Crates.io | tr1pd |
lib.rs | tr1pd |
version | 0.3.1 |
source | src |
created_at | 2018-01-01 18:44:17.360175 |
updated_at | 2018-02-15 20:36:02.468094 |
description | tamper resistant audit log |
homepage | |
repository | https://github.com/kpcyrd/tr1pd |
max_upload_size | |
id | 45136 |
size | 186,710 |
Status: Very unstable, do not use
tr1pd is a tamper resistant audit log.
# setup your keyring
tr1pctl init
# start the tr1pd daemon
systemctl start tr1pd
# start a sensor
./sensor01 | tr1pctl write &
# verify your logs
tr1pctl fsck
# view the logs of your current session
tr1pctl ls @..
Make sure you have the following dependencies installed:
Debian/Ubuntu: libsodium-dev libseccomp-dev libzmq3-dev
,
Archlinux: libsodium libseccomp zeromq
,
Alpine: make libsodium-dev libseccomp-dev zeromq-dev
,
OpenBSD: libsodium zeromq
.
cargo install tr1pd
If possible, use your package manager to setup the system (Archlinux AUR).
After that you need to add the users that should have access to tr1pctl to the
tr1pd
group with usermod -aG tr1pd youruser
.
If no package is available, you can also run a standalone setup (this is also recommended for development). Edit the paths as needed.
# standalone configuration (~/.config/tr1pd.toml)
[daemon]
socket = "ipc:///home/user/.tr1pd/tr1pd.sock"
datadir = "/home/user/.tr1pd/"
pub_key = "/home/user/.tr1pd/pub.key"
sec_key = "/home/user/.tr1pd/sec.key"
Run tr1pctl init
to setup the keyring in your homefolder and tr1pd
in a
seperate terminal. Verify everything is working correctly by executing
tr1pctl ping
.
Sensors can be written in any language using stdio. tr1pctl write
is a simple
line based interface that writes each line into a block. You can also enable
binary mode with tr1pctl write -s 65535
. To monitor your auth.log you can
simply write:
tail -f /var/log/auth.log | tr1pctl write
No. tr1pd uses merkle tree like constructs that are heavily inspired by bitcoin, but lacks some essential properties to qualify as a blockchain.
The initial draft for the protocol was designed in 2014 for perimeter intrustion detection to verify integrity of buildings. Multiple prototypes have been written in 2017 and the first deployment was on a server located at the 34C3 to ensure integrity inside the congress colocation.
AGPLv3+