tripwire:configure_tripwire
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revision | |||
tripwire:configure_tripwire [2016/11/27 17:03] – peter | tripwire:configure_tripwire [2019/12/04 21:52] (current) – removed peter | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | ====== Tripwire - Configure Tripwire ====== | ||
- | |||
- | The default configuration should be adjusted. | ||
- | |||
- | Run a check and place the files listed into a file called test_results in our tripwire config directory: | ||
- | |||
- | <code bash> | ||
- | cd / | ||
- | tripwire --check | grep Filename > test_results | ||
- | </ | ||
- | |||
- | If we view this file, we should see entries that look like this: | ||
- | |||
- | <code bash> | ||
- | less / | ||
- | </ | ||
- | |||
- | result | ||
- | |||
- | < | ||
- | Filename: / | ||
- | Filename: /root/mail | ||
- | Filename: /root/Mail | ||
- | Filename: / | ||
- | . . . | ||
- | </ | ||
- | |||
- | |||
- | |||
- | ===== Configure the Policy File to Match Your System ===== | ||
- | |||
- | Now that we have a list of files that are setting off tripwire, we can go through our policy file and edit it to get rid of these false positives. | ||
- | |||
- | Open the plain text policy in your editor with root privileges: | ||
- | |||
- | <code bash> | ||
- | sudo vi / | ||
- | </ | ||
- | |||
- | Do a search for each of the files that were returned in the test_results file. Comment out all of the lines that you find that match. | ||
- | |||
- | In the **" | ||
- | |||
- | <file bash / | ||
- | ( | ||
- | rulename = "Boot Scripts", | ||
- | severity = $(SIG_HI) | ||
- | ) | ||
- | { | ||
- | / | ||
- | #/ | ||
- | / | ||
- | </ | ||
- | |||
- | There were a lot of files in the /root home directory that needed to be commented out on my system. | ||
- | |||
- | <file bash / | ||
- | ( | ||
- | rulename = "Root config files", | ||
- | severity = 100 | ||
- | ) | ||
- | { | ||
- | /root -> $(SEC_CRIT) ; # Catch all additions to /root | ||
- | #/ | ||
- | #/ | ||
- | #/ | ||
- | #/ | ||
- | #/ | ||
- | #/ | ||
- | #/ | ||
- | #/ | ||
- | #/ | ||
- | #/ | ||
- | #/ | ||
- | #/ | ||
- | #/ | ||
- | #/ | ||
- | / | ||
- | #/ | ||
- | #/ | ||
- | / | ||
- | #/ | ||
- | #/ | ||
- | #/ | ||
- | #/ | ||
- | #/ | ||
- | #/ | ||
- | } | ||
- | </ | ||
- | |||
- | The last part of my check was complaining about file descriptors in the /proc filesystem. These files change all of the time, so will trigger false positives regularly if we leave the configuration as is. | ||
- | |||
- | In the " | ||
- | |||
- | <file bash / | ||
- | ( | ||
- | rulename = " | ||
- | severity = $(SIG_HI), | ||
- | ) | ||
- | { | ||
- | /dev -> $(Device) ; | ||
- | /proc -> $(Device) ; | ||
- | } | ||
- | </ | ||
- | |||
- | However, this will check every file under it. We don't particularly want that. Instead, we will remove this specification, | ||
- | |||
- | <file bash / | ||
- | { | ||
- | /dev -> $(Device) ; | ||
- | #/ | ||
- | / | ||
- | / | ||
- | / | ||
- | / | ||
- | / | ||
- | / | ||
- | / | ||
- | / | ||
- | / | ||
- | / | ||
- | / | ||
- | / | ||
- | / | ||
- | / | ||
- | / | ||
- | / | ||
- | / | ||
- | / | ||
- | / | ||
- | / | ||
- | / | ||
- | } | ||
- | </ | ||
- | |||
- | While we are in this portion of the file, we also want to do something with the /dev/pts filesystem. Tripwire will not check that location by default because it is told to check /dev, and /dev/pts is on a separate filesystem, which it will not enter unless specified. To get tripwire to check this as well, we can explicitly name it here: | ||
- | |||
- | <file bash / | ||
- | { | ||
- | /dev -> $(Device) ; | ||
- | / | ||
- | #/ | ||
- | / | ||
- | / | ||
- | / | ||
- | . . . | ||
- | </ | ||
- | |||
- | The last thing we will comment out are the /var/run and /var/lock lines so that our system does not flag normal filesystem changes by services: | ||
- | |||
- | <file bash / | ||
- | ( | ||
- | rulename = " | ||
- | severity = $(SIG_HI) | ||
- | ) | ||
- | { | ||
- | #/ | ||
- | #/ | ||
- | / | ||
- | } | ||
- | </ | ||
- | |||
- | Save and close the file when you are finished editing. | ||
- | |||
- | Now that our file is configured, we need to implement it by recreating the encrypted policy file that tripwire actually reads: | ||
- | |||
- | <code bash> | ||
- | sudo twadmin -m P / | ||
- | </ | ||
- | |||
- | After this is created, we must reinitialize the database to implement our policy: | ||
- | |||
- | <code bash> | ||
- | sudo tripwire --init | ||
- | </ | ||
- | |||
- | shows | ||
- | |||
- | < | ||
- | Please enter your local passphrase: | ||
- | Parsing policy file: / | ||
- | Generating the database... | ||
- | *** Processing Unix File System *** | ||
- | Wrote database file: / | ||
- | The database was successfully generated. | ||
- | </ | ||
- | |||
- | All of the warnings that you received earlier should be gone now. If there are still warnings, you should continue editing your **/ | ||
- | |||
- | [[Tripwire: | ||
- | |||
- | |||
- | |||
- | |||
- | ===== Tidy Up ===== | ||
- | |||
- | Clean up our files a bit to remove sensitive information from our system. | ||
- | |||
- | We can delete the test_results file that we created: | ||
- | |||
- | <code bash> | ||
- | sudo rm / | ||
- | </ | ||
- | |||
- | Remove the actual plain text configuration files. | ||
- | |||
- | All we have to do to regenerate the plain text file is pass the encripted file to twadmin, in much the same way that we did to generate the encrypted version. | ||
- | |||
- | <code bash> | ||
- | sudo sh -c ' | ||
- | </ | ||
- | |||
- | Test this now by moving the text version to a backup location and then recreate it: | ||
- | |||
- | <code bash> | ||
- | sudo mv / | ||
- | sudo sh -c ' | ||
- | </ | ||
- | |||
- | If it worked correctly, you can safely remove the plain text files now: | ||
- | |||
- | <code bash> | ||
- | sudo rm / | ||
- | sudo rm / | ||
- | </ | ||
tripwire/configure_tripwire.1480266190.txt.gz · Last modified: 2020/07/15 09:30 (external edit)