19.3. Customizing Tripwire
	After you have installed the Tripwire RPM, you must complete the
	following steps to initialize the software:
      
19.3.1. Edit /etc/tripwire/twcfg.txt
	  Although you are not required to edit this sample Tripwire
	  configuration file, you may find it necessary for your situation.  For
	  instance, you may want to alter the location of Tripwire files,
	  customize email settings, or customize the level of detail for
	  reports.
	
	  Below is a list of required user configurable
	  variables in the /etc/tripwire/twcfg.txt file:
	
- POLFILE — Specifies the location of
	      the policy file; /etc/tripwire/tw.pol is the default value.
	     
- DBFILE — Specifies the location of
	      the database
	      file; /var/lib/tripwire/$(HOSTNAME).twd is the default value.
	     
- REPORTFILE — Specifies the location
	      of the report files. By default this value is set to
	      /var/lib/tripwire/report/$(HOSTNAME)-$(DATE).twr.
	     
- SITEKEYFILE — Specifies the location
	      of the site key file; /etc/tripwire/site.key is
	      the default value.
	     
- LOCALKEYFILE — Specifies the location
	      of the local key
	      file; /etc/tripwire/$(HOSTNAME)-local.key is
	      the default value.
	     
|  | Important | 
|---|
|  | 	    If you edit the configuration file and leave any of the above
	    variables undefined, the configuration file will be invalid. If this
	    occurs, when you execute the tripwire command it
	    will report an error and exit.
	   | 
	  The rest of the configurable variables in the sample
	  /etc/tripwire/twcfg.txt file are optional. These
	  include the following:
	
- EDITOR — Specifies the text editor
	      called by Tripwire. The default value is /bin/vi.
	     
- LATEPROMPTING — If set to
	      true, this variable configures Tripwire to wait as
	      long as possible before prompting the user for a password,
	      thereby minimizing the amount of time the password is in
	      memory. The default value is false.
	     
- LOOSEDIRECTORYCHECKING — If set to
	      true, this variable configures Tripwire to report if
	      a file within a watched directory changes, but not to report the
	      change for the directory itself. This limits redundancy in
	      Tripwire reports. The default value is false.
	     
- SYSLOGREPORTING — If set to
	      true, this variable configures Tripwire to report
	      information to the syslog daemon via the "user" facility. The log
	      level is set to notice. See the
	      syslogd man page for more information. The
	      default value is false.
	     
- MAILNOVIOLATIONS — If set to
	      true, this variable configures Tripwire to
	      email a report at a regular interval regardless of whether any
	      violations have occurred. The default value is
	      true.
	     
- EMAILREPORTLEVEL — Specifies the
	      level detail for emailed reports. Valid values for this variable
	      are 0 through 4. The default value is
	      3.
	     
- REPORTLEVEL — Specifies the level
	      detail for reports generated by the twprint
	      command. This value can be overridden on the command line, but is
	      set to 3 by default.
	     
- MAILMETHOD — Specifies which mail
	      protocol Tripwire should use. Valid values are
	      SMTP and SENDMAIL. The default value is
	      SENDMAIL.
	     
- MAILPROGRAM — Specifies which mail
	      program Tripwire should use. The default value is
	      /usr/sbin/sendmail -oi -t.
	     
	  After editing the sample configuration file, you will need to
	  configure the sample policy file.
	
|  | Warning | 
|---|
|  | 	    For security purposes, you should either delete or store in a secure
	    location any copies of the plain text 
	    /etc/tripwire/twcfg.txt file after running the
	    installation script or regenerating a signed configuration
	    file. Alternatively, you can change the permissions so that it is
	    not world readable.
	   | 
19.3.2. Edit /etc/tripwire/twpol.txt
	  Although it is not required, you should edit this heavily commented
	  sample Tripwire policy file to take into account the specific
	  applications, files, and directories on your system. Relying on the
	  unaltered sample configuration from the RPM may not adequately protect
	  your system.
	
	  Modifying the policy file also increases the usefulness of
	  Tripwire reports by minimizing false alerts for files and programs you
	  are not using and by adding functionality, such as email notification.
	
	  If you modify the sample policy file after running the configuration
	  script, see Section 19.8 Updating the Tripwire Policy File for
	  instructions on regenerating a signed policy file.
	
|  | Warning | 
|---|
|  | 	    For security purposes, you should either delete or store in a secure
	    location any copies of the plain text 
	    /etc/tripwire/twpol.txt file after running the
	    installation script or regenerating a signed configuration
	    file. Alternatively, you can change the permissions so that it is
	    not world readable.
	   | 
19.3.3. Run the twinstall.sh Script
	  As the root user, type /etc/tripwire/twinstall.sh
	  at the shell prompt to run the configuration script. The
	  twinstall.sh script will ask you for site and local
	  passwords. These passwords are used to generate cryptographic keys for
	  protecting Tripwire files. The script then creates and signs these
	  files.
	
	  When selecting the site and local passwords, you should consider the
	  following guidelines:
	
- Use at least eight alphanumeric and symbolic characters for
	    each unique password, but no more than 1023 total characters. 
- Do not use quotes in a password. 
- Make the Tripwire passwords completely different from the
	      root or any other password for the system.
	     
- Use unique passwords for both the site key and the
	      local key.
	     
	  The site key password protects the Tripwire configuration and policy
	  files. The local key password protects the Tripwire database and
	  report files.
	
|  | Warning | 
|---|
|  | 	    There is no way to decrypt a signed file if you forget your
	    password. If you forget the passwords, the files are unusable
	    and you will have to run the configuration script again.
	   | 
	  By encrypting its configuration, policy, database, and report files,
	  Tripwire protects them from being viewed by anyone who does not know
	  the site and local passwords. This means that, even if an intruder
	  obtains root access to your system, they will not be able to alter the
	  Tripwire files to hide their tracks.
	
	    Once encrypted and signed, the configuration and policy files generated
	    by running the twinstall.sh script should not be
	    renamed or moved.