LinuxQuestions.org
Welcome to the most active Linux Forum on the web.
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 12-18-2009, 03:44 PM   #1
open4biz
LQ Newbie
 
Registered: Dec 2009
Posts: 6

Rep: Reputation: 0
Hacked? A slew of BIN/SBIN files updated while I was asleep...


Hi All,

I can't tell if my webserver has been compromised. Overnight, while I slept, some files in BIN / SBIN folders updated and have now failed CSF/LFD's MD5 checksum. I do not have any OS auto-updates set up (that I know of). Here is the list of files:

I will post the Rootkit Hunter log next.

Code:
Time: Fri Dec 18 05:00:25 2009 -0800

The following list of files have FAILED the md5sum comparision test. This means that the file has been changed in some way. This could be a result of an OS update or application upgrade. If the change is unexpected it should be investigated:

/usr/bin/[: FAILED
/usr/bin/a2p: FAILED
/usr/bin/ac: FAILED
/usr/bin/addftinfo: FAILED
/usr/bin/addr2line: FAILED
/usr/bin/afs5log: FAILED
/usr/bin/ar: FAILED
/usr/bin/as: FAILED
/usr/bin/ascii-xfr: FAILED
/usr/bin/aspell: FAILED
/usr/bin/attr: FAILED
/usr/bin/aulast: FAILED
/usr/bin/aulastlog: FAILED
/usr/bin/ausyscall: FAILED
/usr/bin/authconfig: FAILED
/usr/bin/authconfig-tui: FAILED
/usr/bin/autovbox: FAILED
/usr/bin/awk: FAILED
/usr/bin/b2m: FAILED
/usr/bin/base64: FAILED
/usr/bin/bc: FAILED
/usr/bin/berkeley_db_svc: FAILED
/usr/bin/bison: FAILED
/usr/bin/bunzip2: FAILED
/usr/bin/byacc: FAILED
/usr/bin/bzcat: FAILED
/usr/bin/bzip2: FAILED
/usr/bin/bzip2recover: FAILED
/usr/bin/c++: FAILED
/usr/bin/cal: FAILED
/usr/bin/capifax: FAILED
/usr/bin/capifaxrcvd: FAILED
/usr/bin/capiinfo: FAILED
/usr/bin/captoinfo: FAILED
/usr/bin/cc: FAILED
/usr/bin/c++filt: FAILED
/usr/bin/chacl: FAILED
/usr/bin/chage: FAILED
/usr/bin/chattr: FAILED
/usr/bin/chcon: FAILED
/usr/bin/checkmodule: FAILED
/usr/bin/checkpolicy: FAILED
/usr/bin/chfn: FAILED
/usr/bin/chrt: FAILED
/usr/bin/chsh: FAILED
/usr/bin/chvt: FAILED
/usr/bin/ci: FAILED
/usr/bin/cjpeg: FAILED
/usr/bin/cksum: FAILED
/usr/bin/clear: FAILED
/usr/bin/cmp: FAILED
/usr/bin/co: FAILED
/usr/bin/col: FAILED
/usr/bin/colcrt: FAILED
/usr/bin/colrm: FAILED
/usr/bin/column: FAILED
/usr/bin/combinediff: FAILED
/usr/bin/comm: FAILED
/usr/bin/consolehelper: FAILED
/usr/bin/cpp: FAILED
/usr/bin/crontab: FAILED
/usr/bin/cscope: FAILED
/usr/bin/csplit: FAILED
/usr/bin/ctags: FAILED
/usr/bin/cut: FAILED
/usr/bin/cvt: FAILED
/usr/bin/cxpm: FAILED
/usr/bin/cytune: FAILED
/usr/bin/db_archive: FAILED
/usr/bin/db_checkpoint: FAILED
/usr/bin/db_deadlock: FAILED
/usr/bin/db_dump: FAILED
/usr/bin/db_dump185: FAILED
/usr/bin/db_load: FAILED
/usr/bin/db_printlog: FAILED
/usr/bin/db_recover: FAILED
/usr/bin/db_stat: FAILED
/usr/bin/db_upgrade: FAILED
/usr/bin/dbus-binding-tool: FAILED
/usr/bin/db_verify: FAILED
/usr/bin/dc: FAILED
/usr/bin/ddate: FAILED
/usr/bin/deallocvt: FAILED
/usr/bin/desktop-file-install: FAILED
/usr/bin/desktop-file-validate: FAILED
/usr/bin/dialog: FAILED
/usr/bin/diff: FAILED
/usr/bin/diff3: FAILED
/usr/bin/diffstat: FAILED
/usr/bin/dir: FAILED
/usr/bin/dircolors: FAILED
/usr/bin/dirname: FAILED
/usr/bin/djpeg: FAILED
/usr/bin/dos2unix: FAILED
/usr/bin/doxygen: FAILED
/usr/bin/doxytag: FAILED
/usr/bin/du: FAILED
/usr/bin/ebrowse: FAILED
/usr/bin/eject: FAILED
/usr/bin/emacsclient: FAILED
/usr/bin/env: FAILED
/usr/bin/envsubst: FAILED
/usr/bin/eqn: FAILED
/usr/bin/etags: FAILED
/usr/bin/etags.emacs: FAILED
/usr/bin/eu-addr2line: FAILED
/usr/bin/eu-ar: FAILED
/usr/bin/eu-elfcmp: FAILED
/usr/bin/eu-elflint: FAILED
/usr/bin/eu-findtextrel: FAILED
/usr/bin/eu-nm: FAILED
/usr/bin/eu-objdump: FAILED
/usr/bin/eu-ranlib: FAILED
/usr/bin/eu-readelf: FAILED
/usr/bin/eu-size: FAILED
/usr/bin/eu-strings: FAILED
/usr/bin/eu-strip: FAILED
/usr/bin/eu-unstrip: FAILED
/usr/bin/ex: FAILED
/usr/bin/execstack: FAILED
/usr/bin/expand: FAILED
/usr/bin/expr: FAILED
/usr/bin/factor: FAILED
/usr/bin/faillog: FAILED
/usr/bin/fdformat: FAILED
/usr/bin/fgconsole: FAILED
/usr/bin/filterdiff: FAILED
/usr/bin/find: FAILED
/usr/bin/flex: FAILED
/usr/bin/flex++: FAILED
/usr/bin/flipdiff: FAILED
/usr/bin/flock: FAILED
/usr/bin/floppy: FAILED
/usr/bin/fmt: FAILED
/usr/bin/fold: FAILED
/usr/bin/formail: FAILED
/usr/bin/free: FAILED
/usr/bin/ftp: FAILED
/usr/bin/funzip: FAILED
/usr/bin/g++: FAILED
/usr/bin/gawk: FAILED
/usr/bin/gcc: FAILED
/usr/bin/gcov: FAILED
/usr/bin/gctags: FAILED
/usr/bin/gdb: FAILED
/usr/bin/gdbserver: FAILED
/usr/bin/gdbtui: FAILED
/usr/bin/gdk-pixbuf-query-loaders-32: FAILED
/usr/bin/gencat: FAILED
/usr/bin/geqn: FAILED
/usr/bin/getconf: FAILED
/usr/bin/getent: FAILED
/usr/bin/getfacl: FAILED
/usr/bin/getfattr: FAILED
/usr/bin/gethostip: FAILED
/usr/bin/getkeycodes: FAILED
/usr/bin/get_module: FAILED
/usr/bin/getopt: FAILED
/usr/bin/gettext: FAILED
/usr/bin/gindxbib: FAILED
/usr/bin/glib-genmarshal: FAILED
/usr/bin/glookbib: FAILED
/usr/bin/gmake: FAILED
/usr/bin/gobject-query: FAILED
/usr/bin/gpasswd: FAILED
/usr/bin/gpg-error: FAILED
/usr/bin/gpic: FAILED
/usr/bin/gpm-root: FAILED
/usr/bin/gprof: FAILED
/usr/bin/grefer: FAILED
/usr/bin/grepdiff: FAILED
/usr/bin/grn: FAILED
/usr/bin/grodvi: FAILED
/usr/bin/groff: FAILED
/usr/bin/grolbp: FAILED
/usr/bin/grolj4: FAILED
/usr/bin/grops: FAILED
/usr/bin/grotty: FAILED
/usr/bin/gsoelim: FAILED
/usr/bin/gtbl: FAILED
/usr/bin/gtf: FAILED
/usr/bin/gtk-update-icon-cache: FAILED
/usr/bin/gunzip: FAILED
/usr/bin/gzip: FAILED
/usr/bin/hal-device: FAILED
/usr/bin/hal-find-by-capability: FAILED
/usr/bin/hal-find-by-property: FAILED
/usr/bin/hal-get-property: FAILED
/usr/bin/hal-set-property: FAILED
/usr/bin/halt: FAILED
/usr/bin/head: FAILED
/usr/bin/hexdump: FAILED
/usr/bin/hltest: FAILED
/usr/bin/hostid: FAILED
/usr/bin/hpftodit: FAILED
/usr/bin/i386: FAILED
/usr/bin/i386-redhat-linux-c++: FAILED
/usr/bin/i386-redhat-linux-g++: FAILED
/usr/bin/i386-redhat-linux-gcc: FAILED
/usr/bin/icc2ps: FAILED
/usr/bin/icclink: FAILED
/usr/bin/icctrans: FAILED
/usr/bin/iceauth: FAILED
/usr/bin/iconv: FAILED
/usr/bin/id: FAILED
/usr/bin/ident: FAILED
/usr/bin/idn: FAILED
/usr/bin/imake: FAILED
/usr/bin/indent: FAILED
/usr/bin/indxbib: FAILED
/usr/bin/info: FAILED
/usr/bin/infocmp: FAILED
/usr/bin/infokey: FAILED
/usr/bin/infotocap: FAILED
/usr/bin/install: FAILED
/usr/bin/interdiff: FAILED
/usr/bin/ionice: FAILED
/usr/bin/ipcrm: FAILED
/usr/bin/ipcs: FAILED
/usr/bin/isdnbill: FAILED
/usr/bin/isdnconf: FAILED
/usr/bin/isdnrate: FAILED
/usr/bin/isdnrep: FAILED
/usr/bin/isosize: FAILED
/usr/bin/jmacs: FAILED
/usr/bin/joe: FAILED
/usr/bin/join: FAILED
/usr/bin/jpegicc: FAILED
/usr/bin/jpegtran: FAILED
/usr/bin/jpico: FAILED
/usr/bin/jstar: FAILED
/usr/bin/jwhois: FAILED
/usr/bin/kbdrate: FAILED
/usr/bin/kill: FAILED
/usr/bin/killall: FAILED
/usr/bin/last: FAILED
/usr/bin/lastb: FAILED
/usr/bin/lastcomm: FAILED
/usr/bin/lastlog: FAILED
/usr/bin/lchfn: FAILED
/usr/bin/lchsh: FAILED
/usr/bin/ld: FAILED
/usr/bin/lddlibc4: FAILED
/usr/bin/less: FAILED
/usr/bin/lessecho: FAILED
/usr/bin/lesskey: FAILED
/usr/bin/lex: FAILED
/usr/bin/lftp: FAILED
/usr/bin/linux32: FAILED
/usr/bin/linux64: FAILED
/usr/bin/lkbib: FAILED
/usr/bin/lndir: FAILED
/usr/bin/loadunimap: FAILED
/usr/bin/locale: FAILED
/usr/bin/localedef: FAILED
/usr/bin/locate: FAILED
/usr/bin/lockfile: FAILED
/usr/bin/logger: FAILED
/usr/bin/logname: FAILED
/usr/bin/look: FAILED
/usr/bin/lookbib: FAILED
/usr/bin/lsattr: FAILED
/usr/bin/lsdiff: FAILED
/usr/bin/lshal: FAILED
/usr/bin/ltrace: FAILED
/usr/bin/m4: FAILED
/usr/bin/mac2unix: FAILED
/usr/bin/Mail: FAILED
/usr/bin/make: FAILED
/usr/bin/makedb: FAILED
/usr/bin/makedepend: FAILED
/usr/bin/makeinfo: FAILED
/usr/bin/makestrs: FAILED
/usr/bin/man: FAILED
/usr/bin/man2html: FAILED
/usr/bin/manpath: FAILED
/usr/bin/mapscrn: FAILED
/usr/bin/mattrib: FAILED
/usr/bin/mbadblocks: FAILED
/usr/bin/mbchk: FAILED
/usr/bin/mcat: FAILED
/usr/bin/mcd: FAILED
/usr/bin/mclasserase: FAILED
/usr/bin/mcookie: FAILED
/usr/bin/mcopy: FAILED
/usr/bin/md5sum: FAILED
/usr/bin/mdel: FAILED
/usr/bin/mdeltree: FAILED
/usr/bin/mdir: FAILED
/usr/bin/mdu: FAILED
/usr/bin/memhog: FAILED
/usr/bin/merge: FAILED
/usr/bin/mesg: FAILED
/usr/bin/mev: FAILED
/usr/bin/mformat: FAILED
/usr/bin/migratepages: FAILED
/usr/bin/minfo: FAILED
/usr/bin/minicom: FAILED
/usr/bin/mkfifo: FAILED
/usr/bin/mkmanifest: FAILED
/usr/bin/mlabel: FAILED
/usr/bin/mmd: FAILED
/usr/bin/mmount: FAILED
/usr/bin/mmove: FAILED
/usr/bin/mouse-test: FAILED
/usr/bin/mpartition: FAILED
/usr/bin/mrd: FAILED
/usr/bin/mren: FAILED
/usr/bin/msgattrib: FAILED
/usr/bin/msgcat: FAILED
/usr/bin/msgcmp: FAILED
/usr/bin/msgcomm: FAILED
/usr/bin/msgconv: FAILED
/usr/bin/msgen: FAILED
/usr/bin/msgexec: FAILED
/usr/bin/msgfilter: FAILED
/usr/bin/msgfmt: FAILED
/usr/bin/msggrep: FAILED
/usr/bin/msginit: FAILED
/usr/bin/msgmerge: FAILED
/usr/bin/msgunfmt: FAILED
/usr/bin/msguniq: FAILED
/usr/bin/mshowfat: FAILED
/usr/bin/mtools: FAILED
/usr/bin/mtoolstest: FAILED
/usr/bin/mtype: FAILED
/usr/bin/mzip: FAILED
/usr/bin/namei: FAILED
/usr/bin/nano: FAILED
/usr/bin/nc: FAILED
/usr/bin/ncftp: FAILED
/usr/bin/ncftpbatch: FAILED
/usr/bin/ncftpbookmarks: FAILED
/usr/bin/ncftpget: FAILED
/usr/bin/ncftpls: FAILED
/usr/bin/ncftpput: FAILED
/usr/bin/ncftpspooler: FAILED
/usr/bin/newgrp: FAILED
/usr/bin/ngettext: FAILED
/usr/bin/nl: FAILED
/usr/bin/nm: FAILED
/usr/bin/nm-online: FAILED
/usr/bin/nm-tool: FAILED
/usr/bin/nohup: FAILED
/usr/bin/numactl: FAILED
/usr/bin/numademo: FAILED
/usr/bin/objcopy: FAILED
/usr/bin/objdump: FAILED
/usr/bin/od: FAILED
/usr/bin/oldrdist: FAILED
/usr/bin/opannotate: FAILED
/usr/bin/oparchive: FAILED
/usr/bin/open: FAILED
/usr/bin/openvt: FAILED
/usr/bin/opgprof: FAILED
/usr/bin/ophelp: FAILED
/usr/bin/opimport: FAILED
/usr/bin/opjitconv: FAILED
/usr/bin/opreport: FAILED
/usr/bin/oprofiled: FAILED
/usr/bin/passwd: FAILED
/usr/bin/paste: FAILED
/usr/bin/patch: FAILED
/usr/bin/pathchk: FAILED
/usr/bin/pax: FAILED
/usr/bin/perl: FAILED
/usr/bin/perl5.8.8: FAILED
/usr/bin/perror: FAILED
/usr/bin/pfbtops: FAILED
/usr/bin/pftp: FAILED
/usr/bin/pgrep: FAILED
/usr/bin/pic: FAILED
/usr/bin/pinfo: FAILED
/usr/bin/pinky: FAILED
/usr/bin/pkg-config: FAILED
/usr/bin/pkill: FAILED
/usr/bin/pman: FAILED
/usr/bin/pmap: FAILED
/usr/bin/pm-hibernate: FAILED
/usr/bin/pm-powersave: FAILED
/usr/bin/pm-restart: FAILED
/usr/bin/pm-shutdown: FAILED
/usr/bin/pm-suspend: FAILED
/usr/bin/post-grohtml: FAILED
/usr/bin/poweroff: FAILED
/usr/bin/pr: FAILED
/usr/bin/pre-grohtml: FAILED
/usr/bin/prezip-bin: FAILED
/usr/bin/printenv: FAILED
/usr/bin/printf: FAILED
/usr/bin/procmail: FAILED
/usr/bin/protoize: FAILED
/usr/bin/psfaddtable: FAILED
/usr/bin/psfgettable: FAILED
/usr/bin/psfstriptable: FAILED
/usr/bin/psfxtable: FAILED
/usr/bin/pstree: FAILED
/usr/bin/pstree.x11: FAILED
/usr/bin/ptx: FAILED
/usr/bin/pwdx: FAILED
/usr/bin/python: FAILED
/usr/bin/python2: FAILED
/usr/bin/python2.4: FAILED
/usr/bin/quota: FAILED
/usr/bin/ranlib: FAILED
/usr/bin/rcs: FAILED
/usr/bin/rcsclean: FAILED
/usr/bin/rcsdiff: FAILED
/usr/bin/rcsmerge: FAILED
/usr/bin/rdate: FAILED
/usr/bin/rdist: FAILED
/usr/bin/rdistd: FAILED
/usr/bin/rdjpgcom: FAILED
/usr/bin/readelf: FAILED
/usr/bin/readlink: FAILED
/usr/bin/reboot: FAILED
/usr/bin/rediff: FAILED
/usr/bin/refer: FAILED
/usr/bin/rename: FAILED
/usr/bin/renice: FAILED
/usr/bin/reset: FAILED
/usr/bin/resizecons: FAILED
/usr/bin/rev: FAILED
/usr/bin/revpath: FAILED
/usr/bin/rjoe: FAILED
/usr/bin/rlog: FAILED
/usr/bin/rmdtovbox: FAILED
/usr/bin/rnano: FAILED
/usr/bin/rpcgen: FAILED
/usr/bin/rsync: FAILED
/usr/bin/runcon: FAILED
/usr/bin/runscript: FAILED
/usr/bin/rvim: FAILED
/usr/bin/scanpci: FAILED
/usr/bin/script: FAILED
/usr/bin/sdiff: FAILED
/usr/bin/sediff: FAILED
/usr/bin/seinfo: FAILED
/usr/bin/seq: FAILED
/usr/bin/sesearch: FAILED
/usr/bin/sessreg: FAILED
/usr/bin/setarch: FAILED
/usr/bin/setfacl: FAILED
/usr/bin/setfattr: FAILED
/usr/bin/setkeycodes: FAILED
/usr/bin/setleds: FAILED
/usr/bin/setmetamode: FAILED
/usr/bin/setsid: FAILED
/usr/bin/setterm: FAILED
/usr/bin/setup: FAILED
/usr/bin/setxkbmap: FAILED
/usr/bin/sg: FAILED
/usr/bin/sha1hmac: FAILED
/usr/bin/sha1sum: FAILED
/usr/bin/sha224sum: FAILED
/usr/bin/sha256hmac: FAILED
/usr/bin/sha256sum: FAILED
/usr/bin/sha384hmac: FAILED
/usr/bin/sha384sum: FAILED
/usr/bin/sha512hmac: FAILED
/usr/bin/sha512sum: FAILED
/usr/bin/showconsolefont: FAILED
/usr/bin/showkey: FAILED
/usr/bin/showrgb: FAILED
/usr/bin/shred: FAILED
/usr/bin/size: FAILED
/usr/bin/skill: FAILED
/usr/bin/slabtop: FAILED
/usr/bin/snice: FAILED
/usr/bin/soelim: FAILED
/usr/bin/split: FAILED
/usr/bin/sprof: FAILED
/usr/bin/sqlite3: FAILED
/usr/bin/stat: FAILED
/usr/bin/strace: FAILED
/usr/bin/strings: FAILED
/usr/bin/strip: FAILED
/usr/bin/sum: FAILED
/usr/bin/sxpm: FAILED
/usr/bin/symlinks: FAILED
/usr/bin/synclient: FAILED
/usr/bin/syndaemon: FAILED
/usr/bin/syslinux: FAILED
/usr/bin/system-config-network: FAILED
/usr/bin/system-config-network-cmd: FAILED
/usr/bin/system-config-securitylevel-tui: FAILED
/usr/bin/systool: FAILED
/usr/bin/tac: FAILED
/usr/bin/tack: FAILED
/usr/bin/tail: FAILED
/usr/bin/tailf: FAILED
/usr/bin/tbl: FAILED
/usr/bin/tclsh: FAILED
/usr/bin/tclsh8.4: FAILED
/usr/bin/tee: FAILED
/usr/bin/termidx: FAILED
/usr/bin/test: FAILED
/usr/bin/tfmtodit: FAILED
/usr/bin/tic: FAILED
/usr/bin/time: FAILED
/usr/bin/tload: FAILED
/usr/bin/toe: FAILED
/usr/bin/top: FAILED
/usr/bin/tput: FAILED
/usr/bin/tr: FAILED
/usr/bin/tset: FAILED
/usr/bin/tsort: FAILED
/usr/bin/tty: FAILED
/usr/bin/ucs2any: FAILED
/usr/bin/ul: FAILED
/usr/bin/unexpand: FAILED
/usr/bin/uniq: FAILED
/usr/bin/unix2dos: FAILED
/usr/bin/unprotoize: FAILED
/usr/bin/unzip: FAILED
/usr/bin/unzipsfx: FAILED
/usr/bin/updatedb: FAILED
/usr/bin/update-desktop-database: FAILED
/usr/bin/uptime: FAILED
/usr/bin/users: FAILED
/usr/bin/utmpdump: FAILED
/usr/bin/uuidgen: FAILED
/usr/bin/valgrind: FAILED
/usr/bin/valgrind-listener: FAILED
/usr/bin/vbox: FAILED
/usr/bin/vboxbeep: FAILED
/usr/bin/vboxcnvt: FAILED
/usr/bin/vboxctrl: FAILED
/usr/bin/vboxmode: FAILED
/usr/bin/vboxtoau: FAILED
/usr/bin/vdir: FAILED
/usr/bin/vim: FAILED
/usr/bin/vimdiff: FAILED
/usr/bin/vmstat: FAILED
/usr/bin/volname: FAILED
/usr/bin/w: FAILED
/usr/bin/wall: FAILED
/usr/bin/watch: FAILED
/usr/bin/wc: FAILED
/usr/bin/whereis: FAILED
/usr/bin/which: FAILED
/usr/bin/whiptail: FAILED
/usr/bin/who: FAILED
/usr/bin/whoami: FAILED
/usr/bin/whois: FAILED
/usr/bin/wish: FAILED
/usr/bin/wish8.4: FAILED
/usr/bin/word-list-compress: FAILED
/usr/bin/write: FAILED
/usr/bin/wrjpgcom: FAILED
/usr/bin/wtpt: FAILED
/usr/bin/x86_64: FAILED
/usr/bin/xargs: FAILED
/usr/bin/xcmsdb: FAILED
/usr/bin/xdpyinfo: FAILED
/usr/bin/xdriinfo: FAILED
/usr/bin/xev: FAILED
/usr/bin/xfontsel: FAILED
/usr/bin/xgamma: FAILED
/usr/bin/xgettext: FAILED
/usr/bin/xhost: FAILED
/usr/bin/xkbbell: FAILED
/usr/bin/xkbcomp: FAILED
/usr/bin/xkbevd: FAILED
/usr/bin/xkbprint: FAILED
/usr/bin/xkbvleds: FAILED
/usr/bin/xkbwatch: FAILED
/usr/bin/xlsatoms: FAILED
/usr/bin/xlsclients: FAILED
/usr/bin/xlsfonts: FAILED
/usr/bin/xmlwf: FAILED
/usr/bin/xmodmap: FAILED
/usr/bin/xprop: FAILED
/usr/bin/xrandr: FAILED
/usr/bin/xrdb: FAILED
/usr/bin/xrefresh: FAILED
/usr/bin/xset: FAILED
/usr/bin/xsetmode: FAILED
/usr/bin/xsetpointer: FAILED
/usr/bin/xsetroot: FAILED
/usr/bin/xstdcmap: FAILED
/usr/bin/xtrapchar: FAILED
/usr/bin/xtrapin: FAILED
/usr/bin/xtrapinfo: FAILED
/usr/bin/xtrapout: FAILED
/usr/bin/xtrapproto: FAILED
/usr/bin/xtrapreset: FAILED
/usr/bin/xtrapstats: FAILED
/usr/bin/xvidtune: FAILED
/usr/bin/xvinfo: FAILED
/usr/bin/xwininfo: FAILED
/usr/bin/xxd: FAILED
/usr/bin/yacc: FAILED
/usr/bin/yes: FAILED
/usr/bin/ypcat: FAILED
/usr/bin/ypchfn: FAILED
/usr/bin/ypchsh: FAILED
/usr/bin/ypmatch: FAILED
/usr/bin/yppasswd: FAILED
/usr/bin/ypwhich: FAILED
/usr/bin/zip: FAILED
/usr/bin/zipcloak: FAILED
/usr/bin/zipinfo: FAILED
/usr/bin/zipnote: FAILED
/usr/bin/zipsplit: FAILED
/usr/bin/zsoelim: FAILED
/usr/sbin/accton: FAILED
/usr/sbin/adduser: FAILED
/usr/sbin/alternatives: FAILED
/usr/sbin/anacron: FAILED
/usr/sbin/arpd: FAILED
/usr/sbin/avahi-autoipd: FAILED
/usr/sbin/avahi-daemon: FAILED
/usr/sbin/avahi-dnsconfd: FAILED
/usr/sbin/avcstat: FAILED
/usr/sbin/biosdecode: FAILED
/usr/sbin/callback: FAILED
/usr/sbin/capiinit: FAILED
/usr/sbin/chkfontpath: FAILED
/usr/sbin/chpasswd: FAILED
/usr/sbin/chroot: FAILED
/usr/sbin/convertquota: FAILED
/usr/sbin/cracklib-check: FAILED
/usr/sbin/cracklib-packer: FAILED
/usr/sbin/cracklib-unpacker: FAILED
/usr/sbin/dbconverter-2: FAILED
/usr/sbin/divaload: FAILED
/usr/sbin/divalog: FAILED
/usr/sbin/divalogd: FAILED
/usr/sbin/dmidecode: FAILED
/usr/sbin/dns-keygen: FAILED
/usr/sbin/dnsmasq: FAILED
/usr/sbin/dovecot: FAILED
/usr/sbin/dovecotpw: FAILED
/usr/sbin/dump-acct: FAILED
/usr/sbin/dump-utmp: FAILED
/usr/sbin/edquota: FAILED
/usr/sbin/eject: FAILED
/usr/sbin/ethtool: FAILED
/usr/sbin/execcap: FAILED
/usr/sbin/exim_dbmbuild: FAILED
/usr/sbin/exim_dumpdb: FAILED
/usr/sbin/exim_fixdb: FAILED
/usr/sbin/exim_lock: FAILED
/usr/sbin/exim_tidydb: FAILED
/usr/sbin/fbset: FAILED
/usr/sbin/filefrag: FAILED
/usr/sbin/getenforce: FAILED
/usr/sbin/getpcaps: FAILED
/usr/sbin/getsebool: FAILED
/usr/sbin/gpm: FAILED
/usr/sbin/groupadd: FAILED
/usr/sbin/groupdel: FAILED
/usr/sbin/groupmod: FAILED
/usr/sbin/grpck: FAILED
/usr/sbin/grpconv: FAILED
/usr/sbin/grpunconv: FAILED
/usr/sbin/hald: FAILED
/usr/sbin/hwclock: FAILED
/usr/sbin/ibod: FAILED
/usr/sbin/iconvconfig: FAILED
/usr/sbin/iconvconfig.i686: FAILED
/usr/sbin/imon: FAILED
/usr/sbin/imontty: FAILED
/usr/sbin/inputattach: FAILED
/usr/sbin/ipppd: FAILED
/usr/sbin/ipppstats: FAILED
/usr/sbin/iprofd: FAILED
/usr/sbin/iptstate: FAILED
/usr/sbin/isdnlog: FAILED
/usr/sbin/kbdrate: FAILED
/usr/sbin/kudzu: FAILED
/usr/sbin/lchage: FAILED
/usr/sbin/lgroupadd: FAILED
/usr/sbin/lgroupdel: FAILED
/usr/sbin/lgroupmod: FAILED
/usr/sbin/lid: FAILED
/usr/sbin/lnewusers: FAILED
/usr/sbin/lnstat: FAILED
/usr/sbin/lockdev: FAILED
/usr/sbin/logrotate: FAILED
/usr/sbin/lokkit: FAILED
/usr/sbin/loopctrl: FAILED
/usr/sbin/lpasswd: FAILED
/usr/sbin/lsof: FAILED
/usr/sbin/luseradd: FAILED
/usr/sbin/luserdel: FAILED
/usr/sbin/lusermod: FAILED
/usr/sbin/lvchange: FAILED
/usr/sbin/lvconvert: FAILED
/usr/sbin/lvcreate: FAILED
/usr/sbin/lvdisplay: FAILED
/usr/sbin/lvextend: FAILED
/usr/sbin/lvm: FAILED
/usr/sbin/lvmchange: FAILED
/usr/sbin/lvmdiskscan: FAILED
/usr/sbin/lvmsadc: FAILED
/usr/sbin/lvmsar: FAILED
/usr/sbin/lvreduce: FAILED
/usr/sbin/lvremove: FAILED
/usr/sbin/lvrename: FAILED
/usr/sbin/lvresize: FAILED
/usr/sbin/lvs: FAILED
/usr/sbin/lvscan: FAILED
/usr/sbin/matchpathcon: FAILED
/usr/sbin/mklost+found: FAILED
/usr/sbin/mksock: FAILED
/usr/sbin/mkzonedb: FAILED
/usr/sbin/mtr: FAILED
/usr/sbin/mysqlmanager: FAILED
/usr/sbin/NetworkManager: FAILED
/usr/sbin/newusers: FAILED
/usr/sbin/nm-system-settings: FAILED
/usr/sbin/nstat: FAILED
/usr/sbin/ntsysv: FAILED
/usr/sbin/ownership: FAILED
/usr/sbin/packer: FAILED
/usr/sbin/pmap_dump: FAILED
/usr/sbin/pmap_set: FAILED
/usr/sbin/pppdump: FAILED
/usr/sbin/pppoe: FAILED
/usr/sbin/pppoe-discovery: FAILED
/usr/sbin/pppoe-relay: FAILED
/usr/sbin/pppoe-server: FAILED
/usr/sbin/pppoe-sniff: FAILED
/usr/sbin/pppstats: FAILED
/usr/sbin/pvchange: FAILED
/usr/sbin/pvck: FAILED
/usr/sbin/pvcreate: FAILED
/usr/sbin/pvdisplay: FAILED
/usr/sbin/pvmove: FAILED
/usr/sbin/pvremove: FAILED
/usr/sbin/pvresize: FAILED
/usr/sbin/pvs: FAILED
/usr/sbin/pvscan: FAILED
/usr/sbin/pwck: FAILED
/usr/sbin/pwconv: FAILED
/usr/sbin/pwunconv: FAILED
/usr/sbin/quotastats: FAILED
/usr/sbin/racoonctl: FAILED
/usr/sbin/ramsize: FAILED
/usr/sbin/rcapid: FAILED
/usr/sbin/rdev: FAILED
/usr/sbin/rdistd: FAILED
/usr/sbin/readprofile: FAILED
/usr/sbin/repquota: FAILED
/usr/sbin/rootflags: FAILED
/usr/sbin/rpcinfo: FAILED
/usr/sbin/rtacct: FAILED
/usr/sbin/sa: FAILED
/usr/sbin/selinuxenabled: FAILED
/usr/sbin/setenforce: FAILED
/usr/sbin/setpcaps: FAILED
/usr/sbin/setquota: FAILED
/usr/sbin/setup: FAILED
/usr/sbin/ss: FAILED
/usr/sbin/sucap: FAILED
/usr/sbin/suexec: FAILED
/usr/sbin/tcpslice: FAILED
/usr/sbin/testsaslauthd: FAILED
/usr/sbin/tmpwatch: FAILED
/usr/sbin/togglesebool: FAILED
/usr/sbin/tunelp: FAILED
/usr/sbin/update-alternatives: FAILED
/usr/sbin/useradd: FAILED
/usr/sbin/userdel: FAILED
/usr/sbin/userhelper: FAILED
/usr/sbin/usermod: FAILED
/usr/sbin/vbetool: FAILED
/usr/sbin/vboxd: FAILED
/usr/sbin/vgcfgbackup: FAILED
/usr/sbin/vgcfgrestore: FAILED
/usr/sbin/vgchange: FAILED
/usr/sbin/vgck: FAILED
/usr/sbin/vgconvert: FAILED
/usr/sbin/vgcreate: FAILED
/usr/sbin/vgdisplay: FAILED
/usr/sbin/vgexport: FAILED
/usr/sbin/vgextend: FAILED
/usr/sbin/vgimport: FAILED
/usr/sbin/vgmerge: FAILED
/usr/sbin/vgmknodes: FAILED
/usr/sbin/vgreduce: FAILED
/usr/sbin/vgremove: FAILED
/usr/sbin/vgrename: FAILED
/usr/sbin/vgs: FAILED
/usr/sbin/vgscan: FAILED
/usr/sbin/vgsplit: FAILED
/usr/sbin/vidmode: FAILED
/usr/sbin/vigr: FAILED
/usr/sbin/vipw: FAILED
/usr/sbin/vm-pop3d: FAILED
/usr/sbin/vpddecode: FAILED
/usr/sbin/warnquota: FAILED
/usr/sbin/wpa_cli: FAILED
/usr/sbin/yppoll: FAILED
/usr/sbin/ypserv_test: FAILED
/usr/sbin/ypset: FAILED
/usr/sbin/yptest: FAILED
/usr/sbin/zdump: FAILED
/usr/sbin/zic: FAILED
/bin/arch: FAILED
/bin/awk: FAILED
/bin/basename: FAILED
/bin/bash: FAILED
/bin/cat: FAILED
/bin/chgrp: FAILED
/bin/chmod: FAILED
/bin/chown: FAILED
/bin/cp: FAILED
/bin/cpio: FAILED
/bin/csh: FAILED
/bin/cut: FAILED
/bin/date: FAILED
/bin/dbus-cleanup-sockets: FAILED
/bin/dbus-monitor: FAILED
/bin/dbus-send: FAILED
/bin/dbus-uuidgen: FAILED
/bin/dd: FAILED
/bin/df: FAILED
/bin/dmesg: FAILED
/bin/dnsdomainname: FAILED
/bin/doexec: FAILED
/bin/domainname: FAILED
/bin/dumpkeys: FAILED
/bin/echo: FAILED
/bin/ed: FAILED
/bin/env: FAILED
/bin/ex: FAILED
/bin/false: FAILED
/bin/gawk: FAILED
/bin/gettext: FAILED
/bin/gtar: FAILED
/bin/gunzip: FAILED
/bin/gzip: FAILED
/bin/hostname: FAILED
/bin/ipcalc: FAILED
/bin/kbd_mode: FAILED
/bin/kill: FAILED
/bin/link: FAILED
/bin/ln: FAILED
/bin/loadkeys: FAILED
/bin/logger: FAILED
/bin/login: FAILED
/bin/ls: FAILED
/bin/mail: FAILED
/bin/mailx: FAILED
/bin/mkdir: FAILED
/bin/mknod: FAILED
/bin/mktemp: FAILED
/bin/more: FAILED
/bin/mount: FAILED
/bin/mountpoint: FAILED
/bin/mt: FAILED
/bin/mv: FAILED
/bin/netstat: FAILED
/bin/nice: FAILED
/bin/nisdomainname: FAILED
/bin/pgawk: FAILED
/bin/ps: FAILED
/bin/pwd: FAILED
/bin/raw: FAILED
/bin/red: FAILED
/bin/rm: FAILED
/bin/rmdir: FAILED
/bin/rvi: FAILED
/bin/rview: FAILED
/bin/sed: FAILED
/bin/setfont: FAILED
/bin/setserial: FAILED
/bin/sh: FAILED
/bin/sleep: FAILED
/bin/sort: FAILED
/bin/stty: FAILED
/bin/sync: FAILED
/bin/tar: FAILED
/bin/taskset: FAILED
/bin/tcptraceroute: FAILED
/bin/tcsh: FAILED
/bin/touch: FAILED
/bin/traceroute: FAILED
/bin/traceroute6: FAILED
/bin/tracert: FAILED
/bin/true: FAILED
/bin/umount: FAILED
/bin/uname: FAILED
/bin/unlink: FAILED
/bin/usleep: FAILED
/bin/vi: FAILED
/bin/view: FAILED
/bin/ypdomainname: FAILED
/bin/zcat: FAILED
/sbin/accton: FAILED
/sbin/addpart: FAILED
/sbin/agetty: FAILED
/sbin/arp: FAILED
/sbin/auditctl: FAILED
/sbin/aureport: FAILED
/sbin/ausearch: FAILED
/sbin/autrace: FAILED
/sbin/avmcapictrl: FAILED
/sbin/badblocks: FAILED
/sbin/blkid: FAILED
/sbin/blockdev: FAILED
/sbin/capiinit: FAILED
/sbin/cciss_id: FAILED
/sbin/change_console: FAILED
/sbin/chkconfig: FAILED
/sbin/clock: FAILED
/sbin/consoletype: FAILED
/sbin/ctrlaltdel: FAILED
/sbin/debugfs: FAILED
/sbin/delpart: FAILED
/sbin/depmod: FAILED
/sbin/dhcdbd: FAILED
/sbin/dm_dso_reg_tool: FAILED
/sbin/dmeventd: FAILED
/sbin/dmevent_tool: FAILED
/sbin/dmraid: FAILED
/sbin/dmsetup: FAILED
/sbin/dosfsck: FAILED
/sbin/dosfslabel: FAILED
/sbin/dumpe2fs: FAILED
/sbin/e2image: FAILED
/sbin/e2label: FAILED
/sbin/ether-wake: FAILED
/sbin/ethtool: FAILED
/sbin/extlinux: FAILED
/sbin/fdisk: FAILED
/sbin/findfs: FAILED
/sbin/fsck: FAILED
/sbin/fsck.msdos: FAILED
/sbin/fsck.vfat: FAILED
/sbin/fstab-decode: FAILED
/sbin/fuser: FAILED
/sbin/genhostid: FAILED
/sbin/getkey: FAILED
/sbin/grub: FAILED
/sbin/grubby: FAILED
/sbin/halt: FAILED
/sbin/hdparm: FAILED
/sbin/hisaxctrl: FAILED
/sbin/hwclock: FAILED
/sbin/ibod: FAILED
/sbin/icnctrl: FAILED
/sbin/ifconfig: FAILED
/sbin/ifenslave: FAILED
/sbin/ifrename: FAILED
/sbin/init: FAILED
/sbin/initlog: FAILED
/sbin/insmod: FAILED
/sbin/ip: FAILED
/sbin/ip6tables: FAILED
/sbin/ip6tables-restore: FAILED
/sbin/ip6tables-save: FAILED
/sbin/ipmaddr: FAILED
/sbin/ipppstats: FAILED
/sbin/iprofd: FAILED
/sbin/iptables: FAILED
/sbin/iptables-restore: FAILED
/sbin/iptables-save: FAILED
/sbin/iptunnel: FAILED
/sbin/isdnctrl: FAILED
/sbin/isdnlog: FAILED
/sbin/iwconfig: FAILED
/sbin/iwevent: FAILED
/sbin/iwgetid: FAILED
/sbin/iwlist: FAILED
/sbin/iwpriv: FAILED
/sbin/iwspy: FAILED
/sbin/killall5: FAILED
/sbin/kpartx: FAILED
/sbin/kudzu: FAILED
/sbin/logsave: FAILED
/sbin/loopctrl: FAILED
/sbin/losetup: FAILED
/sbin/lsmod: FAILED
/sbin/lspci: FAILED
/sbin/lsusb: FAILED
/sbin/MAKEDEV: FAILED
/sbin/mdadm: FAILED
/sbin/mdmpd: FAILED
/sbin/mgetty: FAILED
/sbin/mii-diag: FAILED
/sbin/mii-tool: FAILED
/sbin/mingetty: FAILED
/sbin/mkdosfs: FAILED
/sbin/mke2fs: FAILED
/sbin/mkfs: FAILED
/sbin/mkfs.ext2: FAILED
/sbin/mkfs.ext3: FAILED
/sbin/mkfs.msdos: FAILED
/sbin/mkfs.vfat: FAILED
/sbin/mkswap: FAILED
/sbin/mkzonedb: FAILED
/sbin/modinfo: FAILED
/sbin/modprobe: FAILED
/sbin/mount.cifs: FAILED
/sbin/multipath: FAILED
/sbin/multipathd: FAILED
/sbin/nameif: FAILED
/sbin/netplugd: FAILED
/sbin/netreport: FAILED
/sbin/nologin: FAILED
/sbin/pam_console_apply: FAILED
/sbin/pam_tally: FAILED
/sbin/pam_tally2: FAILED
/sbin/parted: FAILED
/sbin/partprobe: FAILED
/sbin/partx: FAILED
/sbin/pcbitctl: FAILED
/sbin/pidof: FAILED
/sbin/pivot_root: FAILED
/sbin/plipconfig: FAILED
/sbin/poweroff: FAILED
/sbin/pppoe: FAILED
/sbin/pppoe-relay: FAILED
/sbin/pppoe-server: FAILED
/sbin/pppoe-sniff: FAILED
/sbin/ppp-watch: FAILED
/sbin/quotacheck: FAILED
/sbin/quotaoff: FAILED
/sbin/quotaon: FAILED
/sbin/reboot: FAILED
/sbin/resize2fs: FAILED
/sbin/rmmod: FAILED
/sbin/route: FAILED
/sbin/rtmon: FAILED
/sbin/runlevel: FAILED
/sbin/runuser: FAILED
/sbin/setkey: FAILED
/sbin/setpci: FAILED
/sbin/sfdisk: FAILED
/sbin/sgpio: FAILED
/sbin/shutdown: FAILED
/sbin/slattach: FAILED
/sbin/stinit: FAILED
/sbin/sulogin: FAILED
/sbin/swapoff: FAILED
/sbin/swapon: FAILED
/sbin/sysctl: FAILED
/sbin/tc: FAILED
/sbin/telinit: FAILED
/sbin/tune2fs: FAILED
/sbin/umount.cifs: FAILED
/sbin/vboxd: FAILED
/sbin/vconfig: FAILED
/sbin/ypbind: FAILED
 
Old 12-18-2009, 03:48 PM   #2
open4biz
LQ Newbie
 
Registered: Dec 2009
Posts: 6

Original Poster
Rep: Reputation: 0
Here is the RootKit Hunter Log

Here is the RootKit Hunter Log (attached)
Attached Files
File Type: txt rkhunter.log.old.txt (160.7 KB, 49 views)
 
Old 12-18-2009, 04:24 PM   #3
EricTRA
LQ Guru
 
Registered: May 2009
Location: Gibraltar, Gibraltar
Distribution: Fedora 20 with Awesome WM
Posts: 6,805
Blog Entries: 1

Rep: Reputation: 1297Reputation: 1297Reputation: 1297Reputation: 1297Reputation: 1297Reputation: 1297Reputation: 1297Reputation: 1297Reputation: 1297
Hi,

I think RKHunter has updated but you didn't run it with the --propupd parameter. The same thing happened to me when I updated to the latest version. All of a sudden all the programs were flagged while that particular server doesn't even have access or is accessible to/from the internet.

If you're sure that you didn't change anything like dist-upgrade I'd rebuild the RKHunter database by using rkhunter --propupd and then have it check again.

Kind regards,

Eric
 
Old 12-18-2009, 04:33 PM   #4
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3599Reputation: 3599Reputation: 3599Reputation: 3599Reputation: 3599Reputation: 3599Reputation: 3599Reputation: 3599Reputation: 3599Reputation: 3599Reputation: 3599
I second the --propupd part (your log is incomplete) ...besides that having everything being flagged as changed would not fit the "usual" cracker MO (as in trying to keep a low profile). I'd run your distro's package management verification if its got any.
 
Old 12-18-2009, 04:58 PM   #5
open4biz
LQ Newbie
 
Registered: Dec 2009
Posts: 6

Original Poster
Rep: Reputation: 0
Hi all,

I didn't have RKHunter installed until today when I thought I had a secuirty issue. I did start with the --propupd switch to begin, per RKHunter's readme file. I just ran it with the switch again and will attach the new result.

I am certain that I didn't trigger the file updates. My last update was the day before. I would like to follow this idea, "I'd run your distro's package management verification if its got any," but I don't know how to go about it. May I ask to please be pointed in the proper direction for CentOS 5.4 aqnd I'll take it from there?

A little more background: the checksum anomalies were brough to my attention by the LFD module of ConfigServer Security and Firewall (http://www.configserver.com/cp/csf.html). I don't know if that helps.

Lastly, the RKHunter log lines that have me most concerned are the following:

"Warning: The command '/usr/bin/groups' has been replaced by a script: /usr/bin/groups: Bourne shell script text executable."

"Warning: The command '/usr/bin/GET' has been replaced by a script: /usr/bin/GET: perl script text executable"

Should I be concerned? To this layman, those sound BAD.

Thank you in advance.

Ansel
Attached Files
File Type: txt rkhunter.log.txt (123.3 KB, 19 views)

Last edited by open4biz; 12-18-2009 at 05:02 PM.
 
Old 12-18-2009, 04:58 PM   #6
open4biz
LQ Newbie
 
Registered: Dec 2009
Posts: 6

Original Poster
Rep: Reputation: 0
Also, regarding the cracker MO... agreed. I'm starting to come back from the edge of paranoia, thanks to you all.
 
Old 12-18-2009, 05:08 PM   #7
EricTRA
LQ Guru
 
Registered: May 2009
Location: Gibraltar, Gibraltar
Distribution: Fedora 20 with Awesome WM
Posts: 6,805
Blog Entries: 1

Rep: Reputation: 1297Reputation: 1297Reputation: 1297Reputation: 1297Reputation: 1297Reputation: 1297Reputation: 1297Reputation: 1297Reputation: 1297
Quote:
Originally Posted by open4biz View Post
Lastly, the RKHunter log lines that have me most concerned are the following:

"Warning: The command '/usr/bin/groups' has been replaced by a script: /usr/bin/groups: Bourne shell script text executable."

"Warning: The command '/usr/bin/GET' has been replaced by a script: /usr/bin/GET: perl script text executable"
Hello,

If I recall correct RKHunter checks if a binary version of a command is replaced by an executable script. If so like in this case you can white-list those in the RKHunter configuration file. You should not be worried about this if it's the first time you run RKHunter.

In regards to the LFD module of ConfigServer Security and Firewall part of your post; sorry don't know that one. Hopefully someone can shed some light there.

Kind regards,

Eric
 
1 members found this post helpful.
Old 12-18-2009, 05:08 PM   #8
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3599Reputation: 3599Reputation: 3599Reputation: 3599Reputation: 3599Reputation: 3599Reputation: 3599Reputation: 3599Reputation: 3599Reputation: 3599Reputation: 3599
Quote:
Originally Posted by open4biz View Post
I didn't have RKHunter installed until today when I thought I had a secuirty issue. I did start with the --propupd switch to begin, per RKHunter's readme file. I just ran it with the switch again and will attach the new result.
Usually one would install some form of filesystem integrity verification method *before* an (perceived) breach of security and only update it *after* all warnings were verified.


Quote:
Originally Posted by open4biz View Post
CentOS 5.4
That'll be 'rpm --verify' as in 'rpm -Vva > /tmp/rpmvva.log 2>&1'.


Quote:
Originally Posted by open4biz View Post
".*has been replaced by a script"
See the Rootkit Hunter FAQ, search this LQ forum and see the rkhunter-users mailing list archives?

Last edited by unSpawn; 12-18-2009 at 05:09 PM.
 
1 members found this post helpful.
Old 12-18-2009, 05:09 PM   #9
EricTRA
LQ Guru
 
Registered: May 2009
Location: Gibraltar, Gibraltar
Distribution: Fedora 20 with Awesome WM
Posts: 6,805
Blog Entries: 1

Rep: Reputation: 1297Reputation: 1297Reputation: 1297Reputation: 1297Reputation: 1297Reputation: 1297Reputation: 1297Reputation: 1297Reputation: 1297
Quote:
Originally Posted by open4biz View Post
Also, regarding the cracker MO... agreed. I'm starting to come back from the edge of paranoia, thanks to you all.
A small level of paranoia is good to have but never let it guide you to insanity

Kind regards,

Eric
 
Old 12-18-2009, 05:47 PM   #10
open4biz
LQ Newbie
 
Registered: Dec 2009
Posts: 6

Original Poster
Rep: Reputation: 0
Quote:
Originally Posted by unSpawn View Post
Usually one would install some form of filesystem integrity verification method *before* an (perceived) breach of security and only update it *after* all warnings were verified.
I thought I was covered by CSF/LFD. I am now broadening the security approach. I can't tell if there's egg on my face... yet.


Quote:
Originally Posted by unSpawn View Post
That'll be 'rpm -Vva > /tmp/rpmvva.log 2>&1'.
That ran for a couple minutes and then went back to the prompt. Is there I log where I may see the results?

Hmmmm, I found the yum log while plunking around. It shows I updated the glibc library yesterday. Would that have anything to do with the checksum errors above? The Dec 18 files were done so at 11:00am, to see if Yum could address the problem.

Code:
(Day in question = Dec 18 at 5:00am those files started failing the checksum verification)

Dec 17 08:57:51 Updated: glibc-common-2.5-42.el5_4.2.i386
Dec 17 08:58:07 Updated: glibc-2.5-42.el5_4.2.i686
Dec 17 08:58:08 Updated: nscd-2.5-42.el5_4.2.i386
Dec 17 08:58:09 Updated: glibc-headers-2.5-42.el5_4.2.i386
Dec 17 08:58:12 Updated: glibc-devel-2.5-42.el5_4.2.i386
Dec 18 11:08:03 Updated: expat-1.95.8-8.3.el5_4.2.i386
Dec 18 11:08:09 Updated: samba-common-3.0.33-3.15.el5_4.1.i386
Dec 18 11:08:10 Updated: openssh-4.3p2-36.el5_4.3.i386
Dec 18 11:08:11 Updated: libtool-ltdl-1.5.22-7.el5_4.i386
Dec 18 11:08:12 Updated: kpartx-0.4.7-30.el5_4.4.i386
Dec 18 11:08:23 Updated: samba-3.0.33-3.15.el5_4.1.i386
Dec 18 11:08:25 Updated: samba-client-3.0.33-3.15.el5_4.1.i386
Dec 18 11:08:26 Updated: openssh-clients-4.3p2-36.el5_4.3.i386
Dec 18 11:08:26 Updated: openssh-server-4.3p2-36.el5_4.3.i386
Dec 18 11:08:27 Updated: expat-devel-1.95.8-8.3.el5_4.2.i386
Dec 18 11:08:28 Updated: device-mapper-multipath-0.4.7-30.el5_4.4.i386
Thanks again,

Ansel
 
Old 12-18-2009, 07:14 PM   #11
craigevil
Senior Member
 
Registered: Apr 2005
Location: OZ
Distribution: Debian Sid/RPIOS
Posts: 4,865
Blog Entries: 28

Rep: Reputation: 530Reputation: 530Reputation: 530Reputation: 530Reputation: 530Reputation: 530
You might try running chkrootkit, rkhunter tends to show weird things that aren't actually an issue.

Using something like tripwire, samhain or aide would probably be a good idea as well, especially on a server connected to the internet. As well as using selinux and perhaps even Bastille to help lock things down.
 
1 members found this post helpful.
Old 12-19-2009, 03:38 AM   #12
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3599Reputation: 3599Reputation: 3599Reputation: 3599Reputation: 3599Reputation: 3599Reputation: 3599Reputation: 3599Reputation: 3599Reputation: 3599Reputation: 3599
Quote:
Originally Posted by open4biz View Post
I thought I was covered by CSF/LFD. I am now broadening the security approach.
It seems ConfigServer Firewall / Login Failure Daemon does include a rudimentary form of Intrusion detection system (csf.conf: LF_INTEGRITY). As far as I can see however it does only MD5 hash comparison. That is kind of weak: if you compare that with any more useful HIDS you'll find testing for multiple attributes and their changes makes it easier to help you determine what happened. This however should not mean that you should rush out and install all sorts of applications right now as some may suggest. Without proper verification of the system beforehand that will be an exercise in futility.


Quote:
Originally Posted by open4biz View Post
Is there I log where I may see the results?
That'll be "/tmp/rpmvva.log". Read it like 'grep -v "^\.\{8\}" /tmp/rpmvva.log | less' to avoid listing files your RPMDB verified as unchanged.
 
Old 12-19-2009, 03:48 AM   #13
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3599Reputation: 3599Reputation: 3599Reputation: 3599Reputation: 3599Reputation: 3599Reputation: 3599Reputation: 3599Reputation: 3599Reputation: 3599Reputation: 3599
Quote:
Originally Posted by craigevil View Post
You might try running chkrootkit, rkhunter tends to show weird things that aren't actually an issue.
"I think", "don't worry", "no issue" and "overly paranoid" are typically fuzzy human ways to dismiss things without having to explain them. Saying just "weird things that aren't actually an issue" does not help the OP to find out for himself. If a tool shows scan results that one verified are not an issue then one should adjust. In this case the whitelisting options in rkhunter.conf. If one doesn't (want to) understand the tools one runs then what's the point of running them anyway?..


Quote:
Originally Posted by craigevil View Post
Using something like tripwire, samhain or aide would probably be a good idea as well, especially on a server connected to the internet. As well as using selinux and perhaps even Bastille to help lock things down.
Any reflexes to install things should be controlled until the machine is verified clean.
 
Old 12-21-2009, 02:34 AM   #14
open4biz
LQ Newbie
 
Registered: Dec 2009
Posts: 6

Original Poster
Rep: Reputation: 0
Well... it happened again. The next day, I awoke to a new set of file updates:

Time: Sat Dec 19 05:00:21 2009 -0800

The following list of files have FAILED the md5sum comparision test. This means that the file has been changed in some way. This could be a result of an OS update or application upgrade. If the change is unexpected it should be investigated:

/usr/bin/dbus-binding-tool: FAILED
/usr/bin/gdb: FAILED
/usr/bin/gdbtui: FAILED
/usr/bin/xmlwf: FAILED
/usr/sbin/avahi-daemon: FAILED
/usr/sbin/hald: FAILED
/sbin/cciss_id: FAILED
/sbin/kpartx: FAILED
/sbin/mount.cifs: FAILED
/sbin/multipath: FAILED
/sbin/multipathd: FAILED
/sbin/umount.cifs: FAILED

Do these files make sense for someone with nefarious purposes to play with? Or.. could this be part of an automatic update of some kind, that I'm not aware of? Here are my server's currently running processes:

dovecot 26012 0.0 0.3 4880 1824 ? S Dec20 0:00 pop3-login
dovecot 26015 0.0 0.3 4884 1824 ? S Dec20 0:00 pop3-login
root 3491 0.0 2.8 19116 14960 ? Ss 00:00 0:00 lfd - sleeping
dovecot 3818 0.0 0.3 4884 1824 ? S 00:02 0:00 pop3-login
dovecot 3819 0.0 0.3 4880 1824 ? S 00:02 0:00 pop3-login
dovecot 3821 0.0 0.3 4880 1824 ? S 00:02 0:00 pop3-login
dovecot 3823 0.0 0.3 4880 1820 ? S 00:03 0:00 pop3-login
[priv]
@pts/0
504 4014 0.0 0.2 4544 1408 pts/0 Ss 00:07 0:00 -bash
-k start -DSSL
-k start -DSSL
-k start -DSSL
-k start -DSSL
-k start -DSSL
-k start -DSSL
root 5119 0.0 0.2 4920 1276 pts/0 S 00:28 0:00 su -
root 5128 0.0 0.2 4676 1440 pts/0 S 00:28 0:00 -bash
-k start -DSSL
-k start -DSSL
-k start -DSSL
root 5200 0.0 0.1 4264 944 pts/0 R+ 00:29 0:00 ps aux
root 5201 0.0 0.1 4172 704 pts/0 D+ 00:29 0:00 less

Does anything stand out as strange?

Thanks,

Ansel
 
Old 12-21-2009, 11:48 AM   #15
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3599Reputation: 3599Reputation: 3599Reputation: 3599Reputation: 3599Reputation: 3599Reputation: 3599Reputation: 3599Reputation: 3599Reputation: 3599Reputation: 3599
Quote:
Originally Posted by open4biz View Post
Do these files make sense for someone with nefarious purposes to play with? Or.. could this be part of an automatic update of some kind, that I'm not aware of?
I explained the weakness of using the intrusion detection part of ConfigServer Firewall / Login Failure Daemon and I also explained one way of verifying your installation. I suggest you go do that, study the results (ask if unsure), compare changes with any updates installed (logs?), then disable the CSF/LFD intrusion detection part (csf.conf) and install mature, maintained and supported filesystem integrity verification software like Samhain, Aide or even tripwire.

Last edited by unSpawn; 12-21-2009 at 11:50 AM.
 
  


Reply


Thread Tools Search this Thread
Search this Thread:

Advanced Search

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
How to add paths to sbin, bin/bash, bin sh for users gopi.d Fedora 3 12-07-2007 12:47 AM
making files available in /usr/local/bin and /usr/sbin reakinator Linux - Newbie 1 10-14-2006 05:09 PM
path in services wrong for clamav updated frm 0.75 to 0.80 usr/bin vs usr/local/bin Emmanuel_uk Linux - Newbie 3 04-22-2005 01:02 AM
/bin vs. /sbin mikeshn Linux - Software 6 10-07-2003 03:59 PM
sbin and bin Stephanie General 5 09-05-2002 08:47 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 03:26 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration