Artifact stealth_4.03.03-1+b1_arm64

Metadata
deb_control_files:
- control
- md5sums
deb_fields:
  Architecture: arm64
  Depends: libbobcat6 (>= 6.06.02), libc6 (>= 2.38), libgcc-s1 (>= 3.0), libstdc++6
    (>= 13.1)
  Description: |-
    stealthy File Integrity Checker
     The STEALTH program performs File Integrity Checks on (remote) clients. It
     differs from other File Integrity Checkers by not requiring baseline
     integrity data to be kept on either write-only media or in the client's file
     system. In fact, clients will hardly contain any indication suggesting that
     they are being monitored, thus improving the stealthiness of the integrity
     scans.
     .
     STEALTH uses standard available software to perform file integrity checks
     (like find(1) and sha1sum(1)). Using individualized policy files, it is
     highly adaptable to the specific characteristics of its clients.
     .
     In production environments STEALTH should be run from an isolated computer
     (called the `STEALTH monitor').  In optimal configurations the STEALTH
     monitor should be a computer not accepting incoming connections. The account
     used to connect to its clients does not have to be `root'; usually
     read-access to the client's file system is enough to perform a full integrity
     check. Instead of using `root' a more restrictive administrative or
     ordinary account might offer all necessary requirements for the desired
     integrity check.
     .
     STEALTH itself must communicate with the computers it should monitor. It is
     essential that this communication is secure. STEALTH configurations
     therefore normally specify SSH as the command-shell to use for connecting to
     clients. STEALTH may be configured so as to use but one SSH connection per
     client, even if integrity scans are to be performed repeatedly. Apart from
     this, the STEALTH monitor is commonly allowed to send e-mail to remote
     client systems' maintainers.
     .
     STEALTH-runs itself may start randomly within specified intervals. The
     resulting unpredicability of STEALTH-runs further increases STEALTH's
     stealthiness.
     .
     STEALTH's acronym is expanded to `Ssh-based Trust Enforcement Acquired
     through a Locally Trusted Host': the client's trust is enforced, the locally
     trusted host is the STEALTH monitor.
  Homepage: https://fbb-git.gitlab.io/stealth
  Installed-Size: '347'
  Maintainer: Frank B. Brokken <f.b.brokken@rug.nl>
  Package: stealth
  Priority: optional
  Section: admin
  Source: stealth (4.03.03-1)
  Suggests: stealth-doc
  Version: 4.03.03-1+b1
srcpkg_name: stealth
srcpkg_version: 4.03.03-1

File

2024-11-24T05:52:47.588325 UTC: BinaryFileWidget failed to render

Relations

Relation Direction Type Name
built-using Source package stealth_4.03.03-1

binary package System mirror sid from https://deb.debian.org/debian - 3 weeks, 5 days ago 0 minutes
BETA