LinuxQuestions.org
Welcome to the most active Linux Forum on the web.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 09-16-2011, 11:20 PM   #16
Konphine
Member
 
Registered: Jul 2011
Location: Phoenix, New York
Distribution: Slackware 13.37
Posts: 376

Original Poster
Rep: Reputation: 11

Okay, well I've looked through ksysguard (which is apparently what XFCE also uses) and it doesn't have the processes listed. It only shows the processes currently running like firefox, X server, etc.

The weird thing is, I honestly don't know why chkrootkit would look for this trojan. However, sometimes it doesn't show up on scans. I've done a scan with ClamAV and it's showed nothing except it's standard sanity-check viruses.
 
Old 09-17-2011, 12:01 AM   #17
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
Quote:
Originally Posted by Konphine View Post
The weird thing is, I honestly don't know why chkrootkit would look for this trojan. However, sometimes it doesn't show up on scans. I've done a scan with ClamAV and it's showed nothing except it's standard sanity-check viruses.
The weird thing is you seem unwilling to listen to reason and, even more, mistake OralDeckards replies for proper advice.
 
Old 09-17-2011, 11:08 AM   #18
Konphine
Member
 
Registered: Jul 2011
Location: Phoenix, New York
Distribution: Slackware 13.37
Posts: 376

Original Poster
Rep: Reputation: 11
Quote:
The weird thing is you seem unwilling to listen to reason and, even more, mistake OralDeckards replies for proper advice.
I apologize. I thought they were. I'll start checking my system from my Knoppix live CD. However, one reason I am concerned about using my Knoppix Live CD is because I had a thread about the official site of Knoppix. Apparently there's knoppix.net (which is the first link from Google after typing 'Knoppix Official'), knoppix.com (links to knoppix.net) and knoppix.org (according to Wikipedia). I got my LiveCD from the .org one, but I'll still try.

Edit:

Okay, after doing a little more digging, here is what I get with the archive.org link's help:

First:
Code:
find / -group kmem -perm -2000 -print
Everything seemed to be fine as they were all found except:

Code:
find: `/proc/2943/task/2943/fd/4': No such file or directory
find: `/proc/2943/task/2943/fdinfo/4': No such file or directory
find: `/proc/2943/fd/4': No such file or directory
find: `/proc/2943/fdinfo/4': No such file or directory
find: `-': No such file or directory
find: `group': No such file or directory
find: `kmem': No such file or directory
From the second command:

Code:
find / -user root -perm -4000 -print
Command, it seemed everything checked out fine except for a similar problem:

Code:
find: `/proc/2923/task/2923/fd/4': No such file or directory
find: `/proc/2923/task/2923/fdinfo/4': No such file or directory
find: `/proc/2923/fd/4': No such file or directory
find: `/proc/2923/fdinfo/4': No such file or directory
find: `/proc/2943/task/2943/fd/4': No such file or directory
As for the
Code:
find / -name ".*" -print -xdev | cat -v
everything seemed to check out fine, but I did have some concerns. One of my concerns, were a few of these (4 actually):

/home/thomas/.serverauth####

because chkrootkit also has this error on every scan:

Code:
Checking `chkutmp'...  The tty of the following user process(es) were not found
 in /var/run/utmp !
! RUID          PID TTY    CMD
! thomas       2653 tty7   /usr/bin/X :0 -auth /home/thomas/.serverauth.2636
And yes, /home/thomas/.serverauth.2636 was 1 of the 4 hidden files.

The scan also came out with:

Code:
Checking `sniffer'... wlan0: PF_PACKET(/usr/sbin/wpa_supplicant)
Although I'm not sure if this is a concern. I'm only concerned about it because generally chkrootkit just says "not infected" or "not found".

This scan did not come out with the whole LKM Trojan thing this time. Although sometimes it does. I guess I still need to do some more testing to see which program or process is giving me this whole "LKM Trojan" thing.

As for the md5 check, I've used md5 checks before with the file coming out with an OK but when using the one from Slackware.com's mirrors, I came out with each check being: FAILED which leads me to believe I did it incorrectly. Was there a certain place CHECKSUMS.md5 should have been placed?

Last thing from the archives list was the whole network thing. I'm currently using the firewall from Alien Bob's Easy Firewall Generator and have disabled inbound connections and put it in rc.local to load up on start up, so I think I have that covered.

Last edited by Konphine; 09-17-2011 at 11:52 AM. Reason: Organization
 
Old 09-17-2011, 01:29 PM   #19
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
Quote:
Originally Posted by Konphine View Post
I apologize. I thought they were.
No need to apologize. He clearly said I can't offer any expert advice". Doesn't mean I consider myself a security guru though.


Quote:
Originally Posted by Konphine View Post
Code:
find / -group kmem -perm -2000 -print
(..)
find: `/proc/2943/task/2943/fd/4': No such file or directory
find: `/proc/2943/task/2943/fdinfo/4': No such file or directory
find: `/proc/2943/fd/4': No such file or directory
find: `/proc/2943/fdinfo/4': No such file or directory
find: `-': No such file or directory
find: `group': No such file or directory
find: `kmem': No such file or directory
The "can't find" lines are from 'find' itself. In a terminal type the following on one line:
Code:
echo $$; find / -group kmem -perm -2000 -print & /bin/ps -o pid,ppid,sid,uid,args -C find
and you'll find the first numerical value is the current shells PID, the second value the PID of 'find' as it runs in the background, and the 'ps' output shows the Parent Pid (PPID) of 'find' is the PID of the parent shell (also see SID). If the last three lines aren't a problem with how that version of find accepts command line arguments the in looks like you're running 'find' on /, while instead your disks partitions should be mounted either automagically in /media or manually wherever you like it, usually in /mnt?..


Quote:
Originally Posted by Konphine View Post
Code:
Checking `chkutmp'...  The tty of the following user process(es) were not found in /var/run/utmp !
! RUID          PID TTY    CMD
! thomas       2653 tty7   /usr/bin/X :0 -auth /home/thomas/.serverauth.2636
See http://www.linuxquestions.org/questi...kutmp-496382/?


Quote:
Originally Posted by Konphine View Post
Code:
Checking `sniffer'... wlan0: PF_PACKET(/usr/sbin/wpa_supplicant)
See your own other thread http://www.linuxquestions.org/questi...cerns-901573/?


Quote:
Originally Posted by Konphine View Post
This scan did not come out with the whole LKM Trojan thing this time. Although sometimes it does. I guess I still need to do some more testing to see which program or process is giving me this whole "LKM Trojan" thing.
The reason I suggested verifying your machines integrity first is that if you can make certain no foreign files exist on your system then behaviour it exhibits is native to the system (in short: you gotta learn to live with it ;-p).


Quote:
Originally Posted by Konphine View Post
when using the one from Slackware.com's mirrors, I came out with each check being: FAILED which leads me to believe I did it incorrectly. Was there a certain place CHECKSUMS.md5 should have been placed?
Sure, probably is, but for checking it shouldn't matter unless there's no absolute paths inside the MD5 file. Do show an example or post a new thread in the Slackware forum.


Quote:
Originally Posted by Konphine View Post
Last thing from the archives list was the whole network thing. I'm currently using the firewall from Alien Bob's Easy Firewall Generator and have disabled inbound connections and put it in rc.local to load up on start up, so I think I have that covered.
There's more than that. It starts with not installing what you don't need as this makes for less risk. Then don't run services you don't need. Then harden the machine and protect the services you do need. Finally log what's unacceptable / denied, have those logs parsed (Logwatch?) and read the reports so you can act on them.
 
Old 09-17-2011, 04:22 PM   #20
Konphine
Member
 
Registered: Jul 2011
Location: Phoenix, New York
Distribution: Slackware 13.37
Posts: 376

Original Poster
Rep: Reputation: 11
Quote:
The reason I suggested verifying your machines integrity first is that if you can make certain no foreign files exist on your system then behaviour it exhibits is native to the system (in short: you gotta learn to live with it ;-p).
I understand. The only things I've installed on this computer have been from slackbuilds.org with the exception of sbopkg, wine and VLC Media Player. Anything else has been family photos from photobucket or flickr that I downloaded.

The Slackware DVD wasn't even torrented, I downloaded it via Firefox from the 13.37 64bit folder directly (and I checked the DVD iso with the md5 file).

Quote:
Sure, probably is, but for checking it shouldn't matter unless there's no absolute paths inside the MD5 file. Do show an example or post a new thread in the Slackware forum.
Here's one example of the whole failed not found thing I was speaking of:

Code:
md5sum: ./usb-and-pxe-installers/usbimg2disk.sh: No such file or directory
./usb-and-pxe-installers/usbimg2disk.sh: FAILED open or read
But the last 2 lines (before it stops) also shows this:

Code:
md5sum: WARNING: 12 lines are improperly formatted
md5sum: WARNING: 8579 listed files could not be read
This was with me using: 'md5sum -c CHECKSUMS.md5'

Also, I'm not sure if this would take longer but I think checking my system for any foreign "transient" files would be a faster solution, since if nothing is found then I can confirm that the /proc file is just my hardware.

The command returns these results:
Code:
',ppid,sid,uid,args -C find
2544
[1] 2564
  PID  PPID   SID   UID COMMAND
 2564  2544  2542     0 find / -group kmem -perm -2000 -print
Code:
find: `/proc/2564/task/2564/fd/4': No such file or directory
find: `/proc/2564/task/2564/fdinfo/4': No such file or directory
find: `/proc/2564/fd/4': No such file or directory
find: `/proc/2564/fdinfo/4': No such file or directory
And yes, I am running it as root on / because I'm currently verifying my Live CD for other security reasons. ^.^ I'll run it on my Live CD ASAP.

The wlan0 thing, if it is something about logging in may be NetworkManager which uses gnome-keyring. I've set it to automatically start and made it available to all users so I wouldn't have to constantly unlock the keyring every time I started up my computer.
 
Old 09-18-2011, 10:10 AM   #21
Konphine
Member
 
Registered: Jul 2011
Location: Phoenix, New York
Distribution: Slackware 13.37
Posts: 376

Original Poster
Rep: Reputation: 11
Okay, sorry for double posting here but I'm going to mark this thread as solved. Simply put, I haven't found any problems. I even downloaded the same packages and pictures I had on another computer, without the error popping up again.

I even cleared out the hard drive a third time, and installed ONLY chkrootkit and rkhunter with no malicious finds. I feel like I'm in the clear. Thanks to everybody who helped. ^.^
 
Old 09-18-2011, 10:29 AM   #22
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
Quote:
Originally Posted by Konphine View Post
This was with me using: 'md5sum -c CHECKSUMS.md5'
If CHECKSUMS.md5 was taken from any slackware site or CDROM then you're verifying hashes from the installation tree. It won't tell you anything about the integrity of what you have installed (package contents). As per the default slackware "that is left to the sysadmin" mantra you are free to script fetching packages, explodepkg them, hash package contents and then verify against what you have installed.


Quote:
Originally Posted by Konphine View Post
Also, I'm not sure if this would take longer but I think checking my system for any foreign "transient" files would be a faster solution, since if nothing is found then I can confirm that the /proc file is just my hardware.
I think you're confusing things right now. If you list the packages you have installed then you can know which files you have installed. If you know which files you have installed then you can verify their integrity. The difference of using 'find' on the system and comparing that result with the list of files you have installed are files to investigate. These may be common application-generated files (xhost), regular files that are modified by system use (passwd, syslog), user temporary files (Xorg, any DE, ssh-agent, man) or foreign files (like finding a reverse shell or a kernel module in your /tmp directory). Potentially malicious files are commonly dropped in a directory and not commonly transient in the sense process Ids are.


Quote:
Originally Posted by Konphine View Post
The wlan0 thing, if it is something about logging in may be NetworkManager which uses gnome-keyring. I've set it to automatically start and made it available to all users so I wouldn't have to constantly unlock the keyring every time I started up my computer.
Since you have not posted commands and (error) output I have no idea what you're talking about. While "made it available to all users" sounds like mucking with ownership and access rights which may be a security issue let's focus on the core problem.
 
Old 09-18-2011, 11:21 AM   #23
Konphine
Member
 
Registered: Jul 2011
Location: Phoenix, New York
Distribution: Slackware 13.37
Posts: 376

Original Poster
Rep: Reputation: 11
Quote:
If CHECKSUMS.md5 was taken from any slackware site or CDROM then you're verifying hashes from the installation tree.
I see, so even if the CHECKSUMS.md5 file would only verify the installation tree files, which is done primarily by default with slackpkg for any new packages anyways. *Facepalm to myself*

Quote:
If you list the packages you have installed then you can know which files you have installed. If you know which files you have installed then you can verify their integrity. The difference of using 'find' on the system and comparing that result with the list of files you have installed are files to investigate. These may be common application-generated files (xhost), regular files that are modified by system use (passwd, syslog), user temporary files (Xorg, any DE, ssh-agent, man) or foreign files (like finding a reverse shell or a kernel module in your /tmp directory). Potentially malicious files are commonly dropped in a directory and not commonly transient in the sense process Ids are.
Ohhh, okay I see. Unfortunately (or maybe fortunately) to say, even on the second hard drive I mentioned, I still continue to get the /proc find error (from the CERT Archive link), and so I think I can safely assume it's a false positive, but I would like a different opinion as you know, I'm paranoid.
 
Old 09-18-2011, 09:36 PM   #24
Konphine
Member
 
Registered: Jul 2011
Location: Phoenix, New York
Distribution: Slackware 13.37
Posts: 376

Original Poster
Rep: Reputation: 11
Again, sorry for the double post but I found the problem! Hilariously (and ironically) it's rkhunter.

rkhunter was the hidden processes, and the "possible LKM Trojan" so I guess moral of the story is...don't run two rootkit checkers at once. ^.^

Whenever rkhunter isn't on, or if the scan finishes, chkrootkit doesn't find the hidden processes, but while it is running it finds them.
 
Old 09-19-2011, 03:15 AM   #25
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
Show me proof.
 
Old 09-19-2011, 04:03 PM   #26
Konphine
Member
 
Registered: Jul 2011
Location: Phoenix, New York
Distribution: Slackware 13.37
Posts: 376

Original Poster
Rep: Reputation: 11
If you don't like the photo proof, I'll get a log if you want but in all honesty I'm not sure which log to check, and I'm limited on time today (busy Monday classes).
Attached Thumbnails
Click image for larger version

Name:	photo1.jpg
Views:	68
Size:	126.5 KB
ID:	8017   Click image for larger version

Name:	photo2.jpg
Views:	60
Size:	113.1 KB
ID:	8018  
 
Old 09-20-2011, 03:28 PM   #27
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
NP. Basically any short-lived process may cause chkproc to issue what in the end are false positives. Back to #10 ;-p
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
OSSEC slackware. tcpdump flagged as trojan. False Positive? thefunnyman Linux - Security 7 02-19-2009 01:03 PM
Is this a false positive....A/V question cbjhawks Linux - Security 4 02-21-2006 06:50 AM
chkrootkit warning of lkm trojan provkitir Linux - Security 5 10-20-2004 06:17 AM
'Chkrootkit 0.43' false positive? Mr. Gone Linux - Security 2 03-09-2004 09:16 AM
'Chkrootkit 0.43' false positive? Mr. Gone Linux - Security 0 03-08-2004 08:06 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 09:58 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration