tripwire:configure_tripwire
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
tripwire:configure_tripwire [2016/11/20 12:55] – peter | tripwire:configure_tripwire [2019/12/04 21:52] (current) – removed peter | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | ====== Tripwire - Configure Tripwire ====== | ||
- | |||
- | The default configuration should be adjusted. | ||
- | |||
- | Run a check and place the files listed into a file called test_results in our tripwire config directory: | ||
- | |||
- | <code bash> | ||
- | cd / | ||
- | tripwire --check | grep Filename > test_results | ||
- | </ | ||
- | |||
- | If we view this file, we should see entries that look like this: | ||
- | |||
- | <code bash> | ||
- | less / | ||
- | </ | ||
- | |||
- | result | ||
- | |||
- | < | ||
- | Filename: / | ||
- | Filename: /root/mail | ||
- | Filename: /root/Mail | ||
- | Filename: / | ||
- | . . . | ||
- | </ | ||
- | |||
- | |||
- | |||
- | ===== Configure the Policy File to Match Your System ===== | ||
- | |||
- | Now that we have a list of files that are setting off tripwire, we can go through our policy file and edit it to get rid of these false positives. | ||
- | |||
- | Open the plain text policy in your editor with root privileges: | ||
- | |||
- | <code bash> | ||
- | sudo vi / | ||
- | </ | ||
- | |||
- | Do a search for each of the files that were returned in the test_results file. Comment out all of the lines that you find that match. | ||
- | |||
- | In the **" | ||
- | |||
- | <file bash / | ||
- | ( | ||
- | rulename = "Boot Scripts", | ||
- | severity = $(SIG_HI) | ||
- | ) | ||
- | { | ||
- | / | ||
- | #/ | ||
- | / | ||
- | </ | ||
- | |||
- | There were a lot of files in the /root home directory that needed to be commented out on my system. | ||
- | |||
- | <file bash / | ||
- | ( | ||
- | rulename = "Root config files", | ||
- | severity = 100 | ||
- | ) | ||
- | { | ||
- | /root -> $(SEC_CRIT) ; # Catch all additions to /root | ||
- | #/ | ||
- | #/ | ||
- | #/ | ||
- | #/ | ||
- | #/ | ||
- | #/ | ||
- | #/ | ||
- | #/ | ||
- | #/ | ||
- | #/ | ||
- | #/ | ||
- | #/ | ||
- | #/ | ||
- | #/ | ||
- | / | ||
- | #/ | ||
- | #/ | ||
- | / | ||
- | #/ | ||
- | #/ | ||
- | #/ | ||
- | #/ | ||
- | #/ | ||
- | #/ | ||
- | } | ||
- | </ | ||
- | |||
- | The last part of my check was complaining about file descriptors in the /proc filesystem. These files change all of the time, so will trigger false positives regularly if we leave the configuration as is. | ||
- | |||
- | In the " | ||
- | |||
- | <file bash / | ||
- | ( | ||
- | rulename = " | ||
- | severity = $(SIG_HI), | ||
- | ) | ||
- | { | ||
- | /dev -> $(Device) ; | ||
- | /proc -> $(Device) ; | ||
- | } | ||
- | </ | ||
- | |||
- | However, this will check every file under it. We don't particularly want that. Instead, we will remove this specification, | ||
- | |||
- | <file bash / | ||
- | { | ||
- | /dev -> $(Device) ; | ||
- | #/ | ||
- | / | ||
- | / | ||
- | / | ||
- | / | ||
- | / | ||
- | / | ||
- | / | ||
- | / | ||
- | / | ||
- | / | ||
- | / | ||
- | / | ||
- | / | ||
- | / | ||
- | / | ||
- | / | ||
- | / | ||
- | / | ||
- | / | ||
- | / | ||
- | / | ||
- | } | ||
- | </ | ||
- | |||
- | While we are in this portion of the file, we also want to do something with the /dev/pts filesystem. Tripwire will not check that location by default because it is told to check /dev, and /dev/pts is on a separate filesystem, which it will not enter unless specified. To get tripwire to check this as well, we can explicitly name it here: | ||
- | |||
- | <file bash / | ||
- | { | ||
- | /dev -> $(Device) ; | ||
- | / | ||
- | #/ | ||
- | / | ||
- | / | ||
- | / | ||
- | . . . | ||
- | </ | ||
- | |||
- | The last thing we will comment out are the /var/run and /var/lock lines so that our system does not flag normal filesystem changes by services: | ||
- | |||
- | <file bash / | ||
- | ( | ||
- | rulename = " | ||
- | severity = $(SIG_HI) | ||
- | ) | ||
- | { | ||
- | #/ | ||
- | #/ | ||
- | / | ||
- | } | ||
- | </ | ||
- | |||
- | Save and close the file when you are finished editing. | ||
- | |||
- | Now that our file is configured, we need to implement it by recreating the encrypted policy file that tripwire actually reads: | ||
- | |||
- | <code bash> | ||
- | sudo twadmin -m P / | ||
- | </ | ||
- | |||
- | After this is created, we must reinitialize the database to implement our policy: | ||
- | |||
- | <code bash> | ||
- | sudo tripwire --init | ||
- | </ | ||
- | |||
- | shows | ||
- | |||
- | < | ||
- | Please enter your local passphrase: | ||
- | Parsing policy file: / | ||
- | Generating the database... | ||
- | *** Processing Unix File System *** | ||
- | Wrote database file: / | ||
- | The database was successfully generated. | ||
- | </ | ||
- | |||
- | All of the warnings that you received earlier should be gone now. If there are still warnings, you should continue editing your / | ||
- | |||
tripwire/configure_tripwire.1479646555.txt.gz · Last modified: 2020/07/15 09:30 (external edit)