br
|
---|
| 361 | .BI SyslogFacility= facility
|
---|
| 362 | Set the syslog facility to use. Default is LOG_AUTHPRIV.
|
---|
| 363 | .br
|
---|
| 364 | .BI MACType= HASH-TIGER|HMAC-TIGER
|
---|
| 365 | Set type of message authentication code (HMAC).
|
---|
| 366 | Must be identical on client and server.
|
---|
| 367 | .br
|
---|
| 368 | .BI SetLoopTime= val
|
---|
| 369 | Defines the interval (in seconds) for timestamps.
|
---|
| 370 | .br
|
---|
| 371 | .BI SetConsole= device
|
---|
| 372 | Set the console device (default /dev/console).
|
---|
| 373 | .br
|
---|
| 374 | .BI MessageQueueActive= 1|0
|
---|
| 375 | Whether to use a SysV IPC message queue.
|
---|
| 376 | .br
|
---|
| 377 | .BI PreludeMapToInfo= list of severities
|
---|
| 378 | The severities (see section
|
---|
| 379 | .IR [Log] )
|
---|
| 380 | that should be mapped to impact
|
---|
| 381 | severity
|
---|
| 382 | .I info
|
---|
| 383 | in prelude.
|
---|
| 384 | .br
|
---|
| 385 | .BI PreludeMapToLow= list of severities
|
---|
| 386 | The severities (see section
|
---|
| 387 | .IR [Log] )
|
---|
| 388 | that should be mapped to impact
|
---|
| 389 | severity
|
---|
| 390 | .I low
|
---|
| 391 | in prelude.
|
---|
| 392 | .br
|
---|
| 393 | .BI PreludeMapToMedium= list of severities
|
---|
| 394 | The severities (see section
|
---|
| 395 | .IR [Log] )
|
---|
| 396 | that should be mapped to impact
|
---|
| 397 | severity
|
---|
| 398 | .I medium
|
---|
| 399 | in prelude.
|
---|
| 400 | .br
|
---|
| 401 | .BI PreludeMapToHigh= list of severities
|
---|
| 402 | The severities (see section
|
---|
| 403 | .IR [Log] )
|
---|
| 404 | that should be mapped to impact
|
---|
| 405 | severity
|
---|
| 406 | .I high
|
---|
| 407 | in prelude.
|
---|
| 408 | .br
|
---|
| 409 | .BI SetMailTime= val
|
---|
| 410 | defines the maximum interval (in seconds) between succesive e\-mail reports.
|
---|
| 411 | Mail might be empty if there are no events to report.
|
---|
| 412 | .br
|
---|
| 413 | .BI SetMailNum= val
|
---|
| 414 | defines the maximum number of messages that are stored before e\-mailing them.
|
---|
| 415 | Messages of highest priority are always sent immediately.
|
---|
| 416 | .br
|
---|
| 417 | .BI SetMailAddress= username @ host
|
---|
| 418 | sets the recipient address for mailing.
|
---|
| 419 | .I "No aliases should be used."
|
---|
| 420 | For security, you should prefer a numerical host address.
|
---|
| 421 | .br
|
---|
| 422 | .BI SetMailRelay= server
|
---|
| 423 | sets the hostname for the mail relay server (if you need one).
|
---|
| 424 | If no relay server is given, mail is sent directly to the host given in the
|
---|
| 425 | mail address, otherwise it is sent to the relay server, who should
|
---|
| 426 | forward it to the given address.
|
---|
| 427 | .br
|
---|
| 428 | .BI SetMailSubject= val
|
---|
| 429 | defines a custom format for the subject of an email message.
|
---|
| 430 | .br
|
---|
| 431 | .BI SetMailSender= val
|
---|
| 432 | defines the sender for the 'From:' field of a message.
|
---|
| 433 | .br
|
---|
| 434 | .BI SetMailFilterAnd= list
|
---|
| 435 | defines a list of strings all of which must match a message, otherwise
|
---|
| 436 | it will not be mailed.
|
---|
| 437 | .br
|
---|
| 438 | .BI SetMailFilterOr= list
|
---|
| 439 | defines a list of strings at least one of which must match a message, otherwise
|
---|
| 440 | it will not be mailed.
|
---|
| 441 | .br
|
---|
| 442 | .BI SetMailFilterNot= list
|
---|
| 443 | defines a list of strings none of which should match a message, otherwise
|
---|
| 444 | it will not be mailed.
|
---|
| 445 | .br
|
---|
| 446 | .BI SamhainPath= /path/to/binary
|
---|
| 447 | sets the path to the samhain binary. If set, samhain will checksum
|
---|
| 448 | its own binary both on startup and termination, and compare both.
|
---|
| 449 | .br
|
---|
| 450 | .BI SetBindAddress= IP_address
|
---|
| 451 | The IP address (i.e. interface on multi-interface box) to use
|
---|
| 452 | for outgoing connections.
|
---|
| 453 | .br
|
---|
| 454 | .BI SetTimeServer= server
|
---|
| 455 | sets the hostname for the time server.
|
---|
| 456 | .br
|
---|
| 457 | .BI TrustedUser= name|uid
|
---|
| 458 | Add a user to the set of trusted users (root and the effective user
|
---|
| 459 | are always trusted. You can add up to 7 more users).
|
---|
| 460 | .br
|
---|
| 461 | .BI SetLogfilePath= AUTO|/path
|
---|
| 462 | Path to logfile (AUTO to tack hostname on compiled-in path).
|
---|
| 463 | .br
|
---|
| 464 | .BI SetLockfilePath= AUTO|/path
|
---|
| 465 | Path to lockfile (AUTO to tack hostname on compiled-in path).
|
---|
| 466 | .TP
|
---|
| 467 | .B Standalone or client only
|
---|
| 468 | .br
|
---|
| 469 | .BI SetNiceLevel= -19..19
|
---|
| 470 | Set scheduling priority during file check.
|
---|
| 471 | .br
|
---|
| 472 | .BI SetIOLimit= bps
|
---|
| 473 | Set IO limits (kilobytes per second) for file check.
|
---|
| 474 | .br
|
---|
| 475 | .BI SetFilecheckTime= val
|
---|
| 476 | Defines the interval (in seconds) between succesive file checks.
|
---|
| 477 | .br
|
---|
| 478 | .BI FileCheckScheduleOne= schedule
|
---|
| 479 | Crontab-like schedule for file checks. If used,
|
---|
| 480 | .I SetFilecheckTime
|
---|
| 481 | is ignored.
|
---|
| 482 | .br
|
---|
| 483 | .BI UseHardlinkCheck= yes|no
|
---|
| 484 | Compare number of hardlinks to number of subdirectories for directories.
|
---|
| 485 | .br
|
---|
| 486 | .BI HardlinkOffset= N:/path
|
---|
| 487 | Exception (use multiple times for multiple
|
---|
| 488 | exceptions). N is offset (actual - expected hardlinks) for /path.
|
---|
| 489 | .br
|
---|
| 490 | .BI AddOKChars= N1,N2,..
|
---|
| 491 | List of additional acceptable characters (byte value(s)) for the check for
|
---|
| 492 | weird filenames. Nn may be hex (leading '0x': 0xNN), octal
|
---|
| 493 | (leading zero: 0NNN), or decimal.
|
---|
| 494 | Use
|
---|
| 495 | .I all
|
---|
| 496 | for all.
|
---|
| 497 | .br
|
---|
| 498 | .br
|
---|
| 499 | .BI IgnoreAdded= path_regex
|
---|
| 500 | Ignore if this file/directory is added/created.
|
---|
| 501 | .br
|
---|
| 502 | .BI IgnoreMissing= path_regex
|
---|
| 503 | Ignore if this file/directory is missing/deleted.
|
---|
| 504 | .br
|
---|
| 505 | .BI ReportOnlyOnce= yes|no
|
---|
| 506 | Report only once on a modified file (default yes).
|
---|
| 507 | .br
|
---|
| 508 | .BI ReportFullDetail= yes|no
|
---|
| 509 | Report in full detail on modified files (not only modified items).
|
---|
| 510 | .br
|
---|
| 511 | .BI UseLocalTime= yes|no
|
---|
| 512 | Report file timestamps in local time rather than GMT (default no).
|
---|
| 513 | Do not use this with Beltane.
|
---|
| 514 | .br
|
---|
| 515 | .BI ChecksumTest= {init|update|check|none}
|
---|
| 516 | defines whether to initialize/update the database or verify files against it.
|
---|
| 517 | If 'none', you should supply the required option on the command line.
|
---|
| 518 | .br
|
---|
| 519 | .BI SetPrelinkPath= path
|
---|
| 520 | Path of the prelink executable (default /usr/sbin/prelink).
|
---|
| 521 | .br
|
---|
| 522 | .BI SetPrelinkChecksum= checksum
|
---|
| 523 | TIGER192 checksum of the prelink executable (no default).
|
---|
| 524 | .br
|
---|
| 525 | .BI SetLogServer= server
|
---|
| 526 | sets the hostname for the log server.
|
---|
| 527 | .br
|
---|
[27] | 528 | .BI SetServerPort= portnumber
|
---|
| 529 | sets the port on the server to connect to.
|
---|
| 530 | .br
|
---|
[1] | 531 | .BI SetDatabasePath= AUTO|/path
|
---|
| 532 | Path to database (AUTO to tack hostname on compiled-in path).
|
---|
| 533 | .br
|
---|
| 534 | .BI DigestAlgo= SHA1|MD5
|
---|
| 535 | Use SHA1 or MD5 instead of the TIGER checksum (default: TIGER192).
|
---|
| 536 | .br
|
---|
| 537 | .BI RedefReadOnly= +/-XXX,+/-YYY,...
|
---|
| 538 | Add or subtract tests XXX from the ReadOnly policy.
|
---|
| 539 | Tests are: CHK (checksum), LNK (link),
|
---|
| 540 | HLN (hardlink), INO (inode), USR (user), GRP (group), MTM (mtime),
|
---|
| 541 | ATM (atime), CTM (ctime), SIZ (size), RDEV (device numbers)
|
---|
| 542 | and/or MOD (file mode).
|
---|
| 543 | .br
|
---|
| 544 | .BI RedefAttributes= +/-XXX,+/-YYY,...
|
---|
| 545 | Add or subtract tests XXX from the Attributes policy.
|
---|
| 546 | .br
|
---|
| 547 | .BI RedefLogFiles= +/-XXX,+/-YYY,...
|
---|
| 548 | Add or subtract tests XXX from the LogFiles policy.
|
---|
| 549 | .br
|
---|
| 550 | .BI RedefGrowingLogFiles= +/-XXX,+/-YYY,...
|
---|
| 551 | Add or subtract tests XXX from the GrowingLogFiles policy.
|
---|
| 552 | .br
|
---|
| 553 | .BI RedefIgnoreAll= +/-XXX,+/-YYY,...
|
---|
| 554 | Add or subtract tests XXX from the IgnoreAll policy.
|
---|
| 555 | .br
|
---|
| 556 | .BI RedefIgnoreNone= +/-XXX,+/-YYY,...
|
---|
| 557 | Add or subtract tests XXX from the IgnoreNone policy.
|
---|
| 558 | .br
|
---|
| 559 | .BI RedefUser0= +/-XXX,+/-YYY,...
|
---|
| 560 | Add or subtract tests XXX from the User0 policy.
|
---|
| 561 | .br
|
---|
| 562 | .BI RedefUser1= +/-XXX,+/-YYY,...
|
---|
| 563 | Add or subtract tests XXX from the User1 policy.
|
---|
[27] | 564 | .br
|
---|
| 565 | .BI RedefUser2= +/-XXX,+/-YYY,...
|
---|
| 566 | Add or subtract tests XXX from the User2 policy.
|
---|
| 567 | .br
|
---|
| 568 | .BI RedefUser3= +/-XXX,+/-YYY,...
|
---|
| 569 | Add or subtract tests XXX from the User3 policy.
|
---|
| 570 | .br
|
---|
| 571 | .BI RedefUser4= +/-XXX,+/-YYY,...
|
---|
| 572 | Add or subtract tests XXX from the User4 policy.
|
---|
[1] | 573 | .TP
|
---|
| 574 | .B Server Only
|
---|
| 575 | .br
|
---|
| 576 | .BI SetUseSocket= yes|no
|
---|
| 577 | If unset, do not open the command socket. The default is no.
|
---|
| 578 | .br
|
---|
| 579 | .BI SetSocketAllowUid= UID
|
---|
| 580 | Which user can connect to the command socket. The default is 0 (root).
|
---|
| 581 | .br
|
---|
| 582 | .BI SetSocketPassword= password
|
---|
| 583 | Password (max. 14 chars, no '@') for password-based authentication on the
|
---|
| 584 | command socket (only if the OS does not support passing
|
---|
| 585 | credentials via sockets).
|
---|
| 586 | .br
|
---|
| 587 | .BI SetChrootDir= path
|
---|
| 588 | If set, chroot to this directory after startup.
|
---|
| 589 | .br
|
---|
| 590 | .BI SetStripDomain= yes|no
|
---|
| 591 | Whether to strip the domain from the client hostname when
|
---|
| 592 | logging client messages (default: yes).
|
---|
| 593 | .br
|
---|
| 594 | .BI SetClientFromAccept= true|false
|
---|
| 595 | If true, use client address as known to the communication layer. Else
|
---|
| 596 | (default) use client name as claimed by the client, try to verify against
|
---|
| 597 | the address known to the communication layer, and accept
|
---|
| 598 | (with a warning message) even if this fails.
|
---|
| 599 | .br
|
---|
| 600 | .BI UseClientSeverity= yes|no
|
---|
| 601 | Use the severity of client messages.
|
---|
| 602 | .br
|
---|
| 603 | .BI UseClientClass= yes|no
|
---|
| 604 | Use the class of client messages.
|
---|
| 605 | .br
|
---|
| 606 | .BI SetServerPort= number
|
---|
| 607 | The port that the server should use for listening (default is 49777).
|
---|
| 608 | .br
|
---|
| 609 | .BI SetServerInterface= IPaddress
|
---|
| 610 | The IP address (i.e. interface on multi-interface box) that the
|
---|
| 611 | server should use for listening (default is all). Use INADDR_ANY to reset
|
---|
| 612 | to all.
|
---|
| 613 | .br
|
---|
| 614 | .BI SeverityLookup= severity
|
---|
| 615 | Severity of the message on client address != socket peer.
|
---|
| 616 | .br
|
---|
| 617 | .BI UseSeparateLogs= true|false
|
---|
| 618 | If true, messages from different clients will be logged to separate
|
---|
| 619 | log files (the name of the client will be appended to the name of the main
|
---|
| 620 | log file to construct the logfile name).
|
---|
| 621 | .br
|
---|
| 622 | .BI SetClientTimeLimit= seconds
|
---|
| 623 | The maximum time between client messages. If exceeded, a warning will
|
---|
| 624 | be issued (the default is 86400 sec = 1 day).
|
---|
| 625 | .br
|
---|
| 626 | .BI SetUDPActive= yes|no
|
---|
| 627 | yule 1.2.8+: Also listen on 514/udp (syslog).
|
---|
| 628 |
|
---|
| 629 |
|
---|
| 630 | .TP
|
---|
| 631 | .I "[Clients]"
|
---|
| 632 | This section is only relevant if
|
---|
| 633 | .B samhain
|
---|
| 634 | is run as a log server for clients running on another (or the same) machine.
|
---|
| 635 | .br
|
---|
| 636 | .BI Client= hostname @ salt @ verifier
|
---|
| 637 | registers a client at host
|
---|
| 638 | .I hostname
|
---|
| 639 | (fully qualified hostname required) for access to the
|
---|
| 640 | log server.
|
---|
| 641 | Log entries from unregistered clients will not be accepted.
|
---|
| 642 | To generate a salt and a valid verifier, use the command
|
---|
| 643 | .B "samhain -P"
|
---|
| 644 | .IR "password" ,
|
---|
| 645 | where
|
---|
| 646 | .I password
|
---|
| 647 | is the password of the client. A simple utility program
|
---|
| 648 | .B samhain_setpwd
|
---|
| 649 | is provided to re\-set the compiled\-in default password of the client
|
---|
| 650 | executable to a user\-defined
|
---|
| 651 | value.
|
---|
| 652 | .TP
|
---|
| 653 | .I "[EOF]"
|
---|
| 654 | An optional end marker. Everything below is ignored.
|
---|
| 655 |
|
---|
| 656 | .SH SEE ALSO
|
---|
| 657 | .PP
|
---|
| 658 | .BR samhain (8)
|
---|
| 659 |
|
---|
| 660 | .SH AUTHOR
|
---|
| 661 | .PP
|
---|
| 662 | Rainer Wichmann (http://la\-samhna.de)
|
---|
| 663 |
|
---|
| 664 | .SH BUG REPORTS
|
---|
| 665 | .PP
|
---|
| 666 | If you find a bug in
|
---|
| 667 | .BR samhain ,
|
---|
| 668 | please send electronic mail to
|
---|
| 669 | .IR support@la\-samhna.de .
|
---|
| 670 | Please include your operating system and its revision, the version of
|
---|
| 671 | .BR samhain ,
|
---|
| 672 | what C compiler you used to compile it, your 'configure' options, and
|
---|
| 673 | anything else you deem helpful.
|
---|
| 674 |
|
---|
| 675 | .SH COPYING PERMISSIONS
|
---|
| 676 | .PP
|
---|
| 677 | Copyright (\(co) 2000, 2004, 2005 Rainer Wichmann
|
---|
| 678 | .PP
|
---|
| 679 | Permission is granted to make and distribute verbatim copies of
|
---|
| 680 | this manual page provided the copyright notice and this permission
|
---|
| 681 | notice are preserved on all copies.
|
---|
| 682 | .ig
|
---|
| 683 | Permission is granted to process this file through troff and print the
|
---|
| 684 | results, provided the printed document carries copying permission
|
---|
| 685 | notice identical to this one except for the removal of this paragraph
|
---|
| 686 | (this paragraph not being relevant to the printed manual page).
|
---|
| 687 | ..
|
---|
| 688 | .PP
|
---|
| 689 | Permission is granted to copy and distribute modified versions of this
|
---|
| 690 | manual page under the conditions for verbatim copying, provided that
|
---|
| 691 | the entire resulting derived work is distributed under the terms of a
|
---|
| 692 | permission notice identical to this one.
|
---|
| 693 |
|
---|