LinuxQuestions.org
Share your knowledge at the LQ Wiki.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 08-17-2006, 04:14 PM   #1
bhert
Member
 
Registered: May 2006
Distribution: OpenSUSE 10.3 Kubuntu Hardy Heron
Posts: 268

Rep: Reputation: 30
Rkhunter results-bad?


I ran rkhunter for the first time and the results got me curious.

Scanning for hidden files... [ Warning! ]
---------------
/dev/.udevdb /etc/.pwd.lock

What does the above mean?

- OpenSSL 0.9.7g [ Vulnerable ]

Checking for allowed protocols... [ Warning (SSH v1 allowed) ]

I did not allow SSH, I have not even used it yet. Is it possible that someone found a way in and changed the rules? Thanks

bhert
 
Old 08-17-2006, 05:52 PM   #2
Brian1
LQ Guru
 
Registered: Jan 2003
Location: Seymour, Indiana
Distribution: Distribution: RHEL 5 with Pieces of this and that. Kernel 2.6.23.1, KDE 3.5.8 and KDE 4.0 beta, Plu
Posts: 5,700

Rep: Reputation: 65
For ssh it is looking at the default /etc/sshd/sshd-config file and see some things not quite like it would like to see. If the service is not active then the port is not active.

OpenSSL may be referring that it is aware of security issue with that version and you should look to update it. If not using the not a big deal again.

Not sure about the first one.

Have you updated rkhunter since the install? ' rkhunter --update '

Brian1
 
Old 08-17-2006, 07:36 PM   #3
bhert
Member
 
Registered: May 2006
Distribution: OpenSUSE 10.3 Kubuntu Hardy Heron
Posts: 268

Original Poster
Rep: Reputation: 30
I updated rootkit hunter and now it shows

- GnuPG 1.4.2 [ Vulnerable ]

What is that?
 
Old 08-18-2006, 02:34 AM   #4
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
Scanning for hidden files... [ Warning! ]
---------------
/dev/.udevdb /etc/.pwd.lock
Not sure about the first one.

Explanation: "hidden" here refers to files (remember about everything is a file) whose name starts with a dot, because those can only be seen when you explicitly add "-a" to the "ls" command. Dotfiles are used for benign purposes like storing personal configuration information in your $HOME and have been used in the past as a (simple) way to avoid easy spotting. Also see directories whose name contains of three dots.
Verification: since your distro uses an evolved package management system it would be easy to query which package owns the file: "rpm -q --whatprovides /some/file" and then "rpm -qV --noscripts returned_package_name". A distro-agnostic approach would be to use an integrity checker (Aide, Samhain or even tripwire) to check the file for changes but obviously you must have that integrity checker installed, configured and updated the database shortly after installing the O.S. If all verification methods fail you can use "stat" to find out ownership and access details, "file" to figure out if it's readable, "strings -an1" or a hexeditor if it's binary and your favourite text editor if it's human readable text. The combined results of using these commands offers enough leads to search LQ and the rest of teh intarweb for clues or post.


- OpenSSL 0.9.7g [ Vulnerable ]

OpenSSL may be referring that it is aware of security issue with that version and you should look to update it. If not using the not a big deal again.

Next to updating (which is inarguably the best first reflex) some distro's backport patches and not increment major / minor package versions. If you find this is the case you can ask the Rootkit Hunter maintainers to adjust checking.


Checking for allowed protocols... [ Warning (SSH v1 allowed) ]
I did not allow SSH, I have not even used it yet. Is it possible that someone found a way in and changed the rules?

For ssh it is looking at the default /etc/sshd/sshd-config file and see some things not quite like it would like to see. If the service is not active then the port is not active.

Since the software is installed and apparently not in use you have two options: remove it or change the line "Protocol 2,1" to read "Protocol 2" anyway in /etc/sshd_config. This way you know now you've covered that hole if you would like to use ssh in the future.


- GnuPG 1.4.2 [ Vulnerable ]
Check your distro's repo's for an update of the package. Comments wrt to OpenSSL apply here as well.
 
Old 08-18-2006, 03:27 AM   #5
bhert
Member
 
Registered: May 2006
Distribution: OpenSUSE 10.3 Kubuntu Hardy Heron
Posts: 268

Original Poster
Rep: Reputation: 30
Thanks UnSpawn! I will put this information to good use. Thanks again for your help
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
RKhunter findings, is this bad? M$ISBS Linux - Security 8 04-03-2006 06:03 AM
rkhunter found bad syslogd - what should I do next magicm Linux - Security 1 10-10-2004 06:05 AM
Bad Checksums In Rkhunter sovietpower Linux - Security 3 09-07-2004 07:11 PM
Bad checksum in rkhunter laceupboots Linux - Security 10 08-07-2004 12:15 PM
RKHUNTER: Bad MD5 Checksums Scarpa Linux - Security 2 06-18-2004 05:56 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 10:50 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration