[ale] File Integrity Check
J. Reeves Hall
reeves at earthling.net
Fri Aug 13 16:24:56 EDT 1999
If you wanted to be paranoid you could use the md5sum program. That's 160
bits, IIRC, of extremely difficult to fake data.
-Reeves
Benjamin Scherrey wrote:
> Since a checksum is, by definition, a hash, it will always be possible
> to make a checksum appear to be correct. Some, however, are better
> than others. I recall coding EPROMs to run during the POST process of
> an IBM PC which required a memory range to checksum to zero before it
> executed. The checksum was purposely simple and by adding $0xFF's to
> the end of the file you'd eventually get the checksum to wrap around
> to zero. A hash that considers file size and timestamp, as well as
> content will be more difficult to 'fake'. An even more secure
> mechanism would be to run two different checksum types on the file
> although this is probably theoretically the same as generating a
> checksum with twice the resulting bits with a truly randomizing
> algorithm. I'm not familiar with the 'sum' program. If all it does is
> add bytes together in the file then I'd say this was a completely
> inadequate mechanism. Better checksums make use of bit shifting and
> xor computations.
>
> later,
>
> Ben Scherrey
>
> PS: Any of you math types are quite welcome to correct any
> misconceptions I may be propagating...
>
> Russell Enderby wrote:
> >
> > In pursuit of determining critical system files for modifications I was
> > thinking the checksum prog 'sum' would be sufficient. Understanding
> > that time,date, and file size can be modified under the ext2fs/ufs
> > directory table. Is it possible to also make the 'sum' checksum appear
> > to be correct?
> >
> > I was under the impression tripwire uses its own special checksum prog
> > to verify files, although would 'sum' be sufficient as well? If not
> > does anyone know of better more thorough checksum app?
More information about the Ale
mailing list