AIDE (Advanced Intrusion Detection Environment) is a file and directory integrity checker, it was initially developed as a free replacement for Tripwire licensed under the terms of the GNU General Public License (GPL).
How it Works
Aide takes a “snapshot” of the state of the system, register hashes, modification times, and other data regarding the files defined by the administrator. This “snapshot” is used to build a database that is saved and may be stored on an external device for safekeeping.
When the administrator wants to run an integrity test, the administrator places the previously built database in an accessible place and commands Aide to compare the database against the real status of the system. Should a change have happened to the computer between the snapshot creation and the test, Aide will detect it and report it to the administrator. Alternatively, Aide can be configured to run on a schedule and report changes daily using scheduling technologies such as cron, which is the default behavior of the Debian Aide package.
This is mainly useful for security purposes, given that any malicious change which could have happened inside of the system would be reported by Aide.
- Supported message digest algorithms: md5, sha1, rmd160, tiger, crc32, sha256, sha512, whirlpool
- Supported file attributes: File type, Permissions, Inode, Uid, Gid, Link name, Size, Block count, Number of links, Mtime, Ctime and Atime
- Support for Posix ACL, SELinux, XAttrs and Extended file system attributes if support is compiled in
- Plain text configuration files and database for simplicity
- Powerful regular expression support to selectively include or exclude files and directories to be monitored
- Gzip database compression if zlib support is compiled in
- Stand alone static binary for easy client/server monitoring configurations
Aide is also included in a lot of distros, so for example on Debian and Ubuntu you can just install it straight with
aptitude install aide.
You can download the latest stable version of Aide (0.15.1) source code here:
Or read more here.