Imported Upstream version 4.01.05
Frank B. Brokken
8 years ago
0 | 0 |
#define AUTHOR "Frank B. Brokken (f.b.brokken@rug.nl)";
|
1 | |
#define VERSION "4.01.04"
|
2 | |
#define YEARS "2005-2015"
|
|
1 |
#define VERSION "4.01.05"
|
|
2 |
#define YEARS "2005-2016"
|
|
0 |
stealth (4.01.05)
|
|
1 |
|
|
2 |
* Fixed typos reported by Lintian
|
|
3 |
|
|
4 |
* Updated the overview of required software in 'required'
|
|
5 |
|
|
6 |
-- Frank B. Brokken <f.b.brokken@rug.nl> Sat, 14 May 2016 14:16:00 +0530
|
|
7 |
|
0 | 8 |
stealth (4.01.04)
|
1 | 9 |
|
2 | 10 |
* Streamlined the `build install' actions
|
83 | 83 |
thereafter. This, too, makes it important to prevent the monitor from being
|
84 | 84 |
accessed by unauthorized persons.)
|
85 | 85 |
|
86 | |
If, instead of running s() in deamon mode it is preferred to let s() perform
|
|
86 |
If, instead of running s() in daemon mode it is preferred to let s() perform
|
87 | 87 |
single, but automated integrity scans, then new bf(ssh)(1) connections may be
|
88 | 88 |
difficult to establish if the used ssh-key is passphrase-protected. To
|
89 | 89 |
implement this scenario (i.e., automated integrity scans using passphrase
|
|
159 | 159 |
shows a prompt (i.e., `tt(? )') and terminates after pressing the
|
160 | 160 |
tt(Enter)-key.
|
161 | 161 |
|
162 | |
The third synopsys is used for communication with a s() daemon. In this case
|
|
162 |
The third synopsis is used for communication with a s() daemon. In this case
|
163 | 163 |
the the Unix Domain Socket defined by the s() daemon process must be
|
164 | 164 |
specified after the option specifying the requested command.
|
165 | 165 |
|
16 | 16 |
In the user's tt(.ssh) directory the files tt(id_rsa) and tt(id_rsa.pub)
|
17 | 17 |
are now created, which completes the preparations at the monitor.
|
18 | 18 |
|
19 | |
If, instead of running s() in deamon mode it is preferred to let s() perform
|
|
19 |
If, instead of running s() in daemon mode it is preferred to let s() perform
|
20 | 20 |
single, but automated integrity scans, then new bf(ssh)(1) connections may be
|
21 | 21 |
difficult to establish if the used ssh-key is passphrase-protected. To
|
22 | 22 |
implement this scenario (i.e., automated integrity scans using passphrase
|
59 | 59 |
performed. This option requires specification of the and tt(--daemon)
|
60 | 60 |
option;
|
61 | 61 |
it() tt(--rerun <uds>): (C) start executing the integrity scan
|
62 | |
commands that are specifed in the s() daemon process's policy file;
|
|
62 |
commands that are specified in the s() daemon process's policy file;
|
63 | 63 |
it() tt(--resume <uds>): (C) resume a suspended s() process, implies
|
64 | 64 |
tt(--rerun);
|
65 | 65 |
it() tt(--run-command (-r) <nr>): (C) Only execute command number <nr>
|
4 | 4 |
Required software for building Stealth:
|
5 | 5 |
---------------------------------------
|
6 | 6 |
|
7 | |
libbobcat-dev (>= 4.01.03)
|
8 | |
icmake (>= 8.00.05)
|
9 | |
yodl (>= 3.06.0)
|
|
7 |
libbobcat-dev (>= 4.02.00)
|
|
8 |
icmake (>= 8.01.00)
|
|
9 |
yodl (>= 3.08.01)
|
10 | 10 |
|
11 | 11 |
To construct the user guide:
|
12 | 12 |
|
3 | 3 |
{
|
4 | 4 |
ostringstream ostr;
|
5 | 5 |
|
6 | |
ostr << "Stealth deamon (pid = " << getpid() << "): `" << request <<
|
|
6 |
ostr << "Stealth daemon (pid = " << getpid() << "): `" << request <<
|
7 | 7 |
"' not available in mode " << d_task;
|
8 | 8 |
|
9 | 9 |
|