Page 1 of 1

LFD - Improvement Suggestions

Posted: 12 Dec 2006, 10:22
by ImZan
#1 - File Integrity Checking

Being able to monitor important folders and files for changes. IE : /etc , /etc/passwd, groups , shadow, config files, system binaries . Based on md5 checkings ?

Posted: 12 Dec 2006, 10:36
by chirpy
lfd already does that with the LF_DIRWATCH_FILE setting and the csf.dirwatch file.

Posted: 12 Dec 2006, 10:47
by ImZan
But - if I enable the disable option for suspicious files - won't it delete those ?

custom security level

Posted: 12 Dec 2006, 12:28
by rafaelfpviana
it would be great to be able to create a custumized security level.

In my case for exemple, I would like to use the High Security Level but without the Remove suspicious files setting.

Posted: 12 Dec 2006, 15:15
by chirpy
ImZan wrote:But - if I enable the disable option for suspicious files - won't it delete those ?
No, the LF_LF_DIRWATCH_FILE setting doesn't use LF_DIRWATCH_DISABLE

Posted: 12 Dec 2006, 15:16
by chirpy
rafaelfpviana wrote:it would be great to be able to create a custumized security level.

In my case for exemple, I would like to use the High Security Level but without the Remove suspicious files setting.
You can always just set the High Level and then go into the configuration file and disable any options that you want.

Posted: 14 Dec 2006, 21:17
by rafaelfpviana
chirpy wrote:You can always just set the High Level and then go into the configuration file and disable any options that you want.
Didn't know about that, i'll check it out Chirpy. Thanks.

Posted: 18 Jul 2008, 11:57
by pimpinjg
is there anyway to make it auto delete suspicious files becuz im getting backdoored and im not ready for an os reload till i get a good backup..:(

Posted: 18 Jul 2008, 17:46
by deadeye
pimpinjg wrote:is there anyway to make it auto delete suspicious files becuz im getting backdoored and im not ready for an os reload till i get a good backup..:(
What would define a suspicious file? Also, if your system is already compromised it is too late to get a good backup. How will you know that you are not just backing up and restoring the exploit?