arisuchan    [ tech / cult / art ]   [ λ / Δ ]   [ psy ]   [ ru ]   [ random ]   [ meta ]   [ all ]    info / stickers     temporarily disabledtemporarily disabled

/cyb/ - cyberpunk and cybersecurity

low life. high tech. anonymity. privacy. security.
Name
Email
Subject
Comment

formatting options

File
Password (For file deletion.)

Help me fix this shit. https://legacy.arisuchan.jp/q/res/2703.html#2703

Kalyx ######


File: 1539546673872.png (1.29 MB, 1600x900, polybius-listingthumb-01-p….png)

 No.3419

I'm looking at deploying a server soon; I'm going to monitor the file system for any changes.

There is AIDE & Tripwire. I've ruled out Tripwire as it seems to be poorly maintained in favor of their commercial variant.

There are a lot of posts stating that it's best to automate the integrity checking using a cron job.

I personally see this as a risk; automating the check would mean the binary & database would need to be locally stored and/or not stored in an encrypted container.

How does alice go about monitoring changes to their system?

 No.3427

File: 1539778909641.jpg (23.25 KB, 1280x720, secret.jpg)

I really just rsync all my stuff and read the log. Usually there are only a couple changed files so the whole process takes like 5 to 10 seconds. I'm well aware that if this is about thousands of files that change every day this approach makes zero sense, but it works for me anyway.

 No.3456

I assume this is VPS or similar

in this case whomever owns your server ultimately can of course, modify something such that your automated system cannot tell, or in such a way that the local checking system doesnt trigger an alarm to you, if they are careful.

a reliable way would be to create say, a weekly file listing hashes of 'major files' on the system. kernel, libraries, data, config files, what have you. This could be a cron job.

On a seperate system you trust, you either sync this file each time, and check for hash changes, or even you could hash that file and keep a 'system hash'.

I just dont like the idea of maintaining the ultimate monitoring be on the untrusted system.



[Return] [Go to top] [ Catalog ] [Post a Reply]
Delete Post [ ]