Am Mittwoch, 18. Januar 2006 16:24 schrieb mir Johnson, Maurice E CTR 
NSWCDL-K74:
> A good host based IDS  (file integrity monitoring system) would
> record any system level changes made. 

No such IDS records any changes in *file systems* if the running 
software has no access to root privileges. That is a important 
difference.

> IT should be fairly trivial to 
> start of with a sterile environment prior to running your CSA and
> inspecting the environment afterwards.
>
> Try Tripwire or AID.

This is not a good idea because this IDS cannot monitor all system 
activities. The only reliable way to monitor all activities is to run 
this software in a sandbox.

Best Regards
Oli
-- 
gentoo-security@gentoo.org mailing list

Reply via email to