1 .\" $NetBSD: veriexecctl.8,v 1.34 2008/02/18 10:37:19 elad Exp $
4 .\" Brett Lymn - blymn@baea.com.au, brett_lymn@yahoo.com.au
6 .\" This code is donated to The NetBSD Foundation by the author.
8 .\" Redistribution and use in source and binary forms, with or without
9 .\" modification, are permitted provided that the following conditions
11 .\" 1. Redistributions of source code must retain the above copyright
12 .\" notice, this list of conditions and the following disclaimer.
13 .\" 2. Redistributions in binary form must reproduce the above copyright
14 .\" notice, this list of conditions and the following disclaimer in the
15 .\" documentation and/or other materials provided with the distribution.
16 .\" 3. The name of the Author may not be used to endorse or promote
17 .\" products derived from this software without specific prior written
20 .\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND
21 .\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22 .\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23 .\" ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE
24 .\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25 .\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26 .\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27 .\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28 .\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29 .\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
32 .\" $Id: veriexecctl.8,v 1.35 2008/08/31 23:40:19 dholland Exp $
47 .Cm delete Ar file | mount_point
57 command is used to manipulate
61 file integrity subsystem.
65 Load the fingerprint entries contained in
67 if specified, or the default signatures file otherwise.
69 This operation is only allowed in learning mode (strict level zero).
71 The following flags are allowed with this command:
72 .Bl -tag -width indent
74 Evaluate fingerprint on load, as opposed to when the file is accessed.
76 Keep the filenames in the entry for more accurate logging.
78 Enable verbose output.
80 .It Cm delete Ar file | mount_point
81 Delete either a single entry
85 from being monitored by
90 database from the kernel.
91 Only entries that have the filename will be presented.
93 This can be used to recover a lost database:
94 .Bd -literal -offset indent
95 # veriexecctl dump \*[Gt] /etc/signatures
98 Delete all entries in the
104 for information associated with
106 Filename, mount, fingerprint, fingerprint algorithm, evaluation status,
110 .Bl -tag -width /etc/signatures -compact
114 .It Pa /etc/signatures
115 default signatures file
128 .An Brett Lymn Aq blymn@NetBSD.org
129 .An Elad Efrat Aq elad@NetBSD.org
131 The kernel is expected to have the