Codebase list stealth / 05a9ae4
Imported Upstream version 4.01.05 Frank B. Brokken 8 years ago
7 changed file(s) with 18 addition(s) and 10 deletion(s). Raw diff Collapse all Expand all
00 #define AUTHOR "Frank B. Brokken (f.b.brokken@rug.nl)";
1 #define VERSION "4.01.04"
2 #define YEARS "2005-2015"
1 #define VERSION "4.01.05"
2 #define YEARS "2005-2016"
0 stealth (4.01.05)
1
2 * Fixed typos reported by Lintian
3
4 * Updated the overview of required software in 'required'
5
6 -- Frank B. Brokken <f.b.brokken@rug.nl> Sat, 14 May 2016 14:16:00 +0530
7
08 stealth (4.01.04)
19
210 * Streamlined the `build install' actions
8383 thereafter. This, too, makes it important to prevent the monitor from being
8484 accessed by unauthorized persons.)
8585
86 If, instead of running s() in deamon mode it is preferred to let s() perform
86 If, instead of running s() in daemon mode it is preferred to let s() perform
8787 single, but automated integrity scans, then new bf(ssh)(1) connections may be
8888 difficult to establish if the used ssh-key is passphrase-protected. To
8989 implement this scenario (i.e., automated integrity scans using passphrase
159159 shows a prompt (i.e., `tt(? )') and terminates after pressing the
160160 tt(Enter)-key.
161161
162 The third synopsys is used for communication with a s() daemon. In this case
162 The third synopsis is used for communication with a s() daemon. In this case
163163 the the Unix Domain Socket defined by the s() daemon process must be
164164 specified after the option specifying the requested command.
165165
1616 In the user's tt(.ssh) directory the files tt(id_rsa) and tt(id_rsa.pub)
1717 are now created, which completes the preparations at the monitor.
1818
19 If, instead of running s() in deamon mode it is preferred to let s() perform
19 If, instead of running s() in daemon mode it is preferred to let s() perform
2020 single, but automated integrity scans, then new bf(ssh)(1) connections may be
2121 difficult to establish if the used ssh-key is passphrase-protected. To
2222 implement this scenario (i.e., automated integrity scans using passphrase
5959 performed. This option requires specification of the and tt(--daemon)
6060 option;
6161 it() tt(--rerun <uds>): (C) start executing the integrity scan
62 commands that are specifed in the s() daemon process's policy file;
62 commands that are specified in the s() daemon process's policy file;
6363 it() tt(--resume <uds>): (C) resume a suspended s() process, implies
6464 tt(--rerun);
6565 it() tt(--run-command (-r) <nr>): (C) Only execute command number <nr>
44 Required software for building Stealth:
55 ---------------------------------------
66
7 libbobcat-dev (>= 4.01.03)
8 icmake (>= 8.00.05)
9 yodl (>= 3.06.0)
7 libbobcat-dev (>= 4.02.00)
8 icmake (>= 8.01.00)
9 yodl (>= 3.08.01)
1010
1111 To construct the user guide:
1212
33 {
44 ostringstream ostr;
55
6 ostr << "Stealth deamon (pid = " << getpid() << "): `" << request <<
6 ostr << "Stealth daemon (pid = " << getpid() << "): `" << request <<
77 "' not available in mode " << d_task;
88
99