Tripwire Report
Tripwire Report
SEMINAR REPORT
ON
“TRIPWIRE”
Submitted in partial fulfillment for the award of the degree
Bachelor of Technology
In
Information Technology Engineering
Session: 2010-2011
Department of Information Technology
Alwar Institute of Engineering & Technology
Affiliated to
Rajasthan Technical University, Kota
1
ACKNOWLEDGEMENT
It gives us a great sense of pleasure to present the seminar of the B. Tech during B.
Tech. Final Year. His sincerity, thoroughness and perseverance have been a
constant source of inspiration for us. It is only his cognizant efforts that our endeavors
have seen light of the day.
We also do not like to miss the opportunity to acknowledge the contribution of all
faculty members of the department for their kind assistance and cooperation during
the development of our seminar report. Last but not the least, we acknowledge our
friends for their contribution in the completion of the seminar report.
2
CERTIFICATE
This is to certify that Seminar Report entitled “Tripwire” which is submitted by Sanjeev
kumar yadav in partial fulfillment of the requirement for the award of degree B. Tech.
in Department of Information Technology of Rajasthan Technical University is a
record of the candidate own work carried out by him under my/our supervision. The
matter embodied in this thesis is original and has not been submitted for the award of
any other degree.
3
ABSTRACT
4
CONTENTS
1. INTRODUCTION……………………………………………………………………………….6
5. OPERATION OF TRIPWIRE…….………………………………………………………21
6. EXPERIENCES………………………………………………………………………………..26
7. ADVANTAGES…………………………………………………………………………………31
8. CONCLUSION…………………………………………………………………………….....32
9. REFERENCES………………………………………………………………………………….33
5
INTRODUCTION
6
that a file has changed. If you can identify the key subsets of these files and monitor
them on a daily basis, then we will be able to detect whether any intrusion took
place. Tripwire is an open source program created to monitor the changes in a key
subset of files identified by the user and report on any changes in any of those files.
When changes made are detected, the system administrator is informed. Tripwire ‘s
principle is very simple, the system administrator identifies key files and causes
tripwire to record checksum for those files. He also puts in place a cron job, whose
job is to scan those files at regular intervals (daily or more frequently), comparing to
the original checksum. Any changes, addition or deletion, are reported to the
administrator. The administrator will be able to determine whether the changes were
permitted or unauthorized changes. If it was the earlier case the n the database will
be updated so that in future the same violation wouldn’t be repeated. In the latter
case then proper recovery action would be taken immediately.
Motivation
A cautionary tale
Ellen runs a network of 50 networked Unix computers representing
nearly a dozen vendors – from PCs running Xenix to a Cray running Unicos. This
morning, when she logged in to her workstation, Ellen was a bit surprised when the
“lastlog” message indicated that “root” had logged into the system at 3 am. Ellen
thought she was the only one with the root password. Needless to say, this was not
something Ellen was happy to see. A bit more investigation revealed that someone –
certainly not Ellen – had logged on as "root," not only on her machine but also on
several other machines in her company. Unfortunately, the intruder deleted all the
accounting and audit files just before logging out of each machine. Ellen suspects that
the intruder (or intruders) ran the compiler and editor on several of the machines.
Being concerned about security, Ellen is worried that the intruder may have thus
changed one or more system files, thus enabling future unauthorized access as well
as compromising sensitive information. How can she tell which files have been altered
7
without restoring each system from backups? Poor Ellen is faced with one of the most
tedious and frustrating jobs a system administrator can have – determining which, if
any, files and programs have been altered without authorization. File modifications
may occur in a number of ways: an intruder, an authorized user violating local policy
or controls, or even the rare piece of malicious code altering system executables as
others are run. It might even be the case that some system hardware or software is
silently corrupting vital system data.
8
numerous shortcomings in these simple check listing schemes prevent them from
being completely trustworthy and useful. First, the list of files and associated
checksums may be tedious to maintain because of its size and lack of locality (files
are located all over the disk). Second, using timestamps, checksums, and file sizes
does not necessarily ensure the integrity of each file (e.g., once intruders gain root
privileges, they may alter timestamps and even the checklists at will). Furthermore,
changes to a file may be made without changing its length or checksum generated by
the sum(8) program. And this entire approach presumes that ls(1), sum(8), and the
other programs have not been compromised! In the case of a serious attack, a
conscientious administrator must not assume that these files have remained
unchanged without strong proof. But what proof can be offered that is sufficient for this
situation?
9
would be self-defeating – this is probably far too much to ask of even Ellen, our
amazingly dedicated system administrator! Thus, the program must allow the
specification of filesystem “exceptions” that can change without being reported, and
hence reduce “noise.” For example, changes in system log file sizes are expected, but
a change in inode number, ownership, or file modes is cause for alarm. However, a
change in any value stored in the inodes (except for the access timestamp) for system
binaries in /bin should be reported. Properly specified, the integrity checker should
operate unobtrusively, notifying Ellen when a file changes outside the specified
bounds. Finally, assuming that Ellen wants to run the integrity checker on every
machine in her network, the integrity checker should allow the reuse and sharing of
configuration files wherever possible. For example, if Ellen has twenty identical
workstations, they should be able to share a common configuration file, even allowing
machine-specific oddities (i.e., some software package installed on only one
machine). The configuration should thus support reuse to reduces the opportunity for
operator error.
1
0
BASIC PURPOSE OF TRIPWIRE
1
1
TRIPWIRE RELATED TOPICS
1
2
TRIPWIRE FOR SERVERS
1
3
specifying the file type. In 4.0, objects listed in the policy file but not present on the
user’s machine will no longer be categorized as violations. By only showing
violations caused by added, deleted or changed files, report noise is greatly
reduced. Tripwire policy languages also allow you to group objects around easy-to-
understand rule names and then prioritize them.
The snapshot and the policy file are cryptographically signed with
168-bit Triple DES encryption algorithm that detects any unauthorized tampering.
The default policy file also monitors the tripwire binary files, in short, it uses tripwire
itself to monitor the tripwire.
Each Tripwire for Servers report details when the database was
last updated, providing a quick benchmark of if or when detailing if the data files
have been replaced. In order to replace these files, an attacker requires root or
administrator level privileges and must know where Tripwire for Servers has been
installed. On a properly secured system, gaining this level of access takes time and
leaves physical evidence behind for Tripwire for Servers to detect prior to the
1
4
system being compromised. Methods for reducing the risk of an intruder being able
to replace a Tripwire for Servers installation include:
1
5
TRIPWIRE MANAGER
1
6
There are mainly two types of Tripwire Manager
A user can have more than one Tripwire Manager managing the
same set of Tripwire for Servers machines. However, only one can be in active mode
and have complete management control of Tripwire for Servers machines. This
active Tripwire Manager gives a user the ability to update the database, schedule
integrity checks, update and distribute policy and configuration files and view integrity
reports. The other Tripwire Manager are in a passive mode. The passive mode only
allows these Tripwire Manager to view the status of the machines and integrity
reports. Once the active Tripwire Manager shuts down, the next time the passive
Tripwire Manager pings the Tripwire for Servers machine it connects as an active
Tripwire Manager. If more than two passive Tripwire Managers, the one that
connects first to the Tripwire for Servers machine after the active Manager has hut
down becomes the active Manager.
1
7
TRIPWIRE FOR NETWORK DEVICES
1
8
Tripwire for Network Devices does not provide real time
monitoring. It checks your network devices for change according to schedule you set.
Device passwords stored by the software are protected by robust 1024-bit Blowfish
cryptography. The software has four user authorization levels:
1
9
10 minutes. With correct configuration, the software can monitor more than 6,000
devices at one time.
2
0
OPERATION OF TRIPWIRE
2
1
PROTECTING THE HIDS
2
2
FLOW CHART SHOWING THE WORKING OF TRIPWIRE
2
3
1. Install Tripwire and customize the policy file
Install the Tripwire software into the system and then specify the
files to be checked by writing the policy files. Using the version 4.0 writing the policy
file is made very easy.
2
4
6. If the file alterations were valid, verify and update the Tripwire database
file.
If the changes made to monitor files are intentional, edit Tripwire’s
database file to ignore those changes in subsequent report.
7. If the policy file fails verification, update the Tripwire policy file
To change the list of files Tripwire monitors or how it treats
integrity violations, update the supplied policy file, regenerate a signed copy, and
update the Tripwire database.
2
5
Experiences
Since the initial release, four versions have been released to incorporate bug fixes,
support additional platforms, and add new features. The authors estimate Tripwire is
being actively used at several thousand sites around the world. Retrievals of the
Tripwire distribution from our FTP server initially exceeded 300 per week. Currently,
seven months after the last official patch release, we see an average of 25 fetches per
week. This does not include the copies being obtained from the many FTP mirror sites
around the net. We have received considerable feedback on Tripwire design and
implementation. We believe that version 1.1 of Tripwire has succeeded in meeting
most of the goals of system administrators needing an integrity checking tool. Most of
the feedback that we received falls into one of the following categories: theory of
integrity checking workability, features needed, operational use of Tripwire.
2
6
files. This allows system administrators to easily add support for encryption and
compression without having to modify the Tripwire package so drastically. Instead, a
wrapper program (even a shell script) can be used to supply these facilities. It is
interesting to note that mistrust of networked file systems motivate the undertaking of
such modifications to Tripwire.
2
7
all machines, using the @@ifhost directive to segregate non-common file groups. We
suspect that the overhead of tracking multiple configuration files outweighs the
inconvenience caused by files obfuscated by many “@@ifdef” statements. These
shared configuration files are apparently still manageable, since the number of entries
in the file is not large. (We suspect that if files had to be individually enumerated,
these configuration files be far larger, and therefore unmanageable.) Tripwire has
proven scalable, with documented cases of sites of almost one thousand machines
running Tripwire, as well as sites of only one machine. That system administrators
have done so using a different mechanism than suggested in the design document is
especially interesting.
2
8
Validating the integrity checking scheme
We have gathered at least seven cases of sites who have detected intruders by using
Tripwire. In at least two of these cases, the penetration was widespread, with system
programs and libraries replaced with Trojan horses. Potentially less exciting than
these stories, but equally inspiring, are the dozens of stories we have received of sites
using Tripwire as a system administration enforcement tool. System administrators
report having found hundreds of program binaries changed, only to find that another
system administrator had made the changed without following local policy. There has
also been one reported case of a system administrator detecting a failing disk with
Tripwire. All three classes of stories seem to validate the theory behind integrity
checking programs. Although the foundations of integrity checkers have been
discussed in [1, 2, 4], when Tripwire design was started in May 1992, no usuable,
publically available integrity tools existed – undoubtedly providing one of the primary
motivations for writing Tripwire.
2
9
Tripwire despite its lack of ability to update the baseline database without regenerating
the entire database astounds the authors. In hindsight, at least.)
3
0
ADVANTAGES
• Increase security
Tripwire software immediately detects and pinpoints unauthorized
change-whether malicious or accidental, initiated externally or internally. Tripwire
provides the only way to know, with certainty, that systems remains uncompromised.
• Instill Accountability
Tripwire identifies and reports the sources of change, enabling IT
to “manage by fact.” It also captures an audit trail of changes to servers and network
devices.
• Gain Visibility
Tripwire software provides a centralized view of changes across
the enterprise infrastructure and support multiple devices from multiple vendors.
• Ensure Availability
Tripwire software reduces troubleshooting time, enabling rapid
discovery and recovery. Immediate detection of change enables the fastest possible
restoration back to a desired, good state.
3
1
CONCLUSION
3
2
REFERNECE
1. www.tripwire.com
2. www.iec.com
3. www.itpaper.com
4. Cryptography and network security – William Stallings
5. Operating System – SilberSchertz
6. Linux for you magazine
3
3
3
4