SCIENTIFIC-LINUX-USERS Archives

May 2007

SCIENTIFIC-LINUX-USERS@LISTSERV.FNAL.GOV

Options: Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Keith Lofstrom <[log in to unmask]>
Reply To:
Date:
Thu, 17 May 2007 10:57:23 -0700
Content-Type:
text/plain
Parts/Attachments:
text/plain (21 lines)
I run ancient old tripwire nightly on my machines.  Yesterday, on my
SL4.4 laptop, I noticed that it had found changes to  "vipw" and other
security related tools.  A little concerned, I downloaded the latest
version of chkrootkit and ran it, finding no problems.  I looked at
the yum logs, and found a yum upgrade of util-linux from sl-errata;
the header file shows that vipw and the rest had been updated. 

False alarm, I am probably safe, assuming no outbreak of evil at SL or
TUV (=The Upstream Vendor in North Carolina, for those wondering).

I will react similarly if I ever see a change of the basic security
programs.  Is there anything else a prudent administrator should check
when these programs change?  

Keith

-- 
Keith Lofstrom          [log in to unmask]         Voice (503)-520-1993
KLIC --- Keith Lofstrom Integrated Circuits --- "Your Ideas in Silicon"
Design Contracting in Bipolar and CMOS - Analog, Digital, and Scan ICs

ATOM RSS1 RSS2