{"id":1496,"date":"2018-10-12T12:09:57","date_gmt":"2018-10-12T10:09:57","guid":{"rendered":"http:\/\/clark.tipistrani.it\/?p=1496"},"modified":"2018-10-16T12:16:09","modified_gmt":"2018-10-16T10:16:09","slug":"samhainrc","status":"publish","type":"post","link":"http:\/\/clark.tipistrani.it\/?p=1496","title":{"rendered":"samhainrc"},"content":{"rendered":"<p>Questo e il file di configurazione di samhain nella nuova versione e fa riferimento a questo vecchio <a href=\"http:\/\/clark.tipistrani.it\/?p=1366\">articolo<\/a><\/p>\n<p>#####################################################################<br \/>\n#<br \/>\n# Configuration file template for samhain.<br \/>\n#<br \/>\n#####################################################################<br \/>\n#<br \/>\n# &#8212; empty lines and lines starting with &#8216;#&#8217;, &#8216;;&#8217; or &#8216;\/\/&#8217; are ignored<br \/>\n# &#8212; boolean options can be Yes\/No or True\/False or 1\/0<br \/>\n# &#8212; you can PGP clearsign this file &#8212; samhain will check (if compiled<br \/>\n# with support) or otherwise ignore the signature<br \/>\n# &#8212; CHECK mail address<br \/>\n#<br \/>\n# To each log facility, you can assign a threshold severity. Only<br \/>\n# reports with at least the threshold severity will be logged<br \/>\n# to the respective facility (even further below).<br \/>\n#<br \/>\n#####################################################################<br \/>\n#<br \/>\n# SETUP for file system checking:<br \/>\n#<br \/>\n# (i) There are several policies, each has its own section. Put files<br \/>\n# into the section for the appropriate policy (see below).<br \/>\n# (ii) Section [EventSeverity]:<br \/>\n# To each policy, you can assign a severity (further below).<br \/>\n# (iii) Section [Log]:<br \/>\n# To each log facility, you can assign a threshold severity. Only<br \/>\n# reports with at least the threshold severity will be logged<br \/>\n# to the respective facility (even further below).<br \/>\n#<br \/>\n#####################################################################<\/p>\n<p>#####################################################################<br \/>\n#<br \/>\n# Files are defined with: file = \/absolute\/path<br \/>\n#<br \/>\n# Directories are defined with: dir = \/absolute\/path<br \/>\n# or with an optional recursion depth (N &lt;= 99): dir = N\/absolute\/path<br \/>\n#<br \/>\n# Directory inodes are checked. If you only want to check files<br \/>\n# in a directory, but not the directory inode itself, use (e.g.):<br \/>\n#<br \/>\n# [ReadOnly]<br \/>\n# dir = \/some\/directory<br \/>\n# [IgnoreAll]<br \/>\n# file = \/some\/directory<br \/>\n#<br \/>\n# You can use shell-style globbing patterns, like: file = \/path\/foo*<br \/>\n#<br \/>\n######################################################################<\/p>\n<p>[Misc]<br \/>\n##<br \/>\n## Add or subtract tests from the policies<br \/>\n## &#8211; if you want to change their definitions,<br \/>\n## you need to do that before using the policies<br \/>\n##<br \/>\n# RedefReadOnly = (no default)<br \/>\n# RedefAttributes=(no default)<br \/>\n# RedefLogFiles=(no default)<br \/>\n# RedefGrowingLogFiles=(no default)<br \/>\n# RedefIgnoreAll=(no default)<br \/>\n# RedefIgnoreNone=(no default)<br \/>\n# RedefUser0=(no default)<br \/>\n# RedefUser1=(no default)<\/p>\n<p>[Attributes]<br \/>\n##<br \/>\n## for these files, only changes in permissions and ownership are checked<br \/>\n##<br \/>\nfile=\/etc\/mtab<br \/>\nfile=\/etc\/ssh_random_seed<br \/>\n#file=\/etc\/asound.conf<br \/>\nfile=\/etc\/resolv.conf<br \/>\nfile=\/etc\/localtime<br \/>\n#file=\/etc\/ioctl.save<br \/>\nfile=\/etc\/passwd.backup<br \/>\nfile=\/etc\/shadow.backup<br \/>\n#file=\/etc\/postfix\/prng_exch<br \/>\nfile=\/etc\/adjtime<br \/>\nfile=\/etc\/network\/run\/ifstate<br \/>\n#file=\/etc\/lvm\/.cache<br \/>\nfile=\/etc\/ld.so.cache<\/p>\n<p>#<br \/>\n# There are files in \/etc that might change, thus changing the directory<br \/>\n# timestamps. Put it here as &#8216;file&#8217;, and in the ReadOnly section as &#8216;dir&#8217;.<br \/>\n#<br \/>\nfile=\/etc<\/p>\n<p>[LogFiles]<br \/>\n##<br \/>\n## for these files, changes in signature, timestamps, and size are ignored<br \/>\n##<br \/>\nfile=\/var\/run\/utmp<br \/>\nfile=\/etc\/motd<\/p>\n<p>#####################################################################<br \/>\n#<br \/>\n# This would be the proper syntax for parts that should only be<br \/>\n# included for certain hosts.<br \/>\n# You may enclose anything in a @HOSTNAME\/@end bracket, as long as the<br \/>\n# result still has the proper syntax for the config file.<br \/>\n# You may have any number of @HOSTNAME\/@end brackets.<br \/>\n# HOSTNAME should be the fully qualified &#8216;official&#8217; name<br \/>\n# (e.g. &#8216;nixon.watergate.com&#8217;, not &#8216;nixon&#8217;), no aliases.<br \/>\n# No IP number &#8211; except if samhain cannot determine the<br \/>\n# fully qualified hostname.<br \/>\n#<br \/>\n# @HOSTNAME<br \/>\n# file=\/foo\/bar<br \/>\n# @end<br \/>\n#<br \/>\n# These are two examples for conditional inclusion\/exclusion<br \/>\n# of a machine based on the output from &#8216;uname -srm&#8217;<br \/>\n#<br \/>\n# $Linux:2.*.7:i666<br \/>\n# file=\/foo\/bar3<br \/>\n# $end<br \/>\n#<br \/>\n# !$Linux:2.*.7:i686<br \/>\n# file=\/foo\/bar2<br \/>\n# $end<br \/>\n#<br \/>\n#####################################################################<\/p>\n<p>[GrowingLogFiles]<br \/>\n##<br \/>\n## for these files, changes in signature, timestamps, and increase in size<br \/>\n## are ignored<br \/>\n##<br \/>\n#file=\/var\/log\/warn<br \/>\nfile=\/var\/log\/messages<br \/>\nfile=\/var\/log\/wtmp<br \/>\nfile=\/var\/log\/faillog<br \/>\nfile=\/var\/log\/auth.log<br \/>\nfile=\/var\/log\/daemon.log<br \/>\nfile=\/var\/log\/user.log<br \/>\nfile=\/var\/log\/kern.log<br \/>\nfile=\/var\/log\/syslog<\/p>\n<p>[IgnoreAll]<br \/>\n##<br \/>\n## for these files, no modifications are reported<br \/>\n##<br \/>\n## This file might be created or removed by the system sometimes.<br \/>\n##<br \/>\nfile=\/etc\/resolv.conf.pcmcia.save<br \/>\nfile=\/etc\/nologin<br \/>\nfile=\/etc\/network\/run<\/p>\n<p>[IgnoreNone]<br \/>\n##<br \/>\n## for these files, all modifications (even access time) are reported<br \/>\n## &#8211; you may create some interesting-looking file (like \/etc\/safe_passwd),<br \/>\n## just to watch whether someone will access it &#8230;<br \/>\n##<\/p>\n<p>[Prelink]<br \/>\n##<br \/>\n## Use for prelinked files or directories holding them<br \/>\n##<\/p>\n<p>[ReadOnly]<br \/>\n##<br \/>\n## for these files, only access time is ignored<br \/>\n##<br \/>\ndir=\/usr\/bin<br \/>\ndir=\/bin<br \/>\ndir=\/boot<br \/>\n#<br \/>\n# SuSE (old) has the boot init scripts in \/sbin\/init.d\/*,<br \/>\n# so we go 3 levels deep<br \/>\n#<br \/>\ndir=3\/sbin<br \/>\ndir=\/usr\/sbin<br \/>\ndir=\/lib<br \/>\n#<br \/>\n# RedHat and Debian have the bootinit scripts in \/etc\/init.d\/* or \/etc\/rc.d\/*,<br \/>\n# so we go 3 levels deep there too<br \/>\n#<br \/>\ndir=3\/etc<\/p>\n<p># Various directories \/ files that may include \/ be SUID\/SGID binaries<br \/>\n#<br \/>\n#<br \/>\n#file=\/usr\/lib\/pt_chown<br \/>\n# X11, in Debian X7 this is now a symlink<br \/>\n#dir=\/usr\/X11R6\/bin<br \/>\n#dir=\/usr\/X11R6\/lib\/X11\/xmcd\/bin<br \/>\n# Apache:<br \/>\n#file=\/usr\/lib\/apache\/suexec<br \/>\n#file=\/usr\/lib\/apache\/suexec.disabled<br \/>\n# Extra directories:<br \/>\n#dir=\/opt\/gnome\/bin<br \/>\n#dir=\/opt\/kde\/bin<\/p>\n<p>[User0]<br \/>\n[User1]<br \/>\n## User0 and User1 are sections for files\/dirs with user-definable checking<br \/>\n## (see the manual)<\/p>\n<p>[EventSeverity]<br \/>\n##<br \/>\n## Here you can assign severities to policy violations.<br \/>\n## If this severity exceeds the treshold of a log facility (see below),<br \/>\n## a policy violation will be logged to that facility.<br \/>\n##<br \/>\n## Severity for verification failures.<br \/>\n##<br \/>\n# SeverityReadOnly=crit<br \/>\n# SeverityLogFiles=crit<br \/>\n# SeverityGrowingLogs=crit<br \/>\n# SeverityIgnoreNone=crit<br \/>\n# SeverityAttributes=crit<br \/>\n# SeverityUser0=crit<br \/>\n# SeverityUser1=crit<\/p>\n<p># Default behaviour<br \/>\nSeverityReadOnly=crit<br \/>\nSeverityLogFiles=crit<br \/>\nSeverityGrowingLogs=warn<br \/>\nSeverityIgnoreNone=crit<br \/>\nSeverityAttributes=crit<\/p>\n<p>##<br \/>\n## We have a file in IgnoreAll that might or might not be present.<br \/>\n## Setting the severity to &#8216;info&#8217; prevents messages about deleted\/new file.<br \/>\n##<br \/>\n# SeverityIgnoreAll=crit<br \/>\nSeverityIgnoreAll=info<\/p>\n<p>## Files : file access problems<br \/>\n# SeverityFiles=crit<\/p>\n<p>## Dirs : directory access problems<br \/>\n# SeverityDirs=crit<\/p>\n<p>## Names : suspect (non-printable) characters in a pathname<br \/>\n# SeverityNames=crit<\/p>\n<p># Default behaviour<br \/>\nSeverityFiles=crit<br \/>\nSeverityDirs=crit<br \/>\nSeverityNames=warn<\/p>\n<p>[Log]<br \/>\n##<br \/>\n## Switch on\/OFF log facilities and set their threshold severity<br \/>\n##<br \/>\n## Values: debug, info, notice, warn, mark, err, crit, alert, none.<br \/>\n## &#8216;mark&#8217; is used for timestamps.<br \/>\n##<br \/>\n##<br \/>\n## Use &#8216;none&#8217; to SWITCH OFF a log facility<br \/>\n##<br \/>\n## By default, everything equal to and above the threshold is logged.<br \/>\n## The specifiers &#8216;*&#8217;, &#8216;!&#8217;, and &#8216;=&#8217; are interpreted as<br \/>\n## &#8216;all&#8217;, &#8216;all but&#8217;, and &#8216;only&#8217;, respectively (like syslogd(8) does,<br \/>\n## at least on Linux). Examples:<br \/>\n## MailSeverity=*<br \/>\n## MailSeverity=!warn<br \/>\n## MailSeverity==crit<\/p>\n<p>## E-mail<br \/>\n##<br \/>\n# MailSeverity=none<\/p>\n<p>## Console<br \/>\n##<br \/>\n# PrintSeverity=info<\/p>\n<p>## Logfile<br \/>\n##<br \/>\n# LogSeverity=mark<\/p>\n<p>## Syslog<br \/>\n##<br \/>\n# SyslogSeverity=none<\/p>\n<p>## Remote server (yule)<br \/>\n##<br \/>\n# ExportSeverity=none<\/p>\n<p>## External script or program<br \/>\n##<br \/>\n# ExternalSeverity = none<\/p>\n<p>## Logging to a database<br \/>\n##<br \/>\n# DatabaseSeverity = none<\/p>\n<p># Default behaviour<br \/>\nMailSeverity=crit<br \/>\nPrintSeverity=none<br \/>\nLogSeverity=info<br \/>\nSyslogSeverity=alert<br \/>\nExportSeverity=none<\/p>\n<p>#####################################################<br \/>\n#<br \/>\n# Optional modules<br \/>\n#<br \/>\n#####################################################<\/p>\n<p># [SuidCheck]<br \/>\n##<br \/>\n## &#8212; Check the filesystem for SUID\/SGID binaries<br \/>\n##<\/p>\n<p>## Switch on<br \/>\n#<br \/>\n# SuidCheckActive = yes<\/p>\n<p>## Interval for check (seconds)<br \/>\n#<br \/>\n# SuidCheckInterval = 7200<\/p>\n<p>## Alternative: crontab-like schedule<br \/>\n#<br \/>\n# SuidCheckSchedule = NULL<\/p>\n<p>## Directory to exclude<br \/>\n#<br \/>\n# SuidCheckExclude = NULL<\/p>\n<p>## Limit on files per second (0 == no limit)<br \/>\n#<br \/>\n# SuidCheckFps = 0<\/p>\n<p>## Alternative: yield after every file<br \/>\n#<br \/>\n# SuidCheckYield = no<\/p>\n<p>## Severity of a detection<br \/>\n#<br \/>\n# SeveritySuidCheck = crit<\/p>\n<p>## Quarantine SUID\/SGID files if found<br \/>\n#<br \/>\n# SuidCheckQuarantineFiles = yes<\/p>\n<p>## Method for Quarantining files:<br \/>\n# 0 &#8211; Delete or truncate the file.<br \/>\n# 1 &#8211; Remove SUID\/SGID permissions from file.<br \/>\n# 2 &#8211; Move SUID\/SGID file to quarantine dir.<br \/>\n#<br \/>\n# SuidCheckQuarantineMethod = 0<\/p>\n<p>## For method 1 and 3, really delete instead of truncating<br \/>\n#<br \/>\n# SuidCheckQuarantineDelete = yes<\/p>\n<p># [Kernel]<br \/>\n##<br \/>\n## &#8212; Check for loadable kernel module rootkits (Linux\/FreeBSD only)<br \/>\n##<\/p>\n<p>## Switch on\/off<br \/>\n#<br \/>\n# KernelCheckActive = True<\/p>\n<p>## Check interval (seconds); btw., the check is VERY fast<br \/>\n#<br \/>\n# KernelCheckInterval = 300<\/p>\n<p>## Severity<br \/>\n#<br \/>\n# SeverityKernel = crit<\/p>\n<p># [Utmp]<br \/>\n##<br \/>\n## &#8212; Logging of login\/logout events<br \/>\n##<\/p>\n<p>## Switch on\/off<br \/>\n#<br \/>\n# LoginCheckActive = True<\/p>\n<p>## Severity for logins, multiple logins, logouts<br \/>\n#<br \/>\n# SeverityLogin=info<br \/>\n# SeverityLoginMulti=warn<br \/>\n# SeverityLogout=info<\/p>\n<p>## Interval for login\/logout checks<br \/>\n#<br \/>\n# LoginCheckInterval = 300<\/p>\n<p># [Database]<br \/>\n##<br \/>\n## &#8212; Logging to a relational database<br \/>\n##<\/p>\n<p>## Database name<br \/>\n#<br \/>\n# SetDBName = samhain<\/p>\n<p>## Database table<br \/>\n#<br \/>\n# SetDBTable = log<\/p>\n<p>## Database user<br \/>\n#<br \/>\n# SetDBUser = samhain<\/p>\n<p>## Database password<br \/>\n#<br \/>\n# SetDBPassword = (default: none)<\/p>\n<p>## Database host<br \/>\n#<br \/>\n# SetDBHost = localhost<\/p>\n<p>## Log the server timestamp for received messages<br \/>\n#<br \/>\n# SetDBServerTstamp = True<\/p>\n<p>## Use a persistent connection<br \/>\n#<br \/>\n# UsePersistent = True<\/p>\n<p># [External]<br \/>\n##<br \/>\n## Interface to call external scripts\/programs for logging<br \/>\n##<\/p>\n<p>## The absolute path to the command<br \/>\n## &#8211; Each invocation of this directive will end the definition of the<br \/>\n## preceding command, and start the definition of<br \/>\n## an additional, new command<br \/>\n#<br \/>\n# OpenCommand = (no default)<\/p>\n<p>## Type (log or rv)<br \/>\n## &#8211; log for log messages, srv for messages received by the server<br \/>\n#<br \/>\n# SetType = log<\/p>\n<p>## The command (full command line) to execute<br \/>\n#<br \/>\n# SetCommandLine = (no default)<\/p>\n<p>## The environment (KEY=value; repeat for more)<br \/>\n#<br \/>\n# SetEnviron = TZ=(your timezone)<\/p>\n<p>## The TIGER192 checksum (optional)<br \/>\n#<br \/>\n# SetChecksum = (no default)<\/p>\n<p>## User who runs the command<br \/>\n#<br \/>\n# SetCredentials = (default: samhain process uid)<\/p>\n<p>## Words not allowed in message<br \/>\n#<br \/>\n# SetFilterNot = (none)<\/p>\n<p>## Words required (ALL of them)<br \/>\n#<br \/>\n# SetFilterAnd = (none)<\/p>\n<p>## Words required (at least one)<br \/>\n#<br \/>\n# SetFilterOr = (none)<\/p>\n<p>## Deadtime between consecutive calls<br \/>\n#<br \/>\n# SetDeadtime = 0<\/p>\n<p>## Add default environment (HOME, PATH, SHELL)<br \/>\n#<br \/>\n# SetDefault = no<\/p>\n<p>#####################################################<br \/>\n#<br \/>\n# Miscellaneous configuration options<br \/>\n#<br \/>\n#####################################################<\/p>\n<p>[Misc]<\/p>\n<p>## whether to become a daemon process<br \/>\n## (this is not honoured on database initialisation)<br \/>\n#<br \/>\n# Daemon = no<br \/>\nDaemon = yes<\/p>\n<p>## whether to test signature of files (init\/check\/none)<br \/>\n## &#8211; if &#8216;none&#8217;, then we have to decide this on the command line &#8211;<br \/>\n#<br \/>\n# ChecksumTest = none<br \/>\nChecksumTest=check<\/p>\n<p>## whether to drop linux capabilities that are not required<br \/>\n## &#8211; will make a root process a &#8216;mere mortal&#8217; in many respects<br \/>\n#<br \/>\n# UseCaps = yes<\/p>\n<p>## Set nice level (-19 to 19, see &#8216;man nice&#8217;),<br \/>\n## and I\/O limit (kilobytes per second; 0 == off)<br \/>\n## to reduce load on host.<br \/>\n#<br \/>\n# SetNiceLevel = 0<br \/>\n# SetIOLimit = 0<\/p>\n<p>## The version string to embed in file signature databases<br \/>\n#<br \/>\n# VersionString = NULL<\/p>\n<p>## Interval between time stamp messages<br \/>\n#<br \/>\n# SetLoopTime = 60<br \/>\nSetLoopTime = 600<\/p>\n<p>## Interval between file checks<br \/>\n#<br \/>\n# SetFileCheckTime = 600<br \/>\nSetFileCheckTime = 7200<\/p>\n<p>## Alternative: crontab-like schedule<br \/>\n#<br \/>\n# FileCheckScheduleOne = NULL<\/p>\n<p>## Alternative: crontab-like schedule(2)<br \/>\n#<br \/>\n# FileCheckScheduleTwo = NULL<\/p>\n<p>## Report only once on modified fles<br \/>\n## Setting this to &#8216;FALSE&#8217; will generate a report for any policy<br \/>\n## violation (old and new ones) each time the daemon checks the file system.<br \/>\n#<br \/>\n# ReportOnlyOnce = True<\/p>\n<p>## Report in full detail<br \/>\n#<br \/>\n# ReportFullDetail = False<\/p>\n<p>## Report file timestamps in local time rather than GMT<br \/>\n#<br \/>\n# UseLocalTime = No<\/p>\n<p>## The console device (can also be a file or named pipe)<br \/>\n## &#8211; There are two console devices. Accordingly, you can use<br \/>\n## this directive a second time to set the second console device.<br \/>\n## If you have not defined the second device at compile time,<br \/>\n## and you don&#8217;t want to use it, then:<br \/>\n## setting it to \/dev\/null is less effective than just leaving<br \/>\n## it alone (setting to \/dev\/null will waste time by opening<br \/>\n## \/dev\/null and writing to it)<br \/>\n#<br \/>\n# SetConsole = \/dev\/console<\/p>\n<p>## Activate the SysV IPC message queue<br \/>\n#<br \/>\n# MessageQueueActive = False<\/p>\n<p>## If false, skip reverse lookup when connecting to a host known<br \/>\n## by name rather than IP address (i.e. trust the DNS)<br \/>\n#<br \/>\n# SetReverseLookup = True<\/p>\n<p>## &#8212; E-Mail &#8212;<\/p>\n<p># Only highest-level (alert) reports will be mailed immediately,<br \/>\n# others will be queued. Here you can define, when the queue will<br \/>\n# be flushed (Note: the queue is automatically flushed after<br \/>\n# completing a file check).<br \/>\n#<br \/>\nSetMailTime = 86400<\/p>\n<p>## Maximum number of mails to queue<br \/>\n#<br \/>\nSetMailNum = 10<\/p>\n<p>## Recipient (max. 8)<br \/>\n#<br \/>\nSetMailAddress=root@localhost<\/p>\n<p>## Mail relay (IP address)<br \/>\n#<br \/>\nSetMailRelay = localhost<\/p>\n<p>## Custom subject format<br \/>\n#<br \/>\nMailSubject = [Samhain at %H] %T: %S<\/p>\n<p>## &#8212; end E-Mail &#8212;<\/p>\n<p>## Path to the prelink executable<br \/>\n#<br \/>\n# SetPrelinkPath = \/usr\/sbin\/prelink<\/p>\n<p>## TIGER192 checksum of the prelink executable<br \/>\n#<br \/>\n# SetPrelinkChecksum = (no default)<\/p>\n<p>## Path to the executable. If set, will be checksummed after startup<br \/>\n## and before exit.<br \/>\n#<br \/>\n# SamhainPath = (no default)<\/p>\n<p>## The IP address of the log server<br \/>\n#<br \/>\n# SetLogServer = (default: compiled-in)<\/p>\n<p>## The IP address of the time server<br \/>\n#<br \/>\n# SetTimeServer = (default: compiled-in)<\/p>\n<p>## Trusted Users (comma delimited list of user names)<br \/>\n#<br \/>\n# TrustedUser = (no default; this adds to the compiled-in list)<\/p>\n<p>## Path to the file signature database<br \/>\n#<br \/>\n# SetDatabasePath = (default: compiled-in)<\/p>\n<p>## Path to the log file<br \/>\n#<br \/>\n# SetLogfilePath = (default: compiled-in)<\/p>\n<p>## Path to the PID file<br \/>\n#<br \/>\n# SetLockPath = (default: compiled-in)<\/p>\n<p>## The digest\/checksum\/hash algorithm<br \/>\n#<br \/>\n# DigestAlgo = TIGER192<\/p>\n<p>## Custom format for message header.<br \/>\n## CAREFUL if you use XML logfile format.<br \/>\n##<br \/>\n## %S severity<br \/>\n## %T timestamp<br \/>\n## %C class<br \/>\n##<br \/>\n## %F source file<br \/>\n## %L source line<br \/>\n#<br \/>\n# MessageHeader=&#8221;%S %T &#8221;<\/p>\n<p>## Don&#8217;t log path to config\/database file on startup<br \/>\n#<br \/>\n# HideSetup = False<\/p>\n<p>## The syslog facility, if you log to syslog<br \/>\n#<br \/>\n# SyslogFacility = LOG_AUTHPRIV<br \/>\nSyslogFacility=LOG_LOCAL2<\/p>\n<p>## The message authentication method<br \/>\n## &#8211; If you change this, you *must* change it<br \/>\n## on client *and* server<br \/>\n#<br \/>\n# MACType = HMAC-TIGER<\/p>\n<p>## everything below is ignored<br \/>\n[EOF]<\/p>\n<p>#####################################################################<br \/>\n# This would be the proper syntax for parts that should only be<br \/>\n# included for certain hosts.<br \/>\n# You may enclose anything in a @HOSTNAME\/@end bracket, as long as the<br \/>\n# result still has the proper syntax for the config file.<br \/>\n# You may have any number of @HOSTNAME\/@end brackets.<br \/>\n# HOSTNAME should be the fully qualified &#8216;official&#8217; name<br \/>\n# (e.g. &#8216;nixon.watergate.com&#8217;, not &#8216;nixon&#8217;), no aliases.<br \/>\n# No IP number &#8211; except if samhain cannot determine the<br \/>\n# fully qualified hostname.<br \/>\n#<br \/>\n# @HOSTNAME<br \/>\n# file=\/foo\/bar<br \/>\n# @end<br \/>\n#<br \/>\n# These are two examples for conditional inclusion\/exclusion<br \/>\n# of a machine based on the output from &#8216;uname -srm&#8217;<br \/>\n# $Linux:2.*.7:i666<br \/>\n# file=\/foo\/bar3<br \/>\n# $end<br \/>\n#<br \/>\n# !$Linux:2.*.7:i686<br \/>\n# file=\/foo\/bar2<br \/>\n# $end<br \/>\n#<br \/>\n#####################################################################<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Questo e il file di configurazione di samhain nella nuova versione e fa riferimento a questo vecchio articolo ##################################################################### # # Configuration file template for samhain. # ##################################################################### # # &#8212; empty lines and lines starting with &#8216;#&#8217;, &#8216;;&#8217; or &#8216;\/\/&#8217; are ignored # &#8212; boolean options can be Yes\/No or True\/False or 1\/0 # [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[110,8,14,7,6],"tags":[112,137],"class_list":["post-1496","post","type-post","status-publish","format-standard","hentry","category-ids","category-linux","category-networking","category-sistemi-operativi","category-work","tag-ids","tag-samahin"],"_links":{"self":[{"href":"http:\/\/clark.tipistrani.it\/index.php?rest_route=\/wp\/v2\/posts\/1496","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/clark.tipistrani.it\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/clark.tipistrani.it\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/clark.tipistrani.it\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/clark.tipistrani.it\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1496"}],"version-history":[{"count":4,"href":"http:\/\/clark.tipistrani.it\/index.php?rest_route=\/wp\/v2\/posts\/1496\/revisions"}],"predecessor-version":[{"id":1499,"href":"http:\/\/clark.tipistrani.it\/index.php?rest_route=\/wp\/v2\/posts\/1496\/revisions\/1499"}],"wp:attachment":[{"href":"http:\/\/clark.tipistrani.it\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1496"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/clark.tipistrani.it\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1496"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/clark.tipistrani.it\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1496"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}