rpm -V verify purpose The Next CEO of Stack Overflowrpm -Vf doesn't report a changed fileHow can I verify that a PGP key is imported into RPM?rpm --upgrade not upgrading?RPM package naming conventionRPM subpackage nameHow to verify the RPM database?How to verify one file of a package, not the RPM itselfRPM command stuck/FREEZE when installing RPM filerpm --verify does not inform about missing fileBuild “shadow” RPM database?rpm mock - complex rpm building

Rotate a column

Help understanding this unsettling image of Titan, Epimetheus, and Saturn's rings?

Why is quantifier elimination desirable for a given theory?

Proper way to express "He disappeared them"

How many extra stops do monopods offer for tele photographs?

What connection does MS Office have to Netscape Navigator?

Would a grinding machine be a simple and workable propulsion system for an interplanetary spacecraft?

RigExpert AA-35 - Interpreting The Information

Is wanting to ask what to write an indication that you need to change your story?

Axiom Schema vs Axiom

Would this house-rule that treats advantage as a +1 to the roll instead (and disadvantage as -1) and allows them to stack be balanced?

Would be okay to drive on this tire?

"misplaced omit" error when >centering columns

Is it my responsibility to learn a new technology in my own time my employer wants to implement?

Are police here, aren't itthey?

Is micro rebar a better way to reinforce concrete than rebar?

How to edit “Name” property in GCI output?

0 rank tensor vs 1D vector

Do I need to write [sic] when a number is less than 10 but isn't written out?

Example of a Mathematician/Physicist whose Other Publications during their PhD eclipsed their PhD Thesis

Is a distribution that is normal, but highly skewed considered Gaussian?

How to get from Geneva Airport to Metabief, Doubs, France by public transport?

Reference request: Grassmannian and Plucker coordinates in type B, C, D

How to install OpenCV on Raspbian Stretch?



rpm -V verify purpose



The Next CEO of Stack Overflowrpm -Vf doesn't report a changed fileHow can I verify that a PGP key is imported into RPM?rpm --upgrade not upgrading?RPM package naming conventionRPM subpackage nameHow to verify the RPM database?How to verify one file of a package, not the RPM itselfRPM command stuck/FREEZE when installing RPM filerpm --verify does not inform about missing fileBuild “shadow” RPM database?rpm mock - complex rpm building










2















I am told I should do rpm -Va because:



operating system must be configured so that the cryptographic hash of system files and commands matches vendor values... Without cryptographic integrity protections, system command and files can be altered by unauthorized users without detection



So a rpm -Va | grep '^..5' is done and if anything comes back that is supposed to be a problem.



From a clean install from DVD I can successfully meet that criteria.



However, I am also told to configure files such as /etc/ssh/sshd_config and /etc/audit/audit.rules not to mention some obvious other ones to make a system functional, and changing these of course results in these files not matching vendor values, thus the rpm -Va comes back with mainly S.5....T



Can someone explain the purpose or rationale of this? As well as how grep '^..5' is supposed to work? Is there a way to make this work such that -- yeah, I changed a .conf file, but have rpm be updated to not flag specified packages as having been altered?










share|improve this question




























    2















    I am told I should do rpm -Va because:



    operating system must be configured so that the cryptographic hash of system files and commands matches vendor values... Without cryptographic integrity protections, system command and files can be altered by unauthorized users without detection



    So a rpm -Va | grep '^..5' is done and if anything comes back that is supposed to be a problem.



    From a clean install from DVD I can successfully meet that criteria.



    However, I am also told to configure files such as /etc/ssh/sshd_config and /etc/audit/audit.rules not to mention some obvious other ones to make a system functional, and changing these of course results in these files not matching vendor values, thus the rpm -Va comes back with mainly S.5....T



    Can someone explain the purpose or rationale of this? As well as how grep '^..5' is supposed to work? Is there a way to make this work such that -- yeah, I changed a .conf file, but have rpm be updated to not flag specified packages as having been altered?










    share|improve this question


























      2












      2








      2








      I am told I should do rpm -Va because:



      operating system must be configured so that the cryptographic hash of system files and commands matches vendor values... Without cryptographic integrity protections, system command and files can be altered by unauthorized users without detection



      So a rpm -Va | grep '^..5' is done and if anything comes back that is supposed to be a problem.



      From a clean install from DVD I can successfully meet that criteria.



      However, I am also told to configure files such as /etc/ssh/sshd_config and /etc/audit/audit.rules not to mention some obvious other ones to make a system functional, and changing these of course results in these files not matching vendor values, thus the rpm -Va comes back with mainly S.5....T



      Can someone explain the purpose or rationale of this? As well as how grep '^..5' is supposed to work? Is there a way to make this work such that -- yeah, I changed a .conf file, but have rpm be updated to not flag specified packages as having been altered?










      share|improve this question
















      I am told I should do rpm -Va because:



      operating system must be configured so that the cryptographic hash of system files and commands matches vendor values... Without cryptographic integrity protections, system command and files can be altered by unauthorized users without detection



      So a rpm -Va | grep '^..5' is done and if anything comes back that is supposed to be a problem.



      From a clean install from DVD I can successfully meet that criteria.



      However, I am also told to configure files such as /etc/ssh/sshd_config and /etc/audit/audit.rules not to mention some obvious other ones to make a system functional, and changing these of course results in these files not matching vendor values, thus the rpm -Va comes back with mainly S.5....T



      Can someone explain the purpose or rationale of this? As well as how grep '^..5' is supposed to work? Is there a way to make this work such that -- yeah, I changed a .conf file, but have rpm be updated to not flag specified packages as having been altered?







      security rpm






      share|improve this question















      share|improve this question













      share|improve this question




      share|improve this question








      edited 2 days ago









      Jeff Schaller

      44.4k1162143




      44.4k1162143










      asked 2 days ago









      ronron

      1,1802817




      1,1802817




















          1 Answer
          1






          active

          oldest

          votes


















          1














          To take the easy part first, the grep '^..5 portion investigates the output for lines that start with any two characters followed by a 5. That 5 represents (from man rpm):




          5 digest (formerly MD5 sum) differs




          as a fairly good indicator that the corresponding file has changed.



          Next, I would encourage any rpm -Va | grep ... investigation to ignore config files. These are files, like you point out, that are intended to be changed by the system administrator. Luckily, they are indicated in the rpm -Va output with a c marker:




          The format of the output is a string of 9 characters, a possible attribute marker:



          c %config configuration file.
          d %doc documentation file.
          g %ghost file (i.e. the file contents are not included in the package payload).
          l %license license file.
          r %readme readme file.


          from the package header, followed by the file name.




          ... so I would consider something along the lines of:



          sudo rpm -Va | awk '/^..5/ && $2 != "c"'


          ... which ties together the grep ^..5 idea along with ignoring files that are classified as configuration files. Alternatively, you could capture every flagged line of output and then "whitelist" config files where you've accepted the risk of change -- then, you're alerted when a presumed-static config file changes.



          Without repackaging the RPM's, I do not know of a way to update the digest in the RPM database to indicate that you've changed a config file, which is why I suggest the above workarounds.






          share|improve this answer























          • I've just discovered meuh's answer here which goes into more detail regarding an RPM being able to exclude certain files from future verification.

            – Jeff Schaller
            2 days ago











          Your Answer








          StackExchange.ready(function()
          var channelOptions =
          tags: "".split(" "),
          id: "106"
          ;
          initTagRenderer("".split(" "), "".split(" "), channelOptions);

          StackExchange.using("externalEditor", function()
          // Have to fire editor after snippets, if snippets enabled
          if (StackExchange.settings.snippets.snippetsEnabled)
          StackExchange.using("snippets", function()
          createEditor();
          );

          else
          createEditor();

          );

          function createEditor()
          StackExchange.prepareEditor(
          heartbeatType: 'answer',
          autoActivateHeartbeat: false,
          convertImagesToLinks: false,
          noModals: true,
          showLowRepImageUploadWarning: true,
          reputationToPostImages: null,
          bindNavPrevention: true,
          postfix: "",
          imageUploader:
          brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
          contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
          allowUrls: true
          ,
          onDemand: true,
          discardSelector: ".discard-answer"
          ,immediatelyShowMarkdownHelp:true
          );



          );













          draft saved

          draft discarded


















          StackExchange.ready(
          function ()
          StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2funix.stackexchange.com%2fquestions%2f509282%2frpm-v-verify-purpose%23new-answer', 'question_page');

          );

          Post as a guest















          Required, but never shown

























          1 Answer
          1






          active

          oldest

          votes








          1 Answer
          1






          active

          oldest

          votes









          active

          oldest

          votes






          active

          oldest

          votes









          1














          To take the easy part first, the grep '^..5 portion investigates the output for lines that start with any two characters followed by a 5. That 5 represents (from man rpm):




          5 digest (formerly MD5 sum) differs




          as a fairly good indicator that the corresponding file has changed.



          Next, I would encourage any rpm -Va | grep ... investigation to ignore config files. These are files, like you point out, that are intended to be changed by the system administrator. Luckily, they are indicated in the rpm -Va output with a c marker:




          The format of the output is a string of 9 characters, a possible attribute marker:



          c %config configuration file.
          d %doc documentation file.
          g %ghost file (i.e. the file contents are not included in the package payload).
          l %license license file.
          r %readme readme file.


          from the package header, followed by the file name.




          ... so I would consider something along the lines of:



          sudo rpm -Va | awk '/^..5/ && $2 != "c"'


          ... which ties together the grep ^..5 idea along with ignoring files that are classified as configuration files. Alternatively, you could capture every flagged line of output and then "whitelist" config files where you've accepted the risk of change -- then, you're alerted when a presumed-static config file changes.



          Without repackaging the RPM's, I do not know of a way to update the digest in the RPM database to indicate that you've changed a config file, which is why I suggest the above workarounds.






          share|improve this answer























          • I've just discovered meuh's answer here which goes into more detail regarding an RPM being able to exclude certain files from future verification.

            – Jeff Schaller
            2 days ago















          1














          To take the easy part first, the grep '^..5 portion investigates the output for lines that start with any two characters followed by a 5. That 5 represents (from man rpm):




          5 digest (formerly MD5 sum) differs




          as a fairly good indicator that the corresponding file has changed.



          Next, I would encourage any rpm -Va | grep ... investigation to ignore config files. These are files, like you point out, that are intended to be changed by the system administrator. Luckily, they are indicated in the rpm -Va output with a c marker:




          The format of the output is a string of 9 characters, a possible attribute marker:



          c %config configuration file.
          d %doc documentation file.
          g %ghost file (i.e. the file contents are not included in the package payload).
          l %license license file.
          r %readme readme file.


          from the package header, followed by the file name.




          ... so I would consider something along the lines of:



          sudo rpm -Va | awk '/^..5/ && $2 != "c"'


          ... which ties together the grep ^..5 idea along with ignoring files that are classified as configuration files. Alternatively, you could capture every flagged line of output and then "whitelist" config files where you've accepted the risk of change -- then, you're alerted when a presumed-static config file changes.



          Without repackaging the RPM's, I do not know of a way to update the digest in the RPM database to indicate that you've changed a config file, which is why I suggest the above workarounds.






          share|improve this answer























          • I've just discovered meuh's answer here which goes into more detail regarding an RPM being able to exclude certain files from future verification.

            – Jeff Schaller
            2 days ago













          1












          1








          1







          To take the easy part first, the grep '^..5 portion investigates the output for lines that start with any two characters followed by a 5. That 5 represents (from man rpm):




          5 digest (formerly MD5 sum) differs




          as a fairly good indicator that the corresponding file has changed.



          Next, I would encourage any rpm -Va | grep ... investigation to ignore config files. These are files, like you point out, that are intended to be changed by the system administrator. Luckily, they are indicated in the rpm -Va output with a c marker:




          The format of the output is a string of 9 characters, a possible attribute marker:



          c %config configuration file.
          d %doc documentation file.
          g %ghost file (i.e. the file contents are not included in the package payload).
          l %license license file.
          r %readme readme file.


          from the package header, followed by the file name.




          ... so I would consider something along the lines of:



          sudo rpm -Va | awk '/^..5/ && $2 != "c"'


          ... which ties together the grep ^..5 idea along with ignoring files that are classified as configuration files. Alternatively, you could capture every flagged line of output and then "whitelist" config files where you've accepted the risk of change -- then, you're alerted when a presumed-static config file changes.



          Without repackaging the RPM's, I do not know of a way to update the digest in the RPM database to indicate that you've changed a config file, which is why I suggest the above workarounds.






          share|improve this answer













          To take the easy part first, the grep '^..5 portion investigates the output for lines that start with any two characters followed by a 5. That 5 represents (from man rpm):




          5 digest (formerly MD5 sum) differs




          as a fairly good indicator that the corresponding file has changed.



          Next, I would encourage any rpm -Va | grep ... investigation to ignore config files. These are files, like you point out, that are intended to be changed by the system administrator. Luckily, they are indicated in the rpm -Va output with a c marker:




          The format of the output is a string of 9 characters, a possible attribute marker:



          c %config configuration file.
          d %doc documentation file.
          g %ghost file (i.e. the file contents are not included in the package payload).
          l %license license file.
          r %readme readme file.


          from the package header, followed by the file name.




          ... so I would consider something along the lines of:



          sudo rpm -Va | awk '/^..5/ && $2 != "c"'


          ... which ties together the grep ^..5 idea along with ignoring files that are classified as configuration files. Alternatively, you could capture every flagged line of output and then "whitelist" config files where you've accepted the risk of change -- then, you're alerted when a presumed-static config file changes.



          Without repackaging the RPM's, I do not know of a way to update the digest in the RPM database to indicate that you've changed a config file, which is why I suggest the above workarounds.







          share|improve this answer












          share|improve this answer



          share|improve this answer










          answered 2 days ago









          Jeff SchallerJeff Schaller

          44.4k1162143




          44.4k1162143












          • I've just discovered meuh's answer here which goes into more detail regarding an RPM being able to exclude certain files from future verification.

            – Jeff Schaller
            2 days ago

















          • I've just discovered meuh's answer here which goes into more detail regarding an RPM being able to exclude certain files from future verification.

            – Jeff Schaller
            2 days ago
















          I've just discovered meuh's answer here which goes into more detail regarding an RPM being able to exclude certain files from future verification.

          – Jeff Schaller
          2 days ago





          I've just discovered meuh's answer here which goes into more detail regarding an RPM being able to exclude certain files from future verification.

          – Jeff Schaller
          2 days ago

















          draft saved

          draft discarded
















































          Thanks for contributing an answer to Unix & Linux Stack Exchange!


          • Please be sure to answer the question. Provide details and share your research!

          But avoid


          • Asking for help, clarification, or responding to other answers.

          • Making statements based on opinion; back them up with references or personal experience.

          To learn more, see our tips on writing great answers.




          draft saved


          draft discarded














          StackExchange.ready(
          function ()
          StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2funix.stackexchange.com%2fquestions%2f509282%2frpm-v-verify-purpose%23new-answer', 'question_page');

          );

          Post as a guest















          Required, but never shown





















































          Required, but never shown














          Required, but never shown












          Required, but never shown







          Required, but never shown

































          Required, but never shown














          Required, but never shown












          Required, but never shown







          Required, but never shown







          Popular posts from this blog

          getting Checkpoint VPN SSL Network Extender working in the command lineHow to connect to CheckPoint VPN on Ubuntu 18.04LTS?Will the Linux ( red-hat ) Open VPNC Client connect to checkpoint or nortel VPN gateways?VPN client for linux machine + support checkpoint gatewayVPN SSL Network Extender in FirefoxLinux Checkpoint SNX tool configuration issuesCheck Point - Connect under Linux - snx + OTPSNX VPN Ububuntu 18.XXUsing Checkpoint VPN SSL Network Extender CLI with certificateVPN with network manager (nm-applet) is not workingWill the Linux ( red-hat ) Open VPNC Client connect to checkpoint or nortel VPN gateways?VPN client for linux machine + support checkpoint gatewayImport VPN config files to NetworkManager from command lineTrouble connecting to VPN using network-manager, while command line worksStart a VPN connection with PPTP protocol on command linestarting a docker service daemon breaks the vpn networkCan't connect to vpn with Network-managerVPN SSL Network Extender in FirefoxUsing Checkpoint VPN SSL Network Extender CLI with certificate

          Cannot Extend partition with GParted The 2019 Stack Overflow Developer Survey Results Are In Announcing the arrival of Valued Associate #679: Cesar Manara Planned maintenance scheduled April 17/18, 2019 at 00:00UTC (8:00pm US/Eastern) 2019 Community Moderator Election ResultsCan't increase partition size with GParted?GParted doesn't recognize the unallocated space after my current partitionWhat is the best way to add unallocated space located before to Ubuntu 12.04 partition with GParted live?I can't figure out how to extend my Arch home partition into free spaceGparted Linux Mint 18.1 issueTrying to extend but swap partition is showing as Unknown in Gparted, shows proper from fdiskRearrange partitions in gparted to extend a partitionUnable to extend partition even though unallocated space is next to it using GPartedAllocate free space to root partitiongparted: how to merge unallocated space with a partition

          Marilyn Monroe Ny fiainany manokana | Jereo koa | Meny fitetezanafanitarana azy.