ranonymize man page on SuSE

Man page or keyword search:  
man Server   14857 pages
apropos Keyword Search (all sections)
Output format
SuSE logo
[printable version]

RANONYMIZE.CONF(1)					    RANONYMIZE.CONF(1)

NAME
       ranonymize.conf - ranonymize(1) configuration file.

COPYRIGHT
       Copyright (c) 2000-2008 QoSient. All rights reserved.

SYNOPSIS
       ranonymize.conf

DESCRIPTION
       This  configuration  file  provides  the ability to specify options for
       argus data anoymization.

OPTIONS
       The anonymization clients have a small number of options	 for  control‐
       ling specific aspects of the anonymization function and its output.

Timestamps, Reference and Sequence Numbers
       Ranonymize anonymizes various fields in Argus records, such as the net‐
       work addresses, protocol specific port numbers, timestamps, transaction
       reference numbers, and the sequence numbers.

       For  some  fields,  specifically	 the timestamps, transaction reference
       numbers and the sequence numbers,  which	 are  generally	 monotonically
       increasing  counters,  a	 good  anonymization technique is to shift the
       values by a constant, so that the sequential relationships between val‐
       ues is preserved.

       The  configuration provides some flexibility here, so that the user can
       control fixed offset shifting anonymization.  The constant value can be
       generated by the anonymization client at "random", which is the default
       behavior, or the user can provide a "fixed:x", where  x	is  the	 fixed
       offset.	 Of  course,  the  keyword  "none" can be used to turn off the
       default anonymization for these values.

       RANON_TRANSREFNUM_OFFSET=random
       RANON_SEQNUM_OFFSET=random
       RANON_TIME_SEC_OFFSET=random
       RANON_TIME_USEC_OFFSET=random

Ethernet Address Vendor Codes
       When anonymizing ethernet addresses, ranonymize has the option to  pre‐
       serve  the vendor portion, if desired.  This allows analytical programs
       to differentiate anonymized data	 by  vendor  type.   This  feature  is
       turned off by default.

       RANON_PRESERVE_ETHERNET_VENDOR=no

Broadcast Addresses
       Ranonymize has the option to preserve the semantic that an address is a
       broadcast address.  This is very important when doing flow analysis for
       either  operational  or	performance  managment tasks, using anonymized
       data.

       RANON_PRESERVE_BROADCAST_ADDRESS=yes

IPv4 Address Anonymization
       IPv4 address are composed of two parts, a network part and a host part.
       Because the addressing strategy of a site may have integrated semantics
       that would want to  be  retained	 in  the  anonymized  addresses,  IPv4
       address	anonymization involves specifying a one-to-one translation ta‐
       ble for both the network and host address spaces in  an	IPv4  address.
       Once  a new network address has been allocated, every occurence of that
       network address will be substituted in the anonymizers  output  stream.
       The  host  address  space  is  anonymized in an independent but similar
       fashion.

       Ranonymize allows you to specify the type of anonymization method  used
       in  a  number  of  categories. For network and host address conversion,
       ranonymize can support "sequential", "random"  or  "no"	anonymization.
       Sequential  anonymization  involves allocating new addresses in a mono‐
       tonically increasing fashion on a first come first serve basis.	Random
       anonymization  allocates	 random	 addresses  from  the  working pool of
       addresses, and "no" anonymization preserves the address	type,  whether
       its network, host or both.

       The  default  working  pool  of	network	 addresses  contains only non-
       routable addresses, and starts with 10.0.0.0.  All anonymized addresses
       are  treated  as	 Class	C  network addresses, in order to conserve the
       anonymization allocation demands.

       As an example, if  the  first  Argus  record  contained	the  addresses
       128.64.2.4  and	132.243.2.87 as the source and destination, sequential
       anonymization would generate the addresses 10.0.0.1 and 10.0.1.1 as the
       new  source  and	 destination  addresses.   This	 is  because,  the two
       addresses have differing network parts, 128.64.2 and  132.243.2,	 these
       would  be  allocated 10.0.0 and 10.0.1 respectively (sequential alloca‐
       tion).  Because these are the first hosts to  be	 allocated,  the  host
       parts are both 1.

       Random anonymization could generate 10.24.31.203 and 10.1.34.18 as pos‐
       sible addresses, as both the Class C network address would be allocated
       randomly	 from the 10 network space, and the host address part would be
       allocated randomly from the possible host addresses.

       Sequential randomization uses the least amount of memory and  minimizes
       anonymization  processing  time,	 while	random provides better address
       scrambling.

       Implemenation note: currently only supporting sequential

       RANON_NET_ANONYMIZATION=sequential
       RANON_HOST_ANONYMIZATION=sequential

Address Hierarchy
       Ranonymize has the option to preserve the network address hierarchy  at
       various	levels	of  granularity.   This	 allows	 you  to  preserve the
       addressing relationships between addresses.  The	 options  are  "cidr",
       "class", "subnet" and "no".

       Class  network  adddress heirarchy preservation, causes ranonymize() to
       allocate new network addresses base on the address class.   All	CLASSA
       network addresses will be allocated new addresses from the Class A net‐
       work pool.   Network  addresses	will  be  allocated  as	 24  bit  CIDR
       addresses,  in  that  the first 24 bits will map to a unique 24 network
       address, and host addresses will be allocated from the 254 address pool
       (0 and 255 can be preserved, see below).

       RANON_PRESERVE_NET_ADDRESS_HIERARCHY=cidr

Specific Network Address Aliasing
       Ranonymize can be configured to perform specific network address trans‐
       lation.	These must be specified as 24 bit CIDR addresses.   RANON_PRE‐
       SERVE_NET_ADDRESS_HIERARCHY  must be set to "cidr", for this feature to
       work.

       Examples would be:

       RANON_SPECIFY_NET_TRANSLATION=192.168.0.0::128.2.134.0
       RANON_SPECIFY_NET_TRANSLATION=64.12.0.0::134.5.0.0
       RANON_SPECIFY_NET_TRANSLATION=128.2.0.0::200.200.0.0

Specific Host Address Aliasing
       Ranonymize can be configured to perform specific host address  transla‐
       tion.  These addresses are allocated prior to reading any data, and are
       removed from the potential network  address  pool,  regardless  of  the
       anonymization  strategy.	  Feel free to list as many addresses that you
       would like.

       Examples would be:

       RANON_SPECIFY_HOST_TRANSLATION=192.168.0.64::128.2.34.5

Transport SAP Aliasing
       Ranonymize can be configured to preserve specific ranges of  port  num‐
       bers.   For convenience, ranonymize() can be configured to preserve the
       IANA well known port allocation range (0-1023),	the  registered	 ports
       (1024-49151)  and/or  the  private  port	 range (49152 - 65535).	 Also,
       ranonymize() can be configured to preserve specific port numbers. These
       numbers	are  independent  of  protocol type, so if port 23461 is to be
       preserved, it will be preserved for both tcp and udp based flows.

       RANON_PRESERVE_WELLKNOWN_PORT_NUMS=yes
       RANON_PRESERVE_REGISTERED_PORT_NUMS=no
       RANON_PRESERVE_PRIVATE_PORT_NUMS=no

SEE ALSO
       ranonymize(1)

			       14 November 2001		    RANONYMIZE.CONF(1)
[top]

List of man pages available for SuSE

Copyright (c) for man pages and the logo by the respective OS vendor.

For those who want to learn more, the polarhome community provides shell access and support.

[legal] [privacy] [GNU] [policy] [cookies] [netiquette] [sponsors] [FAQ]
Tweet
Polarhome, production since 1999.
Member of Polarhome portal.
Based on Fawad Halim's script.
....................................................................
Vote for polarhome
Free Shell Accounts :: the biggest list on the net