Author: bdubbs
Date: 2008-04-20 22:36:18 -0600 (Sun, 20 Apr 2008)
New Revision: 7389

Modified:
   trunk/BOOK/postlfs/security/tripwire.xml
Log:
Remove tabs

Modified: trunk/BOOK/postlfs/security/tripwire.xml
===================================================================
--- trunk/BOOK/postlfs/security/tripwire.xml    2008-04-21 02:07:25 UTC (rev 
7388)
+++ trunk/BOOK/postlfs/security/tripwire.xml    2008-04-21 04:36:18 UTC (rev 
7389)
@@ -105,9 +105,9 @@
     the binaries. There are two keys: a site key and a local key which are
     stored in <filename class="directory">/etc/tripwire/</filename>.</para>
 
-               <para><command>cp -v policy/*.txt /usr/doc/tripwire</command>: 
This command
-               installs the <application>tripwire</application> sample policy 
files with
-               the other <application>tripwire</application> 
documentation.</para>
+    <para><command>cp -v policy/*.txt /usr/doc/tripwire</command>: This command
+    installs the <application>tripwire</application> sample policy files with
+    the other <application>tripwire</application> documentation.</para>
 
   </sect2>
 
@@ -134,71 +134,71 @@
       default installation and will need to be updated for your
       system.</para>
 
-                       <para>Policy files should be tailored to each 
individual distribution
-                       and/or installation. Some example policy files can be 
found in <filename
-                       class="directory">/usr/doc/tripwire/</filename> (Note 
that <filename
-                       class="directory">/usr/doc/</filename> is a symbolic 
link on LFS systems
-                       to <filename 
class="directory">/usr/share/doc/</filename>).</para>
+      <para>Policy files should be tailored to each individual distribution
+      and/or installation. Some example policy files can be found in <filename
+      class="directory">/usr/doc/tripwire/</filename> (Note that <filename
+      class="directory">/usr/doc/</filename> is a symbolic link on LFS systems
+      to <filename class="directory">/usr/share/doc/</filename>).</para>
 
-                       <para>If desired, copy the policy file you'd like to 
try into <filename
-                       class="directory">/etc/tripwire/</filename> instead of 
using the default
-                       policy file, <filename>twpol.txt</filename>.  It is, 
however, recommended
-                       that you edit your policy file. Get ideas from the 
examples above and
-                       read 
<filename>/usr/doc/tripwire/policyguide.txt</filename> for
-                       additional information. <filename>twpol.txt</filename> 
is a good policy
-                       file for learning about  
<application>Tripwire</application> as it will
-                       note any changes to the file system and can even be 
used as an annoying
-                       way of keeping track of changes for uninstallation of 
software.</para>
+      <para>If desired, copy the policy file you'd like to try into <filename
+      class="directory">/etc/tripwire/</filename> instead of using the default
+      policy file, <filename>twpol.txt</filename>.  It is, however, recommended
+      that you edit your policy file. Get ideas from the examples above and
+      read <filename>/usr/doc/tripwire/policyguide.txt</filename> for
+      additional information. <filename>twpol.txt</filename> is a good policy
+      file for learning about  <application>Tripwire</application> as it will
+      note any changes to the file system and can even be used as an annoying
+      way of keeping track of changes for uninstallation of software.</para>
 
-                       <para>After your policy file has been edited to your 
satisfaction you may
-                       begin the configuration steps (perform as the 
<systemitem
-                       class='username'>root</systemitem>):</para>
+      <para>After your policy file has been edited to your satisfaction you may
+      begin the configuration steps (perform as the <systemitem
+      class='username'>root</systemitem>):</para>
 
 <screen role="root"><userinput>twadmin --create-polfile --site-keyfile 
/etc/tripwire/site.key \
     /etc/tripwire/twpol.txt &amp;&amp;
 tripwire --init</userinput></screen>
 
     <para>Depending on your system and the contents of the policy file, the
-               initialization phase above can take a relatively long 
time.</para>
+    initialization phase above can take a relatively long time.</para>
 
     </sect3>
 
     <sect3>
       <title>Usage Information</title>
 
-                       <para><application>Tripwire</application> will identify 
file changes in
-                       the critical system files specified in the policy file. 
 Using
-                       <application>Tripwire</application> while making 
frequent changes to
-                       these directories will flag all these changes.  It is 
most useful after a
-                       system has reached a configuration that the user 
considers stable.</para>
+      <para><application>Tripwire</application> will identify file changes in
+      the critical system files specified in the policy file.  Using
+      <application>Tripwire</application> while making frequent changes to
+      these directories will flag all these changes.  It is most useful after a
+      system has reached a configuration that the user considers stable.</para>
 
-                       <para>To use <application>Tripwire</application> after 
creating a policy
-                       file to run a report, use the following command:</para>
+      <para>To use <application>Tripwire</application> after creating a policy
+      file to run a report, use the following command:</para>
 
 <screen role="root"><userinput>tripwire --check &gt; 
/etc/tripwire/report.txt</userinput></screen>
 
-                       <para>View the output to check the integrity of your 
files. An automatic
-                       integrity report can be produced by using a cron 
facility to schedule the
-                       runs.</para>
+      <para>View the output to check the integrity of your files. An automatic
+      integrity report can be produced by using a cron facility to schedule the
+      runs.</para>
 
-                       <para>Reports are stored in binary and, if desired, 
encrypted.  View reports, 
-                       as the <systemitem class="username">root</systemitem> 
user, with:</para>
+      <para>Reports are stored in binary and, if desired, encrypted.  View 
reports, 
+      as the <systemitem class="username">root</systemitem> user, with:</para>
 
 <screen role="root">twprint --print-report -r 
/var/lib/tripwire/report/<replaceable>&lt;report-name.twr&gt;</replaceable></screen>
 
-                       <para>After you run an integrity check, you should 
examine the
-                       report (or email) and then modify the 
<application>Tripwire</application>
-                       database to reflect the changed files on your system. 
This is so that
-                       <application>Tripwire</application> will not 
continually notify you that
-                       files you intentionally changed are a security 
violation. To do this you
-                       must first <command>ls -l 
/var/lib/tripwire/report/</command> and note
-                       the name of the newest file which starts with your 
system name as
-                       presented by the command <userinput>uname -n</userinput>
-                       and ends in <filename>.twr</filename>. These files were 
created
-                       during report creation and the most current one is 
needed to update the
-                       <application>Tripwire</application> database of your 
system. As the
-                       <systemitem class='username'>root</systemitem> user, 
type in the
-                       following command making the appropriate report 
name:</para>
+      <para>After you run an integrity check, you should examine the
+      report (or email) and then modify the <application>Tripwire</application>
+      database to reflect the changed files on your system. This is so that
+      <application>Tripwire</application> will not continually notify you that
+      files you intentionally changed are a security violation. To do this you
+      must first <command>ls -l /var/lib/tripwire/report/</command> and note
+      the name of the newest file which starts with your system name as
+      presented by the command <userinput>uname -n</userinput>
+      and ends in <filename>.twr</filename>. These files were created
+      during report creation and the most current one is needed to update the
+      <application>Tripwire</application> database of your system. As the
+      <systemitem class='username'>root</systemitem> user, type in the
+      following command making the appropriate report name:</para>
 
 <screen role="root"><userinput>tripwire --update --twrfile 
/var/lib/tripwire/report/<replaceable>&lt;report-name.twr&gt;</replaceable></userinput></screen>
 

-- 
http://linuxfromscratch.org/mailman/listinfo/blfs-book
FAQ: http://www.linuxfromscratch.org/blfs/faq.html
Unsubscribe: See the above information page

Reply via email to