⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 peochk.8

📁 MSyslog是一个允许在Linux下运行的网络系统日志程序
💻 8
字号:
.\"	$CoreSDI: peochk.8,v 1.18 2001/11/20 05:46:42 alejo Exp $.\".\" Copyright (c) 2001.\"	Core-SDI SA. All rights reserved..\".\" Redistribution and use in source and binary forms, with or without.\" modification, are permitted provided that the following conditions.\" are met:.\" 1. Redistributions of source code must retain the above copyright.\"    notice, this list of conditions and the following disclaimer..\" 2. Redistributions in binary form must reproduce the above copyright.\"    notice, this list of conditions and the following disclaimer in the.\"    documentation and/or other materials provided with the distribution..\" 3. Neither the name of Core-SDI SA nor the names of its contributors.\"    may be used to endorse or promote products derived from this software.\"    without specific prior written permission..\".\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.\" ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION).\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF.\" SUCH DAMAGE..\".Dd May 10, 2000.Dt PEOCHK 8.Os Core-SDI.Sh NAME.Nm peochk.Nd Initial key generator and integrity log file checker.Sh SYNOPSIS.Nm peochk.Op Fl f Ar logfile.Op Fl g.Op Fl h.Op Fl i Ar key0file.Op Fl k Ar keyfile.Op Fl l.Op Fl m Ar hash_method.Op Fl q.Op Ar logfile.Sh DESCRIPTION.Nm peochkgenerates the initial key file and checks log files generated by.Xr syslogd 8using.Em peo output module.Xr om_peo 8 .The options are as follows:.Bl -tag -width Ds.It Fl f Ar logfileSpecify the pathname of a log file, if.Ar logfileis not specified using this option, data is read from standard inputand the pathname is used only to generate reports and/or to obtain thekey files pathnames when the.Fl kand/or.Fl ioptions are not specified; the default is.Pa /var/log/messages ..It Fl gGenerates two key files with an initial key into them, one in binary mode(.Ar keyfile ,to be used by.Em peo output module) and the other in ascii mode (.Ar key0file), the admin should put thelast one into a secure place and remove it from the specified path (see .Fl iand .Fl koptions); when this option is not specified.Nmis in check mode..It Fl hDisplays a little help..It Fl i Ar key0fileSpecify the initial key pathname; the default is.Ar keyfilepathname with a "0" char added at the end (see .Fl koption)..It Fl k Ar keyfileSpecify the key pathname (this file is used by the.Em peo output moduleto generate a hash key from the last logged message); the default is.Pa /var/ssyslogd/xxx.keywhere .Pa xxxis.Ar logfile(specified with .Fl foption or without it) with all '/' replaced by '.'..It Fl lUsed only in check mode to detect the first corrupted line; it is ignoredwhen specified with the.Fl goption..It Fl m Ar hash_methodSpecifies the hash method used to generate the keys,.Ar hash_methodshould be one of .Cm md5, sha1,or.Cm rmd160;the default is.Cm sha1..It Fl qQuiet mode; prints '0' on stdout when logfile is not corrupted, and '1' orline number (see .Fl loption) when the logfile is corrupted..El.Sh EXAMPLESIf you want to protect the.Pa /var/log/authlogfile you can:.Pp.Bl -enum.Itrun the command:.Pp.Dl peochk -g -f /var/log/authlog -i authkey0 -m rmd160.Ppthis will generate the.Pa /var/ssylog/var.log.authlog.keyfile with the initial key in binary mode and the.Ar ./authkey0file with that key translated to ascii, the hash method used to generatethe key is.Cm rmd160;you should memorice the contents of.Ar ./authkey0file and.Xr rm 1it..Pp.ItEdit.Xr syslog.conf 5file and enable.Em peo output modulewith something like this:.Pp.Dl auth.info	%classic /var/log/authlog %peo -m rmd160 -l -k /var/ssyslog/.var.log.authlog.key.Pp.ItInform new changes on.Xr syslog.conf 5to.Xr syslogd 8 :.Pp.Dl kill -HUP `cat /var/run/syslog.pid`.Pp.ItWhen you believe that someone owned your machine you can:.Pp.Dl peochk -m rmd160 -f /var/log/authlog -i mykey.Ppthe contents of.Ar mykeyshould be the same as .Ar ./authkey0generated in step 1; with the command above you can verify that thefile was (or not) corrupted (it is important not to forget the .Fl moption because the default used is .Cm sha1and the keys generated was using .Cm rmd160)..El.Sh SEE ALSO.Xr syslog.conf 5 ,.Xr om_peo 8 ,.Xr syslogd 8.Sh BUGSSubmit bugs at this project's Sourceforge Bug reporting system at:http://sourceforge.net/tracker/?func=add&group_id=25741&atid=385117You may also report them directly to the authors; send an email tocore.devel.alat@corest.com, describing the problem the most you can,containing also machine description, hardware description, theconfiguration file (/etc/syslog.conf), the OS description, and theinvoking command line.The more you describe the bug, the faster we can fix it.

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -