For a complete list of the available checking options, see
/usr/share/doc/
packages/aide/manual.html
Before you can start using AIDE, you have to define which files should be checked
with what checking options. The definition of the file selection needs some knowledge
about regular expression. There are three major possibilities to define the files to be
checked. These are defined by the first letter of each line that defines a file selection:
/
Check if a file matches the following regular expression.
=
Select only the file that directly match the file specified after the
=
. Note, for direc-
tories you should not use a trialing “/”.
!
This is similar to the selection with
/
but defines which files not to use.
A configuration, that checks for all files in
/sbin
with the options defined in
Binlib
but omits the directory
/sbin/conf.d
would look like the following:
/sbin
Binlib
!/sbin/conf.d
After creating the configuration file
/etc/aide.conf
, first check if the configuration
is sane with the command:
aide --config-check
Any output of this command is a hint that the configuration is not alright. For example,
if you get the following output:
aide --config-check
35:syntax error:!
35:Error while reading configuration:!
Configuration error
The error is to be expected in line 36 of
/etc/aide.conf
. Note, that the error
message contains the last successfully read line of the configuration file.
To actually initialize the AIDE database, run the command:
aide -i
Intrusion Detection with AIDE
155
Содержание LINUX ENTERPRISE DESKTOP 11
Страница 1: ...SUSE Linux Enterprise Server www novell com 11 March 17 2009 Security Guide...
Страница 9: ...32 7 Managing Audit Event Records Using Keys 433 33 Useful Resources 435...
Страница 10: ......
Страница 29: ...Part I Authentication...
Страница 30: ......
Страница 55: ...Figure 4 2 YaST LDAP Server Configuration LDAP A Directory Service 41...
Страница 126: ......
Страница 127: ...Part II Local Security...
Страница 128: ......
Страница 158: ......
Страница 173: ...Part III Network Security...
Страница 174: ......
Страница 194: ......
Страница 197: ...Figure 16 2 Scenario 2 Figure 16 3 Scenario 3 Configuring VPN Server 183...
Страница 210: ......
Страница 228: ......
Страница 229: ...Part IV Confining Privileges with Novell AppArmor...
Страница 230: ......
Страница 274: ......
Страница 300: ......
Страница 328: ......
Страница 340: ......
Страница 342: ......
Страница 386: ......
Страница 387: ...Part V The Linux Audit Framework...
Страница 388: ......