1 .\" $NetBSD: veriexecgen.8,v 1.15 2008/04/30 13:11:03 martin Exp $
3 .\" Copyright (c) 2006 The NetBSD Foundation, Inc.
4 .\" All rights reserved.
6 .\" This code is derived from software contributed to The NetBSD Foundation
9 .\" Redistribution and use in source and binary forms, with or without
10 .\" modification, are permitted provided that the following conditions
12 .\" 1. Redistributions of source code must retain the above copyright
13 .\" notice, this list of conditions and the following disclaimer.
14 .\" 2. Redistributions in binary form must reproduce the above copyright
15 .\" notice, this list of conditions and the following disclaimer in the
16 .\" documentation and/or other materials provided with the distribution.
18 .\" THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
19 .\" ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
20 .\" TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
21 .\" PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
22 .\" BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
23 .\" CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
24 .\" SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
25 .\" INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
26 .\" CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
27 .\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
28 .\" POSSIBILITY OF SUCH DAMAGE.
35 .Nd generate fingerprints for Veriexec
40 .Op Fl o Pa fingerprintdb
47 can be used to create a fingerprint database for use with
50 If no command line arguments were specified,
52 will resort to default operation, implying
53 .Fl D Fl o Ar /etc/signatures Fl t Ar sha256 .
55 If the output file already exists,
57 will save a backup copy in the same file only with a
61 The following options are available:
62 .Bl -tag -width ".Fl p Ar prefix"
64 Append to the output file, don't overwrite it.
66 Add fingerprints for non-executable files as well.
68 Search system directories,
81 Multiple uses of this flag can specify more than one directory.
83 .\" Try to guess the correct flags for every file.
85 Display the help screen.
86 .It Fl o Ar fingerprintdb
87 Save the generated fingerprint database to
90 When storing files in the fingerprint database,
91 store the full pathnames of files with the leading
93 of the filenames removed.
97 Set the immutable flag on the created signatures file when done writing it.
99 Put a timestamp on the generated file.
100 .It Fl t Ar algorithm
103 for the fingerprints.
114 Print messages describing what operations are being done.
118 will exit when an error condition is encountered.
120 treat errors such as not being able to follow a symbolic link,
121 not being able to find the real path for a directory entry, or
122 not being able to calculate a hash of an entry as a warning,
123 rather than an error.
124 If errors are treated as warnings,
126 will continue processing.
127 The default behaviour is to treat errors as fatal.
132 Fingerprint files in the common system directories using the default hashing
135 and save to the default fingerprint database in
136 .Pa /etc/signatures :
137 .Bd -literal -offset indent
143 appending to the default fingerprint database:
144 .Bd -literal -offset indent
145 # veriexecgen -A -d /etc
149 .Pa /path/to/somewhere using
151 as the hashing algorithm, saving to
152 .Pa /etc/somewhere.fp :
153 .Bd -literal -offset indent
154 # veriexecgen -d /path/to/somewhere -t rmd160 -o /etc/somewhere.fp