1 | .TH SAMHAINRC 5 "Jul 29, 2004" "" "samhainrc manual"
|
---|
2 | .SH NAME
|
---|
3 | samhainrc \- samhain(8) configuration file
|
---|
4 |
|
---|
5 | .SH WARNING
|
---|
6 | .PP
|
---|
7 | The information in this man page is not always up to date.
|
---|
8 | The authoritative documentation is the user manual.
|
---|
9 |
|
---|
10 | .SH DESCRIPTION
|
---|
11 | .PP
|
---|
12 | The configuration file for
|
---|
13 | .BR samhain (8)
|
---|
14 | is named
|
---|
15 | .I samhainrc
|
---|
16 | and located in
|
---|
17 | .I /etc
|
---|
18 | by default.
|
---|
19 | .PP
|
---|
20 | It contains several sections, indicated by headings in square brackets.
|
---|
21 | Each section may hold zero or more
|
---|
22 | .BI key= value
|
---|
23 | pairs. Blank lines and lines starting with '#' are comments.
|
---|
24 | Everything before the first section and after an
|
---|
25 | .I "[EOF]"
|
---|
26 | is ignored. The file may be (clear text) signed by PGP/GnuPG, and
|
---|
27 | .B samhain
|
---|
28 | may invoke GnuPG to check the signature
|
---|
29 | if compiled with support for it.
|
---|
30 | .PP
|
---|
31 | Conditional inclusion of entries for some host(s) is
|
---|
32 | supported via any number of
|
---|
33 | .BI @ hostname /@ end
|
---|
34 | directives.
|
---|
35 | .BI @ hostname
|
---|
36 | and
|
---|
37 | .BI @ end
|
---|
38 | must each be on separate lines. Lines in between will only be
|
---|
39 | read if
|
---|
40 | .I "hostname"
|
---|
41 | (which may be a regular expression) matches the local host.
|
---|
42 | .PP
|
---|
43 | Likewise, conditional inclusion of entries based on system type is
|
---|
44 | supported via any number of
|
---|
45 | .BI $ sysname:release:machine /$ end
|
---|
46 | directives.
|
---|
47 | .br
|
---|
48 | .I "sysname:release:machine"
|
---|
49 | can be inferred from
|
---|
50 | .I "uname -srm"
|
---|
51 | and may be a regular expression.
|
---|
52 | .PP
|
---|
53 | Filenames/directories to check may be wildcard patterns.
|
---|
54 | .PP
|
---|
55 | Options given on the command line will override
|
---|
56 | those in the configuration file.
|
---|
57 | The recognized sections in the configuration file are as follows:
|
---|
58 | .PP
|
---|
59 | Boolean options can be set with any of 1|true|yes or 0|false|no.
|
---|
60 | .TP
|
---|
61 | .I "[ReadOnly]"
|
---|
62 | This section may contain
|
---|
63 | .br
|
---|
64 | .BI file= PATH
|
---|
65 | and
|
---|
66 | .br
|
---|
67 | .BI dir= [depth]PATH
|
---|
68 | entries for files and directories to check. All modifications except access
|
---|
69 | times will be reported for these files.
|
---|
70 | .I [depth] (use without brackets)
|
---|
71 | is an optional parameter to define a per\-directory recursion
|
---|
72 | depth.
|
---|
73 | .TP
|
---|
74 | .I "[LogFiles]"
|
---|
75 | As above, but modifications of timestamps, file size, and signature will
|
---|
76 | be ignored.
|
---|
77 | .TP
|
---|
78 | .I "[GrowingLogFiles]"
|
---|
79 | As above, but modifications of file size will only be ignored if the size has
|
---|
80 | .IR increased .
|
---|
81 | .TP
|
---|
82 | .I "[Attributes]"
|
---|
83 | As above, but only modifications of ownership and access permissions
|
---|
84 | will be checked.
|
---|
85 | .TP
|
---|
86 | .I "[IgnoreAll]"
|
---|
87 | As above, but report no modifications for
|
---|
88 | these files/directories. Access failures
|
---|
89 | will still be reported.
|
---|
90 | .TP
|
---|
91 | .I "[IgnoreNone]"
|
---|
92 | As above, but report all modifications for these files/directories,
|
---|
93 | including access time.
|
---|
94 | .TP
|
---|
95 | .I "[User0]"
|
---|
96 | .TP
|
---|
97 | .I "[User1]"
|
---|
98 | .TP
|
---|
99 | .I "[User2]"
|
---|
100 | .TP
|
---|
101 | .I "[User3]"
|
---|
102 | .TP
|
---|
103 | .I "[User4]"
|
---|
104 | These are reserved for user-defined policies.
|
---|
105 | .TP
|
---|
106 | .I "[Prelink]"
|
---|
107 | For prelinked executables / libraries or directories holding them.
|
---|
108 | .TP
|
---|
109 | .I "[Log]"
|
---|
110 | This section defines the filtering rules for logging.
|
---|
111 | It may contain the following entries:
|
---|
112 | .br
|
---|
113 | .BI MailSeverity= val
|
---|
114 | where the threshold value
|
---|
115 | .I val
|
---|
116 | may be one of
|
---|
117 | .IR debug ,
|
---|
118 | .IR info ,
|
---|
119 | .IR notice ,
|
---|
120 | .IR warn ,
|
---|
121 | .IR mark ,
|
---|
122 | .IR err ,
|
---|
123 | .IR crit ,
|
---|
124 | .IR alert ,
|
---|
125 | or
|
---|
126 | .IR none .
|
---|
127 | By default, everything equal to and above the threshold will be logged.
|
---|
128 | The specifiers
|
---|
129 | .IR * ,
|
---|
130 | .IR ! ,
|
---|
131 | and
|
---|
132 | .I =
|
---|
133 | are interpreted as 'all', 'all but', and 'only', respectively (like
|
---|
134 | in the Linux version of syslogd(8)).
|
---|
135 | Time stamps have the priority
|
---|
136 | .IR warn ,
|
---|
137 | system\-level errors have the priority
|
---|
138 | .IR err ,
|
---|
139 | and important start\-up messages the priority
|
---|
140 | .IR alert .
|
---|
141 | The signature key for the log file will never be logged to syslog or the
|
---|
142 | log file itself.
|
---|
143 | For failures to verify file integrity, error levels are defined
|
---|
144 | in the next section.
|
---|
145 | .br
|
---|
146 | .BI PrintSeverity= val,
|
---|
147 | .br
|
---|
148 | .BI LogSeverity= val,
|
---|
149 | .br
|
---|
150 | .BI ExportSeverity= val,
|
---|
151 | .br
|
---|
152 | .BI ExternalSeverity= val,
|
---|
153 | .br
|
---|
154 | .BI PreludeSeverity= val,
|
---|
155 | .br
|
---|
156 | .BI DatabaseSeverity= val,
|
---|
157 | and
|
---|
158 | .br
|
---|
159 | .BI SyslogSeverity= val
|
---|
160 | set the thresholds for logging via stdout (or
|
---|
161 | .IR /dev/console ),
|
---|
162 | log file, TCP forwarding, calling external programs,
|
---|
163 | and
|
---|
164 | .BR syslog (3).
|
---|
165 | .TP
|
---|
166 | .I "[EventSeverity]"
|
---|
167 | .BI SeverityReadOnly= val,
|
---|
168 | .br
|
---|
169 | .BI SeverityLogFiles= val,
|
---|
170 | .br
|
---|
171 | .BI SeverityGrowingLogs= val,
|
---|
172 | .br
|
---|
173 | .BI SeverityIgnoreNone= val,
|
---|
174 | .br
|
---|
175 | .BI SeverityIgnoreAll= val,
|
---|
176 | .br
|
---|
177 | .BI SeverityPrelink= val,
|
---|
178 | .br
|
---|
179 | .BI SeverityUser0= val,
|
---|
180 | .br
|
---|
181 | .BI SeverityUser1= val,
|
---|
182 | .br
|
---|
183 | .BI SeverityUser2= val,
|
---|
184 | .br
|
---|
185 | .BI SeverityUser3= val,
|
---|
186 | and
|
---|
187 | .br
|
---|
188 | .BI SeverityUser4= val
|
---|
189 | define the error levels for failures to verify the integrity of
|
---|
190 | files/directories of the respective types. I.e. if such a file shows
|
---|
191 | unexpected modifications, an error of level
|
---|
192 | .I val
|
---|
193 | will be generated, and logged to all facilities with a threshold of at least
|
---|
194 | .IR val .
|
---|
195 | .br
|
---|
196 | .BI SeverityFiles= val
|
---|
197 | sets the error level for file access problems, and
|
---|
198 | .br
|
---|
199 | .BI SeverityDirs= val
|
---|
200 | for directory access problems.
|
---|
201 | .br
|
---|
202 | .BI SeverityNames= val
|
---|
203 | sets the error level for obscure file names
|
---|
204 | (e.g. non\-printable characters), and for files
|
---|
205 | with invalid UIDs/GIDs.
|
---|
206 | .TP
|
---|
207 | .I "[External]"
|
---|
208 | .BI OpenCommand= path
|
---|
209 | Start the definition of an external logging program|script.
|
---|
210 | .br
|
---|
211 | .BI SetType= log|srv
|
---|
212 | Type/purpose of program (log for logging).
|
---|
213 | .br
|
---|
214 | .BI SetCommandline= list
|
---|
215 | Command line options.
|
---|
216 | .br
|
---|
217 | .BI SetEnviron= KEY=val
|
---|
218 | Environment for external program.
|
---|
219 | .br
|
---|
220 | .BI SetChecksum= val
|
---|
221 | Checksum of the external program (checked before invoking).
|
---|
222 | .br
|
---|
223 | .BI SetCredentials= username
|
---|
224 | User as who the program will run.
|
---|
225 | .br
|
---|
226 | .BI SetFilterNot= list
|
---|
227 | Words not allowed in message.
|
---|
228 | .br
|
---|
229 | .BI SetFilterAnd= list
|
---|
230 | Words required (ALL) in message.
|
---|
231 | .br
|
---|
232 | .BI SetFilterOr= list
|
---|
233 | Words required (at least one) in message.
|
---|
234 | .br
|
---|
235 | .BI SetDeadtime= seconds
|
---|
236 | Time between consecutive calls.
|
---|
237 | .TP
|
---|
238 | .I "[Utmp]"
|
---|
239 | Configuration for watching login/logout events.
|
---|
240 | .br
|
---|
241 | .BI LoginCheckActive= 0|1
|
---|
242 | Switch off/on login/logout reporting.
|
---|
243 | .br
|
---|
244 | .BI LoginCheckInterval= val
|
---|
245 | Interval (seconds) between checks for login/logout events.
|
---|
246 | .br
|
---|
247 | .BI SeverityLogin= val
|
---|
248 | .br
|
---|
249 | .BI SeverityLoginMulti= val
|
---|
250 | .br
|
---|
251 | .BI SeverityLogout= val
|
---|
252 | Severity levels for logins, multiple logins
|
---|
253 | by same user, and logouts.
|
---|
254 | .TP
|
---|
255 | .I "[SuidCheck]"
|
---|
256 | Settings for finding SUID/SGID files on disk.
|
---|
257 | .br
|
---|
258 | .BI SuidCheckActive= 0|1
|
---|
259 | Switch off/on the check.
|
---|
260 | .br
|
---|
261 | .BI SuidCheckExclude= path
|
---|
262 | A directory (and its subdirectories)
|
---|
263 | to exclude from the check. Only one directory can be specified this way.
|
---|
264 | .br
|
---|
265 | .BI SuidCheckSchedule= schedule
|
---|
266 | Crontab-like schedule for checks.
|
---|
267 | .br
|
---|
268 | .BI SeveritySuidCheck= severity
|
---|
269 | Severity for events.
|
---|
270 | .br
|
---|
271 | .BI SuidCheckFps= fps
|
---|
272 | Limit files per seconds for SUID check.
|
---|
273 | .br
|
---|
274 | .BI SuidCheckNosuid= 0|1
|
---|
275 | Check filesystems mounted as nosuid. Defaults to not.
|
---|
276 | .br
|
---|
277 | .BI SuidCheckQuarantineFiles= 0|1
|
---|
278 | Whether to quarantine files. Defaults to not.
|
---|
279 | .br
|
---|
280 | .BI SuidCheckQuarantineMethod= 0|1|2
|
---|
281 | Quarantine method. Delete = 1, remove suid/sgid flags = 1, move to quarantine directory = 2. Defaults to 1 (remove suid/sgid flags).
|
---|
282 | .br
|
---|
283 | .BI
|
---|
284 | .TP
|
---|
285 | .I "[Mounts]"
|
---|
286 | Configuration for checking mounts.
|
---|
287 | .br
|
---|
288 | .BI MountCheckActive= 0|1
|
---|
289 | Switch off/on this module.
|
---|
290 | .br
|
---|
291 | .BI MountCheckInterval= seconds
|
---|
292 | The interval between checks (default 300).
|
---|
293 | .br
|
---|
294 | .BI SeverityMountMissing= severity
|
---|
295 | Severity for reports on missing mounts.
|
---|
296 | .br
|
---|
297 | .BI SeverityOptionMissing= severity
|
---|
298 | Severity for reports on missing mount options.
|
---|
299 | .br
|
---|
300 | .BI CheckMount= path
|
---|
301 | [mount_options]
|
---|
302 | .br
|
---|
303 | Mount point to check. Mount options must be given as
|
---|
304 | comma-separated list, separated by a blank from the preceding mount point.
|
---|
305 | .TP
|
---|
306 | .I "[UserFiles]"
|
---|
307 | Configuration for checking paths relative to user home directories.
|
---|
308 | .br
|
---|
309 | .BI UserFilesActive= 0|1
|
---|
310 | Switch off/on this module.
|
---|
311 | .br
|
---|
312 | .BI UserFilesName= filename
|
---|
313 | policy
|
---|
314 | .br
|
---|
315 | Files to check for under each $HOME. Allowed values for 'policy'
|
---|
316 | are: allignore, attributes, logfiles, loggrow, noignore (default),
|
---|
317 | readonly, user0, user1, user2, user3, and user4.
|
---|
318 | .br
|
---|
319 | .BI UserFilesCheckUids= uid_list
|
---|
320 | A list of UIDs where we want to check. The default
|
---|
321 | is all. Ranges (e.g. 100-500) are allowed. If there is an open range (e.g.
|
---|
322 | 1000-), it must be last in the list.
|
---|
323 | .TP
|
---|
324 | .I "[ProcessCheck]"
|
---|
325 | Settings for finding hidden/fake,required processes on the local host.
|
---|
326 | .br
|
---|
327 | .BI ProcessCheckActive= 0|1
|
---|
328 | Switch off/on the check.
|
---|
329 | .br
|
---|
330 | .BI ProcessCheckInterval= seconds
|
---|
331 | The interval between checks (default 300).
|
---|
332 | .br
|
---|
333 | .BI SeverityProcessCheck= severity
|
---|
334 | Severity for events (default crit).
|
---|
335 | .br
|
---|
336 | .BI ProcessCheckMinPID= pid
|
---|
337 | The minimum PID to check (default 0).
|
---|
338 | .br
|
---|
339 | .BI ProcessCheckMaxPID= pid
|
---|
340 | The maximum PID to check (default 32767).
|
---|
341 | .br
|
---|
342 | .BI ProcessCheckPSPath= path
|
---|
343 | The path to ps (autodetected at compile time).
|
---|
344 | .br
|
---|
345 | .BI ProcessCheckPSArg= argument
|
---|
346 | The argument to ps (autodetected at compile time).
|
---|
347 | Must yield PID in first column.
|
---|
348 | .br
|
---|
349 | .BI ProcessCheckExists= regular_expression
|
---|
350 | Check for existence of a process matching the given regular expression.
|
---|
351 | .TP
|
---|
352 | .I "[PortCheck]"
|
---|
353 | Settings for checking open ports on the local host.
|
---|
354 | .br
|
---|
355 | .BI PortCheckActive= 0|1
|
---|
356 | Switch off/on the check.
|
---|
357 | .br
|
---|
358 | .BI PortCheckInterval= seconds
|
---|
359 | The interval between checks (default 300).
|
---|
360 | .br
|
---|
361 | .BI PortCheckUDP= yes|no
|
---|
362 | Whether to check UPD ports as well (default yes).
|
---|
363 | .br
|
---|
364 | .BI SeverityPortCheck= severity
|
---|
365 | Severity for events (default crit).
|
---|
366 | .br
|
---|
367 | .BI PortCheckInterface= ip_address
|
---|
368 | Additional interface to check.
|
---|
369 | .br
|
---|
370 | .BI PortCheckOptional= ip_address:list
|
---|
371 | Ports that may, but need not be open. The ip_address is the one
|
---|
372 | of the interface, the list must be
|
---|
373 | comma or whitespace separated, each item must be (port|service)/protocol,
|
---|
374 | e.g. 22/tcp,nfs/tcp/nfs/udp.
|
---|
375 | .br
|
---|
376 | .BI PortCheckRequired= ip_address:list
|
---|
377 | Ports that are required to be open. The ip_address is the one
|
---|
378 | of the interface, the list must be
|
---|
379 | comma or whitespace separated, each item must be (port|service)/protocol,
|
---|
380 | e.g. 22/tcp,nfs/tcp/nfs/udp.
|
---|
381 | .TP
|
---|
382 | .I "[Database]"
|
---|
383 | Settings for
|
---|
384 | .I logging
|
---|
385 | to a database.
|
---|
386 | .br
|
---|
387 | .BI SetDBHost= db_host
|
---|
388 | Host where the DB server runs (default: localhost).
|
---|
389 | Should be a numeric IP address for PostgreSQL.
|
---|
390 | .br
|
---|
391 | .BI SetDBName= db_name
|
---|
392 | Name of the database (default: samhain).
|
---|
393 | .br
|
---|
394 | .BI SetDBTable= db_table
|
---|
395 | Name of the database table (default: log).
|
---|
396 | .br
|
---|
397 | .BI SetDBUser= db_user
|
---|
398 | Connect as this user (default: samhain).
|
---|
399 | .br
|
---|
400 | .BI SetDBPassword= db_password
|
---|
401 | Use this password (default: none).
|
---|
402 | .br
|
---|
403 | .BI SetDBServerTstamp= true|false
|
---|
404 | Log server timestamp for client messages (default: true).
|
---|
405 | .br
|
---|
406 | .BI UsePersistent= true|false
|
---|
407 | Use a persistent connection (default: true).
|
---|
408 | .TP
|
---|
409 | .I "[Misc]"
|
---|
410 | .BI Daemon= no|yes
|
---|
411 | Detach from controlling terminal to become a daemon.
|
---|
412 | .br
|
---|
413 | .BI MessageHeader= format
|
---|
414 | Costom format for message header. Replacements:
|
---|
415 | .I %F
|
---|
416 | source file name,
|
---|
417 | .I %L
|
---|
418 | source file line,
|
---|
419 | .I %S
|
---|
420 | severity,
|
---|
421 | .I %T
|
---|
422 | timestamp,
|
---|
423 | .I %C
|
---|
424 | message class.
|
---|
425 | .br
|
---|
426 | .BI VersionString= string
|
---|
427 | Set version string to include in file signature database
|
---|
428 | (along with hostname and date).
|
---|
429 | .br
|
---|
430 | .BI SetReverseLookup= true|false
|
---|
431 | If false, skip reverse lookups when connecting to a host known by name
|
---|
432 | rather than IP address.
|
---|
433 | .br
|
---|
434 | .BI HideSetup= yes|no
|
---|
435 | Don't log name of config/database files on startup.
|
---|
436 | .br
|
---|
437 | .BI SyslogFacility= facility
|
---|
438 | Set the syslog facility to use. Default is LOG_AUTHPRIV.
|
---|
439 | .br
|
---|
440 | .BI MACType= HASH-TIGER|HMAC-TIGER
|
---|
441 | Set type of message authentication code (HMAC).
|
---|
442 | Must be identical on client and server.
|
---|
443 | .br
|
---|
444 | .BI StartupLoadDelay= val
|
---|
445 | Defines the interval (in seconds) to wait after startup before
|
---|
446 | loading the databse from the server. Default is no wait.
|
---|
447 | .br
|
---|
448 | .BI SetLoopTime= val
|
---|
449 | Defines the interval (in seconds) for timestamps.
|
---|
450 | .br
|
---|
451 | .BI SetConsole= device
|
---|
452 | Set the console device (default /dev/console).
|
---|
453 | .br
|
---|
454 | .BI MessageQueueActive= 1|0
|
---|
455 | Whether to use a SysV IPC message queue.
|
---|
456 | .br
|
---|
457 | .BI PreludeMapToInfo= list of severities
|
---|
458 | The severities (see section
|
---|
459 | .IR [Log] )
|
---|
460 | that should be mapped to impact
|
---|
461 | severity
|
---|
462 | .I info
|
---|
463 | in prelude.
|
---|
464 | .br
|
---|
465 | .BI PreludeMapToLow= list of severities
|
---|
466 | The severities (see section
|
---|
467 | .IR [Log] )
|
---|
468 | that should be mapped to impact
|
---|
469 | severity
|
---|
470 | .I low
|
---|
471 | in prelude.
|
---|
472 | .br
|
---|
473 | .BI PreludeMapToMedium= list of severities
|
---|
474 | The severities (see section
|
---|
475 | .IR [Log] )
|
---|
476 | that should be mapped to impact
|
---|
477 | severity
|
---|
478 | .I medium
|
---|
479 | in prelude.
|
---|
480 | .br
|
---|
481 | .BI PreludeMapToHigh= list of severities
|
---|
482 | The severities (see section
|
---|
483 | .IR [Log] )
|
---|
484 | that should be mapped to impact
|
---|
485 | severity
|
---|
486 | .I high
|
---|
487 | in prelude.
|
---|
488 | .br
|
---|
489 | .BI SetMailTime= val
|
---|
490 | defines the maximum interval (in seconds) between succesive e\-mail reports.
|
---|
491 | Mail might be empty if there are no events to report.
|
---|
492 | .br
|
---|
493 | .BI SetMailNum= val
|
---|
494 | defines the maximum number of messages that are stored before e\-mailing them.
|
---|
495 | Messages of highest priority are always sent immediately.
|
---|
496 | .br
|
---|
497 | .BI SetMailAddress= username @ host
|
---|
498 | sets the recipient address for mailing.
|
---|
499 | .I "No aliases should be used."
|
---|
500 | For security, you should prefer a numerical host address.
|
---|
501 | .br
|
---|
502 | .BI SetMailRelay= server
|
---|
503 | sets the hostname for the mail relay server (if you need one).
|
---|
504 | If no relay server is given, mail is sent directly to the host given in the
|
---|
505 | mail address, otherwise it is sent to the relay server, who should
|
---|
506 | forward it to the given address.
|
---|
507 | .br
|
---|
508 | .BI SetMailSubject= val
|
---|
509 | defines a custom format for the subject of an email message.
|
---|
510 | .br
|
---|
511 | .BI SetMailSender= val
|
---|
512 | defines the sender for the 'From:' field of a message.
|
---|
513 | .br
|
---|
514 | .BI SetMailFilterAnd= list
|
---|
515 | defines a list of strings all of which must match a message, otherwise
|
---|
516 | it will not be mailed.
|
---|
517 | .br
|
---|
518 | .BI SetMailFilterOr= list
|
---|
519 | defines a list of strings at least one of which must match a message, otherwise
|
---|
520 | it will not be mailed.
|
---|
521 | .br
|
---|
522 | .BI SetMailFilterNot= list
|
---|
523 | defines a list of strings none of which should match a message, otherwise
|
---|
524 | it will not be mailed.
|
---|
525 | .br
|
---|
526 | .BI SamhainPath= /path/to/binary
|
---|
527 | sets the path to the samhain binary. If set, samhain will checksum
|
---|
528 | its own binary both on startup and termination, and compare both.
|
---|
529 | .br
|
---|
530 | .BI SetBindAddress= IP_address
|
---|
531 | The IP address (i.e. interface on multi-interface box) to use
|
---|
532 | for outgoing connections.
|
---|
533 | .br
|
---|
534 | .BI SetTimeServer= server
|
---|
535 | sets the hostname for the time server.
|
---|
536 | .br
|
---|
537 | .BI TrustedUser= name|uid
|
---|
538 | Add a user to the set of trusted users (root and the effective user
|
---|
539 | are always trusted. You can add up to 7 more users).
|
---|
540 | .br
|
---|
541 | .BI SetLogfilePath= AUTO|/path
|
---|
542 | Path to logfile (AUTO to tack hostname on compiled-in path).
|
---|
543 | .br
|
---|
544 | .BI SetLockfilePath= AUTO|/path
|
---|
545 | Path to lockfile (AUTO to tack hostname on compiled-in path).
|
---|
546 | .TP
|
---|
547 | .B Standalone or client only
|
---|
548 | .br
|
---|
549 | .BI SetNiceLevel= -19..19
|
---|
550 | Set scheduling priority during file check.
|
---|
551 | .br
|
---|
552 | .BI SetIOLimit= bps
|
---|
553 | Set IO limits (kilobytes per second) for file check.
|
---|
554 | .br
|
---|
555 | .BI SetFilecheckTime= val
|
---|
556 | Defines the interval (in seconds) between succesive file checks.
|
---|
557 | .br
|
---|
558 | .BI FileCheckScheduleOne= schedule
|
---|
559 | Crontab-like schedule for file checks. If used,
|
---|
560 | .I SetFilecheckTime
|
---|
561 | is ignored.
|
---|
562 | .br
|
---|
563 | .BI UseHardlinkCheck= yes|no
|
---|
564 | Compare number of hardlinks to number of subdirectories for directories.
|
---|
565 | .br
|
---|
566 | .BI HardlinkOffset= N:/path
|
---|
567 | Exception (use multiple times for multiple
|
---|
568 | exceptions). N is offset (actual - expected hardlinks) for /path.
|
---|
569 | .br
|
---|
570 | .BI AddOKChars= N1,N2,..
|
---|
571 | List of additional acceptable characters (byte value(s)) for the check for
|
---|
572 | weird filenames. Nn may be hex (leading '0x': 0xNN), octal
|
---|
573 | (leading zero: 0NNN), or decimal.
|
---|
574 | Use
|
---|
575 | .I all
|
---|
576 | for all.
|
---|
577 | .br
|
---|
578 | .BI FilenamesAreUTF8= yes|no
|
---|
579 | Whether filenames are UTF-8 encoded (defaults to no). If yes, filenames
|
---|
580 | are checked for invalid UTF-8 encoding and for ending in invisible characters.
|
---|
581 | .br
|
---|
582 | .BI IgnoreAdded= path_regex
|
---|
583 | Ignore if this file/directory is added/created.
|
---|
584 | .br
|
---|
585 | .BI IgnoreMissing= path_regex
|
---|
586 | Ignore if this file/directory is missing/deleted.
|
---|
587 | .br
|
---|
588 | .BI ReportOnlyOnce= yes|no
|
---|
589 | Report only once on a modified file (default yes).
|
---|
590 | .br
|
---|
591 | .BI ReportFullDetail= yes|no
|
---|
592 | Report in full detail on modified files (not only modified items).
|
---|
593 | .br
|
---|
594 | .BI UseLocalTime= yes|no
|
---|
595 | Report file timestamps in local time rather than GMT (default no).
|
---|
596 | Do not use this with Beltane.
|
---|
597 | .br
|
---|
598 | .BI ChecksumTest= {init|update|check|none}
|
---|
599 | defines whether to initialize/update the database or verify files against it.
|
---|
600 | If 'none', you should supply the required option on the command line.
|
---|
601 | .br
|
---|
602 | .BI SetPrelinkPath= path
|
---|
603 | Path of the prelink executable (default /usr/sbin/prelink).
|
---|
604 | .br
|
---|
605 | .BI SetPrelinkChecksum= checksum
|
---|
606 | TIGER192 checksum of the prelink executable (no default).
|
---|
607 | .br
|
---|
608 | .BI SetLogServer= server
|
---|
609 | sets the hostname for the log server.
|
---|
610 | .br
|
---|
611 | .BI SetServerPort= portnumber
|
---|
612 | sets the port on the server to connect to.
|
---|
613 | .br
|
---|
614 | .BI SetDatabasePath= AUTO|/path
|
---|
615 | Path to database (AUTO to tack hostname on compiled-in path).
|
---|
616 | .br
|
---|
617 | .BI DigestAlgo= SHA1|MD5
|
---|
618 | Use SHA1 or MD5 instead of the TIGER checksum (default: TIGER192).
|
---|
619 | .br
|
---|
620 | .BI RedefReadOnly= +/-XXX,+/-YYY,...
|
---|
621 | Add or subtract tests XXX from the ReadOnly policy.
|
---|
622 | Tests are: CHK (checksum), TXT (store literal content), LNK (link),
|
---|
623 | HLN (hardlink), INO (inode), USR (user), GRP (group), MTM (mtime),
|
---|
624 | ATM (atime), CTM (ctime), SIZ (size), RDEV (device numbers)
|
---|
625 | and/or MOD (file mode).
|
---|
626 | .br
|
---|
627 | .BI RedefAttributes= +/-XXX,+/-YYY,...
|
---|
628 | Add or subtract tests XXX from the Attributes policy.
|
---|
629 | .br
|
---|
630 | .BI RedefLogFiles= +/-XXX,+/-YYY,...
|
---|
631 | Add or subtract tests XXX from the LogFiles policy.
|
---|
632 | .br
|
---|
633 | .BI RedefGrowingLogFiles= +/-XXX,+/-YYY,...
|
---|
634 | Add or subtract tests XXX from the GrowingLogFiles policy.
|
---|
635 | .br
|
---|
636 | .BI RedefIgnoreAll= +/-XXX,+/-YYY,...
|
---|
637 | Add or subtract tests XXX from the IgnoreAll policy.
|
---|
638 | .br
|
---|
639 | .BI RedefIgnoreNone= +/-XXX,+/-YYY,...
|
---|
640 | Add or subtract tests XXX from the IgnoreNone policy.
|
---|
641 | .br
|
---|
642 | .BI RedefUser0= +/-XXX,+/-YYY,...
|
---|
643 | Add or subtract tests XXX from the User0 policy.
|
---|
644 | .br
|
---|
645 | .BI RedefUser1= +/-XXX,+/-YYY,...
|
---|
646 | Add or subtract tests XXX from the User1 policy.
|
---|
647 | .br
|
---|
648 | .BI RedefUser2= +/-XXX,+/-YYY,...
|
---|
649 | Add or subtract tests XXX from the User2 policy.
|
---|
650 | .br
|
---|
651 | .BI RedefUser3= +/-XXX,+/-YYY,...
|
---|
652 | Add or subtract tests XXX from the User3 policy.
|
---|
653 | .br
|
---|
654 | .BI RedefUser4= +/-XXX,+/-YYY,...
|
---|
655 | Add or subtract tests XXX from the User4 policy.
|
---|
656 | .TP
|
---|
657 | .B Server Only
|
---|
658 | .br
|
---|
659 | .BI SetUseSocket= yes|no
|
---|
660 | If unset, do not open the command socket. The default is no.
|
---|
661 | .br
|
---|
662 | .BI SetSocketAllowUid= UID
|
---|
663 | Which user can connect to the command socket. The default is 0 (root).
|
---|
664 | .br
|
---|
665 | .BI SetSocketPassword= password
|
---|
666 | Password (max. 14 chars, no '@') for password-based authentication on the
|
---|
667 | command socket (only if the OS does not support passing
|
---|
668 | credentials via sockets).
|
---|
669 | .br
|
---|
670 | .BI SetChrootDir= path
|
---|
671 | If set, chroot to this directory after startup.
|
---|
672 | .br
|
---|
673 | .BI SetStripDomain= yes|no
|
---|
674 | Whether to strip the domain from the client hostname when
|
---|
675 | logging client messages (default: yes).
|
---|
676 | .br
|
---|
677 | .BI SetClientFromAccept= true|false
|
---|
678 | If true, use client address as known to the communication layer. Else
|
---|
679 | (default) use client name as claimed by the client, try to verify against
|
---|
680 | the address known to the communication layer, and accept
|
---|
681 | (with a warning message) even if this fails.
|
---|
682 | .br
|
---|
683 | .BI UseClientSeverity= yes|no
|
---|
684 | Use the severity of client messages.
|
---|
685 | .br
|
---|
686 | .BI UseClientClass= yes|no
|
---|
687 | Use the class of client messages.
|
---|
688 | .br
|
---|
689 | .BI SetServerPort= number
|
---|
690 | The port that the server should use for listening (default is 49777).
|
---|
691 | .br
|
---|
692 | .BI SetServerInterface= IPaddress
|
---|
693 | The IP address (i.e. interface on multi-interface box) that the
|
---|
694 | server should use for listening (default is all). Use INADDR_ANY to reset
|
---|
695 | to all.
|
---|
696 | .br
|
---|
697 | .BI SeverityLookup= severity
|
---|
698 | Severity of the message on client address != socket peer.
|
---|
699 | .br
|
---|
700 | .BI UseSeparateLogs= true|false
|
---|
701 | If true, messages from different clients will be logged to separate
|
---|
702 | log files (the name of the client will be appended to the name of the main
|
---|
703 | log file to construct the logfile name).
|
---|
704 | .br
|
---|
705 | .BI SetClientTimeLimit= seconds
|
---|
706 | The maximum time between client messages. If exceeded, a warning will
|
---|
707 | be issued (the default is 86400 sec = 1 day).
|
---|
708 | .br
|
---|
709 | .BI SetUDPActive= yes|no
|
---|
710 | yule 1.2.8+: Also listen on 514/udp (syslog).
|
---|
711 |
|
---|
712 |
|
---|
713 | .TP
|
---|
714 | .I "[Clients]"
|
---|
715 | This section is only relevant if
|
---|
716 | .B samhain
|
---|
717 | is run as a log server for clients running on another (or the same) machine.
|
---|
718 | .br
|
---|
719 | .BI Client= hostname @ salt @ verifier
|
---|
720 | registers a client at host
|
---|
721 | .I hostname
|
---|
722 | (fully qualified hostname required) for access to the
|
---|
723 | log server.
|
---|
724 | Log entries from unregistered clients will not be accepted.
|
---|
725 | To generate a salt and a valid verifier, use the command
|
---|
726 | .B "samhain -P"
|
---|
727 | .IR "password" ,
|
---|
728 | where
|
---|
729 | .I password
|
---|
730 | is the password of the client. A simple utility program
|
---|
731 | .B samhain_setpwd
|
---|
732 | is provided to re\-set the compiled\-in default password of the client
|
---|
733 | executable to a user\-defined
|
---|
734 | value.
|
---|
735 | .TP
|
---|
736 | .I "[EOF]"
|
---|
737 | An optional end marker. Everything below is ignored.
|
---|
738 |
|
---|
739 | .SH SEE ALSO
|
---|
740 | .PP
|
---|
741 | .BR samhain (8)
|
---|
742 |
|
---|
743 | .SH AUTHOR
|
---|
744 | .PP
|
---|
745 | Rainer Wichmann (http://la\-samhna.de)
|
---|
746 |
|
---|
747 | .SH BUG REPORTS
|
---|
748 | .PP
|
---|
749 | If you find a bug in
|
---|
750 | .BR samhain ,
|
---|
751 | please send electronic mail to
|
---|
752 | .IR support@la\-samhna.de .
|
---|
753 | Please include your operating system and its revision, the version of
|
---|
754 | .BR samhain ,
|
---|
755 | what C compiler you used to compile it, your 'configure' options, and
|
---|
756 | anything else you deem helpful.
|
---|
757 |
|
---|
758 | .SH COPYING PERMISSIONS
|
---|
759 | .PP
|
---|
760 | Copyright (\(co) 2000, 2004, 2005 Rainer Wichmann
|
---|
761 | .PP
|
---|
762 | Permission is granted to make and distribute verbatim copies of
|
---|
763 | this manual page provided the copyright notice and this permission
|
---|
764 | notice are preserved on all copies.
|
---|
765 | .ig
|
---|
766 | Permission is granted to process this file through troff and print the
|
---|
767 | results, provided the printed document carries copying permission
|
---|
768 | notice identical to this one except for the removal of this paragraph
|
---|
769 | (this paragraph not being relevant to the printed manual page).
|
---|
770 | ..
|
---|
771 | .PP
|
---|
772 | Permission is granted to copy and distribute modified versions of this
|
---|
773 | manual page under the conditions for verbatim copying, provided that
|
---|
774 | the entire resulting derived work is distributed under the terms of a
|
---|
775 | permission notice identical to this one.
|
---|
776 |
|
---|