LinuxQuestions.org

LinuxQuestions.org (/questions/)
-   Linux - Laptop and Netbook (https://www.linuxquestions.org/questions/linux-laptop-and-netbook-25/)
-   -   viruses/malware etc: Is my Debian GNU/Linux system protected? (https://www.linuxquestions.org/questions/linux-laptop-and-netbook-25/viruses-malware-etc-is-my-debian-gnu-linux-system-protected-4175417318/)

edbarx 07-20-2012 06:10 AM

So, the obvious question to ask, would be: What should I do to prevent java-related attacks?

To elaborate a little on possible answers, a respondent may say that I should not enable java on my system, or worse, that I should turn off my computer, or that I should not use the internet. However, these are not solutions because the internet has become an indispensable resource without which one will be at a great disadvantage. Moreover, many businesses, assume that one has access to the internet. Therefore, refraining from using the internet, is not an answer.

craigevil 07-20-2012 06:12 AM

Quote:

Originally Posted by edbarx (Post 4731271)
Reading a current thread from forums.debian.net about multiplatform viruses and malware, I am becoming preoccupied that my Debian system is vulnerable. The problem is accentuated even further because I use Gnu/Linux exclusively for all my computing needs. In other words I access my bank accounts online, I pay my bills online, etc.

The State of My System:
a) I make regular updates to keep up with any security updates
b) I have arno-iptables firewall enabled
c) I have all ports closed
d) I use privoxy to filter unwanted web-content (ie ads, etc.)
e) I use Add Block Plus
f) I use iceweasel aka Firefox.

Is my system protected against multiplatform scumware because the shivers I used to have when I still used MS Windows are starting to haunt me again?

I would add NoScript and HTTPS Everywhere and call it good, keep in mind Quantum on forums.debian.net is known for being almost as paranoid as Alhaz(sp?) was.

I use ufw with the default 'deny' profile.
# ufw status verbose
Status: active
Logging: off
Default: deny (incoming), allow (outgoing)

Code:

My Firefox Information

Last updated: Wed, 18 Jul 2012 00:22:08 GMT
User Agent: Mozilla/5.0 (X11; Linux i686; rv:14.0) Gecko/20100101 Firefox/14.0.1

Extensions (enabled: 28, disabled: 1; total: 29)
Themes (3)
  • Default

  • Firefox B [selected]

  • Oxygen KDE [selected]


Plugins
  • DivX Browser Plug-In

  • Java(TM) Plug-in 1.7.0_05

  • KParts Plugin

  • mplayerplug-in is now gecko-mediaplayer 1.0.6

  • QuickTime Plug-in 7.6.9

  • RealPlayer 9

  • Shockwave Flash

  • Windows Media Player Plug-in


I use 3 lists with Adblock Plus; Easy, Easy Privacy, Antisocial.

On Chrome I have AdblockPlus, Flashblock, and HTTPS Everywhere, with the same adblocking lists.

Most so called 'malware' on Linux needs to be either installed or like the Java exploit in the thread at fdn needs user approval to run. You really can't stop the average user from doing stupid things. All I can say is in the eight years I have ran Debian not once have apps like rkhunter, chkrootkit, lynis, tiger, tripwire, clamav, debsums, ever found anything that didn't turn out to be a false positive.

The answer to the question is: It is as protected as you make it.

edbarx 07-20-2012 06:50 AM

Is it possible to find some software which monitors remote connection attempts and unauthorised local programs sending information to a remote location?

I have all ports closed.

edbarx 07-20-2012 07:29 AM

I tried ufw and arno-iptables-firewall but both of them are failing to block pings from the outside. I would like to have my machine refusing to reply to pings. I used dpkg-reconfigure for both ufw and arno-iptables-firewall.

craigevil 07-20-2012 10:02 AM

I have ran the scan at grc.com on my laptop from numerous locations and every time it passes with Stealth. I do not mess with manually closing or opening ports, I just use the Default Deny setting on ufw.

k3lt01 07-20-2012 06:36 PM

Quote:

Originally Posted by craigevil (Post 4733761)
I have ran the scan at grc.com on my laptop from numerous locations and every time it passes with Stealth. I do not mess with manually closing or opening ports, I just use the Default Deny setting on ufw.

I never get stealth on Linux and I used to get it all the time on Windows. It doesn't bother me anyway, if my ports are closed I'm not worried.

edbarx 07-21-2012 12:08 AM

I reinstalled arno-iptables-firewall and chose to close all ports.

This thread had drifted from the proper argument of viral and malware infections although there is an overlap with security.

edbarx 09-04-2012 01:17 AM

Is a running antivirus daemon a must nowadays?
 
Since multiplatform viruses/scumware are designed to work on any OS, and I use a Web-browser (iceweasel) everday I turn on my computer, I would like to know whether these days it is a must to run an antivirus daemon like Windows users do.

Systems Used:
Debian (Squeeze)
Debian (Wheezy)

k3lt01 09-04-2012 05:03 AM

Hey Edbarx.

In answer to your question my answer, others may and probably do think differently to me, would say a resounding NO. You are much better off being a wise surfer/user of the net than to add something that most of the time looks for Windows malware. Yes you can get infected, I don't think anyone who is serious would say it is impossible, but if you follow some simple safe practises then the chance is extremely slim. I think we have been through this before haven't we? If you are worried then just install ClamAv or something similar, or follow the suggestions in the other thread, and be done with it, the peace of mind you will get just from this simple installation must be worthwhile.

273 09-04-2012 05:24 AM

For what it's worth I tend to run tiger and take a look at the email it sends me to make sure I'm not running any servers I don't know about. I have to admit that that's partly to ensure I've not accidentally installed httpd or something as well as looking for compromises -- in other words it's more for awareness than any sense of worry.
Other than that it's AdBlock No-Script and all the other safe surfing advice.

pixellany 09-04-2012 05:42 AM

I have run my home systems exclusively on Linux for over 7 years with no anti-bad-stuff SW. Our only issue is that my wife excels at getting herself on junk-mail lists.....;)

edbarx 09-04-2012 06:15 AM

A daemon that scans for suspicious java script would probably offer enough protection.

sundialsvcs 09-04-2012 09:04 AM

Generally speaking, you will be more than adequately protected if you observe three things:

(1) Ensure that you do not run with elevated privileges of any kind.

(2) Keep your system up-to-date, especially with regard to security related updates.

(3) Use and maintain current backups. (Use a tool that takes backups automatically and continuously to an externally-attached disk device.)

Run-of-the-mill Windows installations suffer from malware attacks because, for some inexplicable reason, they are set up to run as password-less Administrator users. Always remember that the computer is merely a machine, and that it knows exactly two things: "Yes (1)" and "No (0)." Despite the clever marketing campaigns run by the snake-oil people, this is not the world of biology, in which any properly-configured strand of RNA could introduce itself into your cells unless it is constantly and vigilantly defended-against by your immune system.

craigevil 09-04-2012 11:25 AM

nope.

disable any unneeded services/processes.
keep your system updated
keep your browser updated
use AdblockPlus and NoScript in Firefox/Iceweasel
I would also suggest using QuickJava to be able to enable/disable plugins, so you only enable them when you need them.
QuickJava

At one time I had a ton of security apps installed, but in eight years of running Debian not once have they ever found anything.

These days all I have is tripwire and rkhunter.

The only real reason for an AV is to keep from sending malware to Windows.

edbarx 09-05-2012 01:52 AM

Quote:

Originally Posted by sundialsvcs (Post 4772368)
Generally speaking, you will be more than adequately protected if you observe three things:

(1) Ensure that you do not run with elevated privileges of any kind.

(2) Keep your system up-to-date, especially with regard to security related updates.

(3) Use and maintain current backups. (Use a tool that takes backups automatically and continuously to an externally-attached disk device.)

Run-of-the-mill Windows installations suffer from malware attacks because, for some inexplicable reason, they are set up to run as password-less Administrator users. Always remember that the computer is merely a machine, and that it knows exactly two things: "Yes (1)" and "No (0)." Despite the clever marketing campaigns run by the snake-oil people, this is not the world of biology, in which any properly-configured strand of RNA could introduce itself into your cells unless it is constantly and vigilantly defended-against by your immune system.

Thanks for your replies. Maybe the post below is only serving the purpose to make Linux users feel uncomfortable with their system.
Quote:

Originally Posted by Cross-platform Password-Stealing Trojan - Debian User Forums
TFA contains no details regarding how the malware spreads, so maybe it's just hype to sell their AV product...

(Or maybe not...)

http://news.drweb.com/show/?i=2679&lng=en&c=14

Thanks


All times are GMT -5. The time now is 10:29 AM.