PIKT

Samples: File Checksums

PIKT Logo
Home FAQ News Intro Samples Tutorial Reference Software Authors Licensing SiteSearch


This security_checksums_objects.cfg example specifies MD5 checksums and file sizes for use by the ChecksumDifferenceCritical script, which uses this information to report unexpected checksum and/or file size changes, perhaps indicative of hacker activity.  Note how the #include directives incorporate several different sets of checksums, for example checksums_piktbin_objects.cfg and checksums_suse_linux_objects.cfg.

///////////////////////////////////////////////////////////////////////////////
//
// security_objects.cfg
// 
///////////////////////////////////////////////////////////////////////////////

[other objects omitted...]

///////////////////////////////////////////////////////////////////////////////

Checksums

#verbatim <objects/adm/checksums_piktbin_objects.cfg>

#if suse
#  include <objects/adm/checksums_suse_linux_objects.cfg>
#endif

#if mandrake
#  include <objects/adm/checksums_mandrake_linux_objects.cfg>
#endif

///////////////////////////////////////////////////////////////////////////////

[other objects omitted...]

///////////////////////////////////////////////////////////////////////////////
On the piktmaster system, we would install the Checksums.obj file to each PIKT slave system with the command:
# piktc -iv +O Checksums +H all        [or: ... -H downsys]

[For more examples, see Samples.]

Home | FAQ | News | Intro | Samples | Tutorial | Reference | Software | Authors | Licensing | SiteSearch
Links | SiteIndex | Pikt-Users | Pikt-Workers | Contribute | ContactUs | Top of Page
Page best viewed at 1024x768.   Page last updated 2005-06-22.
This site is PIKT® powered.
PIKT® is a registered trademark of the University of Chicago.
Copyright © 1998-2005 Robert Osterlund.  All rights reserved.

Computer Books at Amazon.com

Linux Firewalls
Linux Firewalls

Network Security Tools
Network Security Tools

Kerberos: The Definitive Guide
Kerberos: The Definitive Guide

Know Your Enemy: Learning about Security Threats
Know Your Enemy: Learning about Security Threats

Practical Unix & Internet Security
Practical Unix & Internet Security