LinuxQuestions.org
Review your favorite Linux distribution.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 12-05-2007, 12:31 PM   #106
reddazz
LQ Guru
 
Registered: Nov 2003
Location: N. E. England
Distribution: Fedora, CentOS, Debian
Posts: 16,298

Rep: Reputation: 77

You don't need antivirus unless you are running a mail server or sharing files with Windows users. This article explains in more detail about Linux security and viruses.
 
Old 12-05-2007, 12:33 PM   #107
win32sux
LQ Guru
 
Registered: Jul 2003
Location: Los Angeles
Distribution: Ubuntu
Posts: 9,870

Rep: Reputation: 380Reputation: 380Reputation: 380Reputation: 380
Quote:
Originally Posted by klajdi2 View Post
I am new to Linux so my question is do I need an Antivirus?
I've merged your thread into the GNU/Linux Antivirus Megathread. Please read the welcome message. As stated, there is no consensual answer to this question, so please take both "yes" and "no" answers with a grain of salt.

Last edited by win32sux; 12-05-2007 at 12:41 PM.
 
Old 12-20-2007, 08:32 PM   #108
suthew
LQ Newbie
 
Registered: Dec 2007
Posts: 1

Rep: Reputation: 0
There are a lot of posts regarding AV and installing it on Linux, but my focus is upon a corporate environment. You have users that can access the Internet the same as a Window's machine, but the user cannot determine if they download something malicious. Not all Linux users are gurus. You can have a corporate network that is hosting viruses internally without detection.

Is it confidence or cost that causes people not to recommend AV for Linux? If your job was on the line what would you recommend to management? AV or not?
 
Old 12-20-2007, 08:53 PM   #109
AceofSpades19
Senior Member
 
Registered: Feb 2007
Location: Chilliwack,BC.Canada
Distribution: Slackware64 -current
Posts: 2,079

Rep: Reputation: 58
the user in a corporate enviroment is not usually root, so a virus would not do much, also most people run an anti-virus on a mail server, so a windows user wouldn't get infected anyways. It is also not necessary considering the lack of virus for linux, I don't think anyone in this forum has got a virus in linux.
 
Old 12-21-2007, 04:25 AM   #110
salasi
Senior Member
 
Registered: Jul 2007
Location: Directly above centre of the earth, UK
Distribution: SuSE, plus some hopping
Posts: 4,070

Rep: Reputation: 897Reputation: 897Reputation: 897Reputation: 897Reputation: 897Reputation: 897Reputation: 897
Quote:
Originally Posted by suthew View Post
... my focus is upon a corporate environment... If your job was on the line what would you recommend to management? AV or not?
In that case, I'd recommend some kind of AV irrespective of the technical issue. the bet is:

no AV, slightly better speed, no time "wasted" configuring
and
don't keep job if something goes wrong

versus:

AV, slightly less speed, some time configuring
and
keep job even if something goes wrong

My money is on the second option. As a 'super-fallback position' (for the paranoid sys admin only!) you can tell management that it might be difficult to test the AV thoroughly because Linux viruses are currently so rare, but you want to prepare for a future worst case scenario. Note that if management tell you not to bother (and that, technically, might be the right decision) they are going some way to taking the risk, not you.
 
Old 01-20-2008, 10:51 PM   #111
esselfe
LQ Newbie
 
Registered: Jun 2006
Location: Montreal, Quebec, Canada
Distribution: Lunar-Linux
Posts: 10

Rep: Reputation: 0
viruses on Linux

Well, personally, I would rely on AV only under MS OSes. It is way too complicated to access to the system layer and start diagnosing anything.
Under Linux it's way much different but yes, it's possible to have viruses under Linux, but the only AV I see is the user and/or admin of the system.
There are file integrity checkers such as gamin and tripwire that exist wich may give clues on a system's infection, but nothing can tell if the viree has not been designed to change that software so it ignores those changes...

Actually a virus is not something different than any other program, it uses legitimate routines, often already written by well-thinking programmers.

The best way I see to absolutly PREVENT infections, is to copy screen-to-screen the software's source code and make sure no malicious actions are performed. That's what a very important server admin would do I guess.

To remove a virus is another story, you have to identify what are the actions performed, capture the data it sends on the wire, etc.

I don't want to scare any new comers, but some ways of being infected could be downloading precompiled software, installing from forged heavy-sized source code, downloading from a subtle replica site such as www.g00gle.com (this is just an example, not a real threat!) or even by letting unconfigured/misconfigured services listening on some ports.

Now to lower the stress level ^^, who would put malicious code in software knowing that it might be inspected by professional? If there's any virus being made, they better remain quite silent!

Finally, as many people already said, there are no real danger as long as the infected binary is not run in the root's domain.
 
Old 02-08-2008, 04:59 PM   #112
r00ster
Member
 
Registered: May 2007
Location: boundary beach, bc
Distribution: 3.2.0-4-686-pae #1 SMP Debian 3.2.60-1+deb7u3 i686 GNU/Linux
Posts: 224

Rep: Reputation: 15
I trust to the mods to move this if I failed to locate the most appropriate thread. I hope the references will be as interesting to other *nixies as they were to me.

http://servertune.com/kbase/?View=entry&EntryID=261
Mystery infestation strikes Linux/Apache Web sites
By Joe Barr

Quote:
According to a press release issued earlier this month by Finjan, a security research firm, compromised Web servers are infecting thousands of visitors daily with malware that turns their Windows machines into unwitting bots to do the bidding of an as yet unidentified criminal organization. Security firms ScanSafe and SecureWorks have since added their own takes on the situation, though with varying estimates on the number of sites affected. All reports thus far say the compromised servers are running Linux and Apache.
According to an article on ServerTune.com, the exploit involves a rootkit installed on the compromised server that replaces several system binaries with infected versions. When the system is booted, the infected binaries are executed, and as a result, dynamically created JavaScript payloads are randomly and intermittently served to site visitors. The malware JavaScript attempts to exploit vulnerabilites in Windows, QuickTime, and Yahoo! Messenger on the visitor's machine in order to infect them.<snip>
http://servertune.com/kbase/?View=entry&EntryID=261
Latest findings about the Random JavaScript Rootkit
February 04th, 2008
Quote:
The cPanel Security team announced todayr that they have identified several key components of a hack known as the Random JavaScript Rootkit. The systems affected by this Rootkit are Linux based running a number of different hosting platforms. The cPanel has worked with a number of hosting providers and server owners to* investigate this Rootkit.
The cPanel Security Team has recognized that the vast majority of affected systems are initially accessed vai shell (SSH) with no indications of brute force or exploitation of the underlying service. Despite non-trivial passwords, intermediary users and nonstandard ports, the attacker is able to gain access to the affected servers with no password failures. The cPanel security team also recognized that the vast majority of affected servers come from a single undisclosed data-center. All affected systems have password based authentication enabled. Based upon these findings, the cPanel security team believes that the attacker has gained access to a database of root login credentials for a large group of Linux servers. Once the hacker, manually, gains access to a system they can then perform various tasks. The hacker can download, compile, and execute a log cleaning script in order to hide their tracks. They also can download a customized Rootkit based off of Boxer version 0.99 beta 3. Finally, the hacker searches for files containing credit card related phrases such as CVC, CVV, and/or Authorize. <snip>

Last edited by r00ster; 02-08-2008 at 05:08 PM.
 
Old 02-08-2008, 06:53 PM   #113
sundialsvcs
LQ Guru
 
Registered: Feb 2004
Location: SE Tennessee, USA
Distribution: Gentoo, LFS
Posts: 10,678
Blog Entries: 4

Rep: Reputation: 3947Reputation: 3947Reputation: 3947Reputation: 3947Reputation: 3947Reputation: 3947Reputation: 3947Reputation: 3947Reputation: 3947Reputation: 3947Reputation: 3947
"Viruses" are so-o-o-o twentieth-century.

Today, web-sites are hacking your router!

Kindly look at this white-hat site: http://www.0x000000.com/ and prepare to be afraid ... be very afraid.

While it is entirely-true that unwanted modifications to the core system configuration are quite difficult in OS/X and in Linux (and, finally, becoming more-difficult in "stock" Windows), that's not how bad-guys are launching their attacks anymore!
 
Old 02-11-2008, 01:43 PM   #114
kuser:)
Member
 
Registered: Sep 2005
Location: Olsztyn, Poland
Distribution: Slackware 14.1
Posts: 168

Rep: Reputation: 99
Dear friends,
I am recently worried about security. I've been thinking about it for a while now, and ultimately decided to share my thoughts with you when I've found this great thread.
Security bothers me because it is one of the basic human needs to be safe, in order to be able to exist normally (Maslow's hierarchy of needs, which is explained in more details at: http://en.wikipedia.org/wiki/Maslow'...archy_of_needs ).

So (provided that Maslov is right), I started to think about it, and I probably started to invent the wheel again , but anyway you can take a look at my logic as follows:

First I asked myself:
Q: what are we dealing with?
A: Well, we have computer security problems (both existing and potential problems).

Q: So, starting from the beginning, what makes for a computer (thinking of a computer as an object)?
A: The software, the hardware, and the user.

Q: Which of these can be infected by malware (or be changed in a way that it does things we have no control over)?
A: The software, and the hardware, since the hardware is operated by the software.
So, the only part of this chain that is immune to attacks is the user.

Q: What does the user need to fight off the attacks (to stay safe)?
A: More speed?
Since, speed is relative, this could be done either by aiding the user's speed, or by slowing down the execution of software (execution speed of malware ideally, but the malware would have to be isolated first for this to work).

Then I let my brain rest from thinking about it for a while.

Meanwhile, since our brain never really rests (which is especially true during the sleep), I saw this movie (or should I say, I saw the light): "Tech Talk: Linus Torvalds on git" at: http://youtube.com/watch?v=4XpnKHJAok8

So, my question now is: has this... issue been already taken care of in git? Or, maybe I should ask:
Has this idea already been implemented within git, so we don't have to worry about it?

And, am I correct thinking that it works as long as you:
A: Pull software from trusted sources
B: Have some kind of backup, or history of changes?*

and provided that you have both of these elements.

*in case your trusted source is not trusted while you're pulling from it, which you don't realize during that process.

Last edited by kuser:); 02-11-2008 at 06:54 PM.
 
Old 02-28-2008, 12:11 PM   #115
win32sux
LQ Guru
 
Registered: Jul 2003
Location: Los Angeles
Distribution: Ubuntu
Posts: 9,870

Rep: Reputation: 380Reputation: 380Reputation: 380Reputation: 380
Now that things have cooled-down, I'm gonna un-sticky this thread and see what happens. Keep in mind that if there's another outbreak of "Do I need an antivirus?" questions I'll immediately give everyone a serious case of deja vous. That said, thanks to all the members who have contributed their $0.02 in this megathread - your time and energy is much appreciated.
 
Old 01-07-2009, 12:27 AM   #116
metallica1973
Senior Member
 
Registered: Feb 2003
Location: Washington D.C
Posts: 2,190

Rep: Reputation: 60
Virus Infested World and UNIX/Linux

It is almost unbelievable how many viruses are out there for windows based systems and what is needed to prevents system from being compromised. Should UNIX/LINUX based system be equipment with some type of virus scanner to prevent intrusion. I understand that UNIX/LINUX is a more secure designed system and the best thing for any system is to harden them but should an anti-virus be part of the arsenal?
 
Old 01-07-2009, 12:45 AM   #117
SqdnGuns
Senior Member
 
Registered: Aug 2005
Location: Pensacola, FL
Distribution: Slackware64® Current & Arch
Posts: 1,092

Rep: Reputation: 174Reputation: 174
Quote:
Originally Posted by metallica1973 View Post
It is almost unbelievable how many viruses are out there for windows based systems and what is needed to prevents system from being compromised. Should UNIX/LINUX based system be equipment with some type of virus scanner to prevent intrusion. I understand that UNIX/LINUX is a more secure designed system and the best thing for any system is to harden them but should an anti-virus be part of the arsenal?
For Samba servers and mail servers............yes. It's a good idea for a desktop box to so you don't forward attachments that are compromised.
 
Old 01-07-2009, 09:13 AM   #118
rweaver
Senior Member
 
Registered: Dec 2008
Location: Louisville, OH
Distribution: Debian, CentOS, Slackware, RHEL, Gentoo
Posts: 1,833

Rep: Reputation: 167Reputation: 167
Quote:
Originally Posted by metallica1973 View Post
It is almost unbelievable how many viruses are out there for windows based systems and what is needed to prevents system from being compromised. Should UNIX/LINUX based system be equipment with some type of virus scanner to prevent intrusion. I understand that UNIX/LINUX is a more secure designed system and the best thing for any system is to harden them but should an anti-virus be part of the arsenal?
If you're doing mail scanning and such-- sure it prevents recipients of messages and trojans from being bounced around. It's really NOT for the machine itself generally though.

The unix user security system is much different than that of windows, it had a different design philosophy and unless there is a buffer overflow or exploit of some kind being taken advantage of to get root access it limits how much damage the virus/trojan can do. It's one of the many reasons for instance that daemons should really run as their own user and not "nobody" or "root" or even a shared "daemon" user.
 
Old 01-07-2009, 10:50 AM   #119
OlRoy
Member
 
Registered: Dec 2002
Posts: 306

Rep: Reputation: 86
Quote:
Originally Posted by rweaver View Post
The unix user security system is much different than that of windows, it had a different design philosophy and unless there is a buffer overflow or exploit of some kind being taken advantage of to get root access it limits how much damage the virus/trojan can do. It's one of the many reasons for instance that daemons should really run as their own user and not "nobody" or "root" or even a shared "daemon" user.
What exactly is the *nix design philosophy? From what I can tell, *nix is vulnerable to all of the same threats as Windows. For example they both still have an administrator account, both have configuration, software, and hardware vulnerabilities, both can be managed by users who don't understand the threats they face, etc.

Windows Vista actually seems to have many more built in security measures than *nix such as; Windows Resource Protection, Mandatory Integrity Control, Services Hardening, Volume Snapshot Service, Windows Defender, etc.

I think the reason why there isn't as many attacks for *nix is because of the environment it's in. For example, monoculture. Other things about the environment is that it's drilled into the brains of new *nix users to not use the root account unless absolutely needed, to only get software from trusted sources, to verify its integrity, etc. The average Linux user is more tech savvy than the average Windows user. I just don't see what's so special about *nix that prevents it from being attacked other than the environment it's in.
 
Old 01-07-2009, 11:13 AM   #120
monsm
Member
 
Registered: Feb 2005
Location: London, UK
Distribution: Gentoo
Posts: 568

Rep: Reputation: 37
Well, Linux was constructed from the start to be secure. Windows have to be backwards compatible with the insecure past and many of those new security tools are just patching up that. Windows defender is to defend against viruses and since there are none for Linux no anti-virus is needed. Admittedly, since Linux isn't run by a big corporate giant, it is probably less fun to write visues for it, but it would also be more difficult, although not impossible.

As for the original question. Unless you are running a file server that serves Windows clients, I wouldn't bother with anti-virus, it just wastes cpu power. Any trojans and worms out there will find the unprotected windows machines irrespctive of what your Linux box has installed. Again, there are no viruses for Linux.

Mons

Last edited by monsm; 01-07-2009 at 03:45 PM.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Antivirus for Lunix similar Norton Antivirus for Windows Chivozertsev Linux - Software 3 02-22-2022 04:40 PM
LXer: GNU/Linux and freedom: non-free software hidden in your GNU/Linux distribution LXer Syndicated Linux News 0 04-02-2010 11:21 PM
Antivirus survey: Do you run an antivirus program on linux? atom Linux - General 29 09-03-2009 03:22 PM
2008 US General Election Megathread XavierP General 205 11-07-2008 12:37 PM
Ubuntu - ALL FINE NOW! - Megathread FreeDoughnut Ubuntu 41 07-24-2006 08:53 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 07:42 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration