HP-UX Host Intrusion Detection System Version 4.2 Administration Guide

$ IDS_genAgentCerts
==> Be sure to run this script on the IDS
Administration host.
Generate keys for which host? 2001::db8:100
Generating key pair and certificate request
for IDS Agent
on 2001::db8:100....
Signing certificate for IDS Agent on 2001::db8:100
...
Certificate package for IDS Agent on 2001::db8:100 is
/var/opt/ids/tmp/2001::db8:100.tar.Z
Next hostname (^D to quit)? myhost2
Generating key pair and certificate request
for IDS Agent
on myhost2....
Signing certificate for IDS Agent on myhost2
...
Certificate package for IDS Agent on myhost2
is
/var/opt/ids/tmp/myhost2.tar.Z
Next hostname (^D to quit)? myhost3
Host name "myhost3" unknown. DNS lookup
failed.
Do you still wish to create a certificate
[N]/Y? n
Re-enter a host name (^D to quit): 15.27.43.6
Generating key pair and certificate request
for IDS Agent
on 15.27.43.6....
Signing certificate for IDS Agent on
15.27.43.6...
Certificate package for IDS Agent on
15.27.43.6 is
/var/opt/ids/tmp/15.27.43.6.tar.Z
Next hostname (^D to quit)? Ctrl-D
********************************************
****************
* Successfully created agent certificates for
the following
* hosts:
* myhost1
* myhost2
* 15.27.43.6
* 2001::db8:100
*
* Certificate public keys are valid for 700
days and are 1024 bits in size.
*
* They are stored in /var/opt/ids/tmp as
hostname.tar.Z
*
* You should now transfer the bundles via a
secure channel
* to the IDS agent machines.
*
* On each agent you will need to run the
IDS_importAgentKeys script to finish the
Setting Up HP-UX HIDS Secure Communications 33