LinuxQuestions.org
Visit Jeremy's Blog.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 06-18-2012, 11:43 AM   #1
Sgt.Bricks
LQ Newbie
 
Registered: Jun 2012
Posts: 2

Rep: Reputation: Disabled
Taking a look at my log files. Any major problems?


I'm pretty much a newb. Can you please take a look at the reports from rkhunter and tiger? Are there any programs that I can setup?

Tiger report:
http://paste.ubuntu.com/1047589/
Rkhunter report:
http://paste.ubuntu.com/1047592/

Thanks.
 
Old 06-19-2012, 05:16 AM   #2
Noway2
Senior Member
 
Registered: Jul 2007
Distribution: Gentoo
Posts: 2,125

Rep: Reputation: 781Reputation: 781Reputation: 781Reputation: 781Reputation: 781Reputation: 781Reputation: 781
Welcome to LQ Security. There is nothing wrong with being new and inexperienced. Everyone here was when they began. What is a problem is running a security tool, posting the output asking strangers if there is anything wrong with it. If you are going to run these kinds of tools you need to learn how to use them properly or you will rapidly wind up in quicksand. The rkhunter program has excellent documentation and does explain very clearly how to tweak it for the specifics of your system to avoid false alarms. Be sure to read this documentation.

Now, to address your specific question(s): These tools will identify things that that are potentially suspect. These tools are designed to be conservative and warn judiciously. Pretty much every system will have normal aspects to it that will cause warnings. What you need to do is examine the output of these files, look for warnings, and then research what they mean. For example:
Code:
[09:27:45] Warning: The command '/usr/bin/unhide.rb' has been replaced by a script: /usr/bin/unhide.rb: Ruby script, ASCII text
Is this file legitimate on your system? If there is a question, verify the file date, time, md5sum and compare it against the one in the package repositories. The ubuntu package page has excellent search features and you should be able to easily locate which package this file is located in, download it, and compare these items.

Code:
[09:32:24]   Checking for hidden files and directories       [ Warning ]
[09:32:24] Warning: Hidden directory found: /etc/.java
[09:32:24] Warning: Hidden directory found: /dev/.udev
Again, Google is your friend. Google these warnings, read the descriptions, and make your own determination.

A word of experience might also be warranted here. In order to properly secure your system, which I assume is your goal, you need to first identify what it is you are trying to secure against and develop a plan accordingly. While root kit detection is an important aspect of a solid security process, one should not rely on it as a sole measure of whether or not their system is clean. If you aren't already, one of the first things you should be doing is auditing your log files regularly as signs of intrusion and problems will almost always appear there first.
 
Old 06-19-2012, 01:06 PM   #3
Sgt.Bricks
LQ Newbie
 
Registered: Jun 2012
Posts: 2

Original Poster
Rep: Reputation: Disabled
Well, looks like the first entry was from tiger. The unhide file was a replaced dependency from rkhunter.

I installed ossec... I am having trouble interpreting all the log files I have been looking through. Not sure how to determine what logs are fishy... Trying to configure apparmor. Any other points?

https://wiki.ubuntu.com/BasicSecurity/DidIJustGetOwned

Last edited by Sgt.Bricks; 06-19-2012 at 01:07 PM.
 
Old 06-19-2012, 04:03 PM   #4
Noway2
Senior Member
 
Registered: Jul 2007
Distribution: Gentoo
Posts: 2,125

Rep: Reputation: 781Reputation: 781Reputation: 781Reputation: 781Reputation: 781Reputation: 781Reputation: 781
The tools that you are mentioning all fall into the category of HIDS, Host Intrusion Detection Systems. These types of programs are designed to be installed on a known clean system and then used to generate alerts when something is amiss. While potentially beneficial for home desktop / laptop use their primary function is in servers which expose services to a public facing internet. Apparmor is a little bit different in that it is a MAC, mandatory access control program that is designed to limit which services or process can have access to what areas. For example, it will do things like keep a web server from accessing the DNS configuration.

Here is an excellent introduction to Ubuntu Security for a new user, that discusses the Linux Security Mindset, compares it to Windows, and gives you a good overview of some of the common security aspects: http://ubuntuforums.org/showthread.php?t=510812/ While I wouldn't normally refer people to another forum, in your case I feel that this particular post could of value and targeted torwards your experience level.

Also, based upon your posts, I am getting the impression that you have had some sort of event that is leaving you concerned about being compromised. If this is the case, we here at LQ Security can most assuredly help you with this. However, we do use a unique approach by engaging in a fact finding, evidence gathering investigation. In such a situation, it is best to create as little disturbance to the system as possible. Installing and running security applications (after the fact) is very counter productive as it will likely destroy evidence of the intrusion. The log files are one key place that we look for such information.

If you would care to share what happened and your concerns, we would be in a much better position to help you evaluate the situation. Please be verbose in your explanation, giving us as much detail as possible: distribution, whether this is a server or desktop/laptop, what server applications you are running, what prompted you to become concerned, what have you done since, etc.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
convert screen.log and putty.log files into linux readable files aksharb Linux - Software 1 03-20-2011 07:16 AM
char-major-10-134 is filling up my log!!! Half_Elf Linux - General 3 04-20-2009 03:39 PM
Log files, and problems... jsosic Debian 2 03-15-2006 09:45 AM
Major problems installing tar.gz files Nitro Boy Linux - Newbie 9 07-21-2005 10:01 PM
Can log files be time stamped? (such as FTP login and transfer log files) bripage Linux - Networking 6 08-08-2002 10:55 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 02:55 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration