The following performs an integrity check to discover what files have been added, deleted or modified and the results are recorded.
# /usr/sbin/tripwire --check
Parsing policy file: /etc/tripwire/tw.pol
*** Processing Unix File System ***
Performing integrity check...
### Warning: File system error.
### Filename: /root/.esd_auth
### No such file or directory
### Continuing...
### Warning: File system error.
### Filename: /root/.gnome_private
### No such file or directory
### Continuing...
...
...
...
### Warning: File system error.
### Filename: /bin/ksh
### No such file or directory
### Continuing...
Wrote report file: /var/lib/tripwire/report/leonardo-20040214-130530.twr
Tripwire(R) 2.3.0 Integrity Check Report
Report generated by: root
Report created on: Sat 14 Feb 2004 01:05:30 PM EST
Database last updated on: Never
===============================================================================
Report Summary:
===============================================================================
Host name: yourmachinename
Host IP address: 192.168.0.3
Host ID: None
Policy file used: /etc/tripwire/tw.pol
Configuration file used: /etc/tripwire/tw.cfg
Database file used: /var/lib/tripwire/yourmachinename.twd
Command line used: /usr/sbin/tripwire --check
===============================================================================
Rule Summary:
===============================================================================
-------------------------------------------------------------------------------
Section: Unix File System
-------------------------------------------------------------------------------
Rule Name Severity Level Added Removed Modified
--------- -------------- ----- ------- --------
Invariant Directories 66 0 0 0
Critical devices 100 0 0 0
Temporary directories 33 0 0 0
Tripwire Data Files 100 0 0 0
Root config files 100 0 0 0
User binaries 66 0 0 0
Tripwire Binaries 100 0 0 0
Critical configuration files 100 0 0 0
Libraries 66 0 0 0
Operating System Utilities 100 0 0 0
Critical system boot files 100 0 0 0
File System and Disk Administraton Programs
100 0 0 0
Kernel Administration Programs 100 0 0 0
Networking Programs 100 0 0 0
System Administration Programs 100 0 0 0
Hardware and Device Control Programs
100 0 0 0
System Information Programs 100 0 0 0
Application Information Programs
100 0 0 0
Shell Related Programs 100 0 0 0
Critical Utility Sym-Links 100 0 0 0
Shell Binaries 100 0 0 0
System boot changes 100 0 0 0
OS executables and libraries 100 0 0 0
Security Control 100 0 0 0
Login Scripts 100 0 0 0
Total objects scanned: 34645
Total violations found: 0
===============================================================================
Object Summary:
===============================================================================
-------------------------------------------------------------------------------
# Section: Unix File System
-------------------------------------------------------------------------------
No violations.
===============================================================================
Error Report:
===============================================================================
-------------------------------------------------------------------------------
Section: Unix File System
-------------------------------------------------------------------------------
1. File system error.
Filename: /root/.esd_auth
No such file or directory
2. File system error.
Filename: /root/.gnome_private
No such file or directory
...
...
...
106. File system error.
Filename: /bin/ksh
No such file or directory
-------------------------------------------------------------------------------
*** End of report ***
Tripwire 2.3 Portions copyright 2000 Tripwire, Inc. Tripwire is a registered
trademark of Tripwire, Inc. This software comes with ABSOLUTELY NO WARRANTY;
for details use --version. This is free software which may be redistributed
or modified only under certain conditions; see COPYING for details.
All rights reserved.
Integrity check complete.
We can check the report of the tripwire --check command. Each tripwire --check command writes a .twr file with a specific timestamp. So in the following command, substitute appropriate timestamp.
# /usr/sbin/twprint -m r --twrfile /var/lib/tripwire/report/yourmachinename-date-time.twr | lessIf any violation reported is due to normal system activities, you should examine the policy file, twpol.txt, and make the appropriate changes. However there may be violations due user activities. To fix these kind of violations, you have to run an update. The following command updates the database so that all files will have updated values. Subsequent use of tripwire --check won't report those files as violations.
# /usr/sbin/tripwire --update --twrfile /var/lib/tripwire/report/yourmachinename-date-time.twr
You can change the way that Tripwire software scans the system by changing the rules in the policy file and then update the database without a complete re-initialization. This saves a significant amount of time and preserves security by keeping the policy file synchronized with the database it uses. To do this,
# /usr/sbin/tripwire --update-policy /etc/tripwire/twpol.txt