Chapter 1: Introduction

1.1: What's new in Stealth V.2.11.03

1.2: Stealth

Welcome to stealth. The program stealth implements a file integrity scanner. The acronym stealth can be expanded to

SSH-based Trust Enforcement Acquired through a Locally Trusted Host.

This expansion contains the following key terms:

stealth is based on an idea by Hans Gankema and Kees Visser, both at the Center for Information Technology of the University of Groningen.

stealth's main task is to perform file integrity tests. However, the testing will leave no sediments on the tested computer. Therefore, stealth has stealthy characteristics. I consider this an important security improving feature of stealth.

The controller itself only needs two kinds of outgoing services: ssh(1) to reach its clients, and some mail transport agent (e.g., sendmail(1)) to forward its outgoing mail to some mail-hub.

Here is what happens when stealth is run:

Alternatively, the command-line options --reload, --rerun, --suppress, --resume and --terminate may be provided to communicate with a running stealth process started earlier using either the --keep-alive or --repeat option. For these options one argument must be provided: the pathname to a pid-file of a running s().

The options --suppress and --rerun (see section 5.7) were implemented to allow safe rotations of stealth's report file.

1.2.1: The integrity of the stealth distribution

The integrity of the archive stealth-2.11.03.tar.gz can be verified as follows:

This should produce output comparable to:

gpg: Signature made Fri Jun  1 10:57:41 2012 CEST using DSA key ID EAE4D8AA
gpg: Good signature from "Frank B. Brokken <f.b.brokken@rug.nl>"