cd /path/to/parrot-booty-protection
sudo bash scripts/install_control.sh# Start control plane
pbp control start
# Check integrity
pbp integrity
# View alerts
pbp alerts
# Enable DNS Guard (Unbound)
sudo pbp enable dns
# Check DNS status
pbp scan dnsOpen browser: http://localhost:7777
File: /etc/pbp/policy.yaml
Key Settings:
dns_authority: unbound- DNS resolverrequire_operator_confirmation: true- Approval requiredallow_auto_changes: false- No autonomous changesmonitor_integrity: true- File monitoring enabled
/etc/resolv.conf- DNS configuration (immutable)/etc/unbound/unbound.conf- Unbound config/etc/NetworkManager/NetworkManager.conf- Network manager/etc/systemd/resolved.conf- systemd-resolved
# Enable monitoring service
sudo systemctl enable --now pbp-integrity.service
# Check status
systemctl status pbp-integrity.service
# View alerts
tail -f /var/log/pbp/integrity-alerts.log# Check resolver
cat /etc/resolv.conf
# Should show: nameserver 127.0.0.1
# Test DNS
dig @127.0.0.1 example.com
# Check Unbound
systemctl status unbound
# Verify DoT/DoH
pbp scan dnsAll security changes require approval:
$ sudo pbp enable network
⚠️ OPERATOR APPROVAL REQUIRED
Action: network_enable
Details: Configure nftables firewall
Approve this change? [y/N]: y
✅ Action approved by operator┌─────────────────────────────────────────┐
│ Operator (You) │
└─────────────┬───────────────────────────┘
│
▼
┌─────────────────────────────────────────┐
│ Policy Engine │
│ /etc/pbp/policy.yaml │
└─────────────┬───────────────────────────┘
│
┌─────────┼─────────┐
▼ ▼ ▼
┌────────┐ ┌────────┐ ┌────────┐
│ DNS │ │Network │ │Rootkit │
│ Guard │ │ Guard │ │ Guard │
└────────┘ └────────┘ └────────┘
│ │ │
└─────────┼─────────┘
▼
┌─────────────────────────────────────────┐
│ Integrity Watcher │
│ Monitors protected files │
│ Auto-restores on violation │
└─────────────┬───────────────────────────┘
│
▼
┌─────────────────────────────────────────┐
│ Alert Framework │
│ Terminal | Log | Report | Email │
└─────────────────────────────────────────┘
- Single Source of Truth: Policy file defines all behavior
- Operator Approval: No autonomous changes
- Continuous Monitoring: Protected files watched
- Auto-Restoration: Violations corrected automatically
- Complete Audit Trail: All actions logged
sudo systemctl restart unbound
sudo chattr -i /etc/resolv.conf
echo "nameserver 127.0.0.1" | sudo tee /etc/resolv.conf
sudo chattr +i /etc/resolv.confsudo systemctl restart pbp-integrity.service
sudo /opt/pbp/core/integrity.sh init# Check if port in use
ss -tlnp | grep 7777
# Kill existing process
sudo pkill -f "python3.*7777"
# Restart
pbp control restart- ✅ Install control system
- ✅ Enable integrity monitoring
- ✅ Start control plane
- ✅ Reinstall DNS with Unbound
- ✅ Verify all modules
- ✅ Review alerts regularly
Documentation: See docs/CONTROL_RESTORATION.md for complete details
Support: This is operator-first security. You are in control.