EPELソスソスソス|ソスWソスgソスソスソスソスソスソス(EPEL)ソスソスソスQソスニゑソスソスソスEPELソスソスソス|ソスWソスgソスソスソス導難ソスソスソスソスソス
[root@centos ~]# yum -y install tripwireソス@ソスソスソス@tripwireソスCソスソスソスXソスgソス[ソスソス
[root@centos ~]# tripwire-setup-keyfilesソス@ソスソスソス@tripwireソスソスソスソスソスン抵ソス
----------------------------------------------
The Tripwire site and local passphrases are used to sign a variety of
files, such as the configuration, policy, and database files.
Passphrases should be at least 8 characters in length and contain both
letters and numbers.
See the Tripwire manual for more information.
----------------------------------------------
Creating key files...
(When selecting a passphrase, keep in mind that good passphrases typically
have upper and lower case letters, digits and punctuation marks, and are
at least 8 characters in length.)
Enter the site keyfile passphrase:ソス@ソスソスソス@ソスCソスモのサソスCソスgソスpソスXソスtソスソスソス[ソスYソスソスソスソス
Verify the site keyfile passphrase:ソス@ソスソスソス@ソスCソスモのサソスCソスgソスpソスXソスtソスソスソス[ソスYソスソスソスソス(ソスmソスF)
Generating key (this may take several minutes)...Key generation complete.
(When selecting a passphrase, keep in mind that good passphrases typically
have upper and lower case letters, digits and punctuation marks, and are
at least 8 characters in length.)
Enter the local keyfile passphrase:ソス@ソスソスソス@ソスCソスモのソスソス[ソスJソスソスソスpソスXソスtソスソスソス[ソスYソスソスソスソス
Verify the local keyfile passphrase:ソス@ソスソスソス@ソスCソスモのソスソス[ソスJソスソスソスpソスXソスtソスソスソス[ソスYソスソスソスソス(ソスmソスF)
Generating key (this may take several minutes)...Key generation complete.
----------------------------------------------
Signing configuration file...
Please enter your site passphrase:ソス@ソスソスソス@ソスTソスCソスgソスpソスXソスtソスソスソス[ソスYソスソスソスソス
Wrote configuration file: /etc/tripwire/tw.cfg
A clear-text version of the Tripwire configuration file:
/etc/tripwire/twcfg.txt
has been preserved for your inspection. It is recommended that you
move this file to a secure location and/or encrypt it in place (using a
tool such as GPG, for example) after you have examined it.
----------------------------------------------
Signing policy file...
Please enter your site passphrase:ソス@ソスソスソス@ソスTソスCソスgソスpソスXソスtソスソスソス[ソスYソスソスソスソス
Wrote policy file: /etc/tripwire/tw.pol
A clear-text version of the Tripwire policy file:
/etc/tripwire/twpol.txt
has been preserved for your inspection. This implements a minimal
policy, intended only to test essential Tripwire functionality. You
should edit the policy file to describe your system, and then use
twadmin to generate a new signed copy of the Tripwire policy.
Once you have a satisfactory Tripwire policy file, you should move the
clear-text version to a secure location and/or encrypt it in place
(using a tool such as GPG, for example).
Now run "tripwire --init" to enter Database Initialization Mode. This
reads the policy file, generates a database based on its contents, and
then cryptographically signs the resulting database. Options can be
entered on the command line to specify which policy, configuration, and
key files are used to create the database. The filename for the
database can be specified as well. If no options are specified, the
default values from the current configuration file are used.
|
|