LinuxQuestions.org
Welcome to the most active Linux Forum on the web.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 06-09-2011, 02:52 AM   #1
Tekth
LQ Newbie
 
Registered: May 2011
Location: CA, USA
Distribution: OpenSuse
Posts: 9

Rep: Reputation: 10
Question Minimizing Aide's presence?


I have just started playing around with Aide as I am new to this form of security monitoring. I have Aide installed and configured somewhat, however I read, everywhere pretty much, that I need to have the binaries on a removable read only medium so that I can run Aide from there but not have anyone really know that it exists.

Ill be honest, Im not really sure how to implement this now that I have Aide installed already. I know where the configuration file, and database files are, but thats pretty much it. I have done some considerable searching in my file system and still havent been able to find any other files associated with Aide's operation.

1) Is it possible to maintain the current installation of Aide while performing this mobilization of Aide's associated files to separate media?
2) What files are necessary to copy over to this separate media in order to make Aide fully functional?
3) Once I have the files copied over onto a cd or something, can I just remove them from my computers file system? Do I need to tell the file system their location has changed?

I will keep reading up on this, but any help is greatly appreciated!
 
Old 06-10-2011, 04:02 PM   #2
Tekth
LQ Newbie
 
Registered: May 2011
Location: CA, USA
Distribution: OpenSuse
Posts: 9

Original Poster
Rep: Reputation: 10
1) located the binary using: which aide
2) copied the binary to desired location
3) added the location to $PATH

now which shows the location of aide as being my new custom location
 
Old 06-11-2011, 06:42 AM   #3
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
Quote:
Originally Posted by Tekth View Post
I read, everywhere pretty much, that I need to have the binaries on a removable read only medium so that I can run Aide from there but not have anyone really know that it exists.
The idea behind it is that an intruder should have no clues as to what detection you run and that you will always have independent and known good means of verification.


Quote:
Originally Posted by Tekth View Post
Is it possible to maintain the current installation of Aide while performing this mobilization of Aide's associated files to separate media?
If you're using a floppy or USB stick then the only things you need to do is to copy your aide binary, aide.conf and aide.db(.gz) to your preferred medium and edit aide.conf to point it to the database there but note that aide, if it was not compiled as a static binary depends on system libraries which may be or become subject to unexpected alteration. If you OTOH use some bootable medium then copying over those dependencies (and busybox!) will safeguard them against alteration but you should also adjust the mount points to check in your aide.conf too as "/" will be the root of the Live file system.


Quote:
Originally Posted by Tekth View Post
Once I have the files copied over onto a cd or something, can I just remove them from my computers file system? Do I need to tell the file system their location has changed?
(Looking at CDROM deterioration why not extract a Live CDROM image, adjust contents and make your USB stick boot it using GRUB?) Yes, you can remove the files from your computer but I'd keep the removable medium as backup, I wouldn't alter any system paths for it and only use it in case you have suspicions. Also note that if you have more than one computer that Samhain provides a client-server setup where you can store hash databases on the server (provided it's properly secured and audited regularly) and request the clients database from there if you need to run checks. Another way could be to use webjob which can download (even over SSL) a binary, database and control file to run onto a not or no longer trusted client (though note unexpected system alteration then may still thwart operations).
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Detect presence of a file s8utt Linux - Newbie 6 05-20-2009 05:41 AM
Can someone post a sample aide.conf file here? For AIDE IDS abefroman Linux - Security 9 04-12-2008 08:18 AM
Does Your Old School Have A Web Presence? XavierP General 16 05-24-2005 07:40 AM
aide cuckoopint Linux - Security 3 04-22-2003 02:50 PM
how to detect floppy presence Shirley Linux - General 1 05-15-2002 07:14 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 02:57 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration