rkhunter-users Mailing List for Rootkit Hunter (Page 153)
Brought to you by:
dogsbody,
dogsbodymark
You can subscribe to this list here.
2006 |
Jan
(2) |
Feb
(2) |
Mar
(7) |
Apr
(5) |
May
(5) |
Jun
(7) |
Jul
(23) |
Aug
(17) |
Sep
(35) |
Oct
(138) |
Nov
(95) |
Dec
(84) |
---|---|---|---|---|---|---|---|---|---|---|---|---|
2007 |
Jan
(140) |
Feb
(78) |
Mar
(28) |
Apr
(17) |
May
(78) |
Jun
(72) |
Jul
(49) |
Aug
(47) |
Sep
(74) |
Oct
(69) |
Nov
(50) |
Dec
(75) |
2008 |
Jan
(43) |
Feb
(80) |
Mar
(30) |
Apr
(29) |
May
(25) |
Jun
(14) |
Jul
(47) |
Aug
(11) |
Sep
(28) |
Oct
(17) |
Nov
(14) |
Dec
(66) |
2009 |
Jan
(54) |
Feb
(21) |
Mar
(22) |
Apr
(8) |
May
(4) |
Jun
(13) |
Jul
(10) |
Aug
(24) |
Sep
(1) |
Oct
(41) |
Nov
(17) |
Dec
(99) |
2010 |
Jan
(53) |
Feb
(19) |
Mar
(30) |
Apr
(28) |
May
(135) |
Jun
(34) |
Jul
(19) |
Aug
(24) |
Sep
(48) |
Oct
(4) |
Nov
(61) |
Dec
(17) |
2011 |
Jan
(23) |
Feb
(18) |
Mar
(14) |
Apr
(12) |
May
(23) |
Jun
(27) |
Jul
(57) |
Aug
(17) |
Sep
(25) |
Oct
(19) |
Nov
(9) |
Dec
(4) |
2012 |
Jan
(19) |
Feb
(5) |
Mar
(5) |
Apr
(17) |
May
(13) |
Jun
(21) |
Jul
(2) |
Aug
(10) |
Sep
(5) |
Oct
(5) |
Nov
(18) |
Dec
(4) |
2013 |
Jan
(23) |
Feb
(13) |
Mar
(5) |
Apr
(48) |
May
(38) |
Jun
(5) |
Jul
(19) |
Aug
(14) |
Sep
(10) |
Oct
(7) |
Nov
(19) |
Dec
(44) |
2014 |
Jan
(11) |
Feb
(11) |
Mar
(38) |
Apr
(36) |
May
(21) |
Jun
(13) |
Jul
(7) |
Aug
(21) |
Sep
(30) |
Oct
(3) |
Nov
|
Dec
(29) |
2015 |
Jan
(5) |
Feb
(5) |
Mar
(12) |
Apr
(5) |
May
(25) |
Jun
(11) |
Jul
(7) |
Aug
(8) |
Sep
(3) |
Oct
(15) |
Nov
(10) |
Dec
|
2016 |
Jan
(5) |
Feb
|
Mar
(6) |
Apr
(12) |
May
(2) |
Jun
(11) |
Jul
(8) |
Aug
(13) |
Sep
(15) |
Oct
(6) |
Nov
(21) |
Dec
(1) |
2017 |
Jan
|
Feb
(2) |
Mar
(2) |
Apr
(3) |
May
(2) |
Jun
(30) |
Jul
(42) |
Aug
(8) |
Sep
(2) |
Oct
(24) |
Nov
(12) |
Dec
(14) |
2018 |
Jan
(7) |
Feb
(22) |
Mar
(8) |
Apr
(11) |
May
(28) |
Jun
(20) |
Jul
(2) |
Aug
(1) |
Sep
(2) |
Oct
(2) |
Nov
(11) |
Dec
|
2019 |
Jan
(5) |
Feb
(11) |
Mar
(6) |
Apr
(5) |
May
(4) |
Jun
(4) |
Jul
(4) |
Aug
(8) |
Sep
(5) |
Oct
(7) |
Nov
(10) |
Dec
(1) |
2020 |
Jan
|
Feb
|
Mar
|
Apr
(2) |
May
(4) |
Jun
(3) |
Jul
(3) |
Aug
(2) |
Sep
|
Oct
(7) |
Nov
(3) |
Dec
(1) |
2021 |
Jan
(1) |
Feb
(3) |
Mar
|
Apr
|
May
(7) |
Jun
(2) |
Jul
(7) |
Aug
(11) |
Sep
|
Oct
|
Nov
|
Dec
|
2022 |
Jan
(1) |
Feb
|
Mar
|
Apr
|
May
(2) |
Jun
(1) |
Jul
(2) |
Aug
|
Sep
(4) |
Oct
|
Nov
|
Dec
|
2023 |
Jan
|
Feb
|
Mar
(5) |
Apr
|
May
|
Jun
|
Jul
|
Aug
|
Sep
|
Oct
(3) |
Nov
(4) |
Dec
(1) |
2024 |
Jan
|
Feb
(3) |
Mar
(8) |
Apr
|
May
|
Jun
|
Jul
(1) |
Aug
|
Sep
|
Oct
|
Nov
|
Dec
|
2025 |
Jan
|
Feb
(1) |
Mar
|
Apr
|
May
|
Jun
(9) |
Jul
|
Aug
|
Sep
|
Oct
|
Nov
|
Dec
|
From: Kent O. <fo...@ds...> - 2006-03-22 15:21:42
|
I upgraded to the latest version of rkhunter. Now the daily emails I = receive are sent to a different email address. Where do I change the = email address that the daily report is sent to? I'm running Fedora 4. Thanks |
From: pi <zi...@al...> - 2006-03-19 12:01:38
|
Hi. Running rkhunter with the latest updates on my fc4-fully updated system, gives me nothing unusual at all. But in mail-log this shows up: Date: Sun, 19 Mar 2006 11:37:42 +0100 From: root <root@tilda.localdomain> To: root@tilda.localdomain Subject: [rkhunter] Warnings found for tilda.localdomain Please inspect this machine, because it can be infected Anyone who can help? chkhrootkit doesnt show anyting unusual either. Regards pi |
From: Max W. <dav...@fa...> - 2006-03-17 01:43:58
|
After a recent update (using smartpm configured to use atrpms), I'm running Rootkit Hunter 1.2.8 on fc4 on an x86_64 (AMD). I've recently been getting these messages in my reports : " Running rkhunter updater... Thu, 16 Mar 2006 04:02:25 +0800 Mirrorfile /var/rkhunter/db/mirrors.dat rotated Using mirror http://mirror01.mirror.rkhunter.org [DB] Mirror file : ERROR Fatal error: Problem while fetching file Finished rkhunter updater.. Thu, 16 Mar 2006 04:02:27 +0800 Ready. " ... " * Filesystem checks Checking /dev for suspicious files... [ OK ] Scanning for hidden files... [ Warning! ] --------------- /dev/.udevdb /usr/share/man/man1/..1.gz /etc/.pwd.lock /etc/.java --------------- Please inspect: /dev/.udevdb (directory) /usr/share/man/man1/..1.gz (gzip compressed data, from Unix, max compression) /etc/.java (directory) " 1) I'm not sure why the updater is failing - any ideas? 2) I inspected the files/directories and they look 'ok', but I'm not sure. What should I be looking for? Max. |
From: John H. <joh...@pl...> - 2006-02-17 16:43:07
|
On Fri, 2006-02-17 at 17:18 +0100, unspawn wrote: > > On Fri, 17 Feb 2006, John Horne wrote: > > Using RKhunter 1.2.8 on Solaris 9, with the --report-warnings-only > > option gives an error: > > expr: non-numeric argument > > Since Ksh does have variable $SECONDS, changing line 4846 > > if [ ${OPERATING_SYSTEM} = "AIX" ] ; then > to read > if [ ${OPERATING_SYSTEM} = "AIX" -o ${OPERATING_SYSTEM} = "SunOS" ]; then > should do it, right? > Yes. I have tried this and it works fine. > > > This last test fails. Under Solaris 'date +%s' does nothing, ENDTIME > > gets set to '%s', and subsequently the expr fails because '%s' is not > > numeric. > > Under Linux and BSD 'date +%s' shows seconds since start of epoch, > how does Solaris show that? > As far as I can tell it doesn't. I can see nothing in the date/strftime man pages saying anything about a format for the seconds from the start of epoch. John. -- --------------------------------------------------------------- John Horne, University of Plymouth, UK Tel: +44 (0)1752 233914 E-mail: Joh...@pl... Fax: +44 (0)1752 233839 |
From: John H. <joh...@pl...> - 2006-02-17 14:49:42
|
Hello, Using RKhunter 1.2.8 on Solaris 9, with the --report-warnings-only option gives an error: expr: non-numeric argument The problem seems to be that the code detects Solaris and switches to using the KSH shell. It then checks (line 311): case `uname` in AIX|SunOS) BEGINTIME=$SECONDS which is fine, but at the end (line 4846) it does: if [ ${OPERATING_SYSTEM} = "AIX" ] ; then ENDTIME=$SECONDS else ENDTIME=`date +%s` fi TOTALTIME=`expr ${ENDTIME} - ${BEGINTIME}` This last test fails. Under Solaris 'date +%s' does nothing, ENDTIME gets set to '%s', and subsequently the expr fails because '%s' is not numeric. Regards, John. -- --------------------------------------------------------------- John Horne, University of Plymouth, UK Tel: +44 (0)1752 233914 E-mail: Joh...@pl... Fax: +44 (0)1752 233839 |
From: Carlito - Ps2Fantasy.c. <ca...@ps...> - 2006-01-29 14:54:19
|
Hello unSpawn, thanks for the feedback. Unfortunately, just before we run rkhunter and got those positives we also had installed r-fx network "les" tool, a tool that changes the attributes of the main executables to make them available only to root. So, tripwire reported positives, since it checks for files attributes, on all those executables affected by the tool, which included those I am getting positives for. Rpm -V returns ".M...... /usr/bin/write", file mode change... Thanks > > > ----- Original Message ----- > From: "unspawn" <un...@ro...> > To: "Carlito - Ps2Fantasy.com" <ca...@ps...> > Cc: <rkh...@li...> > Sent: Sunday, January 29, 2006 2:51 PM > Subject: Re: [Rkhunter-users] RkHunter reports positives after patches > > >> Hello Carlito, >> >> On Sun, 29 Jan 2006, Carlito - Ps2Fantasy.com wrote: >>> We have a report on one server of some positives; the machine has rh9 >>> patched every time a new fedora legacy update comes out. >>> >>> These are the positives we are getting: >>> >>> /bin/dmesg [ BAD ] >>> /bin/kill [ BAD ] >>> /bin/login [ BAD ] >>> /bin/mount [ BAD ] >> >> See if the util-linux rpm itself checks out fine (use "rpm -V util-linux" >> or with -p and RPM from mirror). >> >> * If you already run a filesystem integrity checker like Aide, Samhain or >> even tripwire (and you keep a copy of the database off-site) it would be >> good to check, just to be sure. >> >> >> Cheers, unSpawn >> >> >> -- >> Internal Virus Database is out-of-date. >> Checked by AVG Free Edition. >> Version: 7.1.371 / Virus Database: 267.14.17/227 - Release Date: >> 1/11/2006 >> >> > |
From: Carlito - Ps2Fantasy.c. <ca...@ps...> - 2006-01-29 05:20:22
|
Hello all. We have a report on one server of some positives; the machine has rh9 = patched every time a new fedora legacy update comes out. These are the positives we are getting: /bin/dmesg [ BAD ] /bin/kill [ BAD ] /bin/login [ BAD ] /bin/mount [ BAD ] What should we do? Thanks. |