SCIENTIFIC-LINUX-USERS Archives

September 2016

SCIENTIFIC-LINUX-USERS@LISTSERV.FNAL.GOV

Options: Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
"Steven J. Yellin" <[log in to unmask]>
Reply To:
Steven J. Yellin
Date:
Wed, 7 Sep 2016 19:03:32 -0700
Content-Type:
multipart/mixed
Parts/Attachments:
text/plain (2587 bytes)
     Are rpm and the check sum tools statically linked?  If not, hiding 
copies of them might not help if libraries have been compromised.  But 
busybox is statically linked, and it looks like it can be easily used to 
replace most commands used to check security without going to the trouble 
of pulling files from it.  For example, 'ln -s busybox md5sum' allows use 
of busybox's md5sum and 'ln -s busybox vi' allows use of its vi. See 
https://busybox.net/FAQ.html#getting_started .

Steven Yellin

On Wed, 7 Sep 2016, [log in to unmask] wrote:

> Jdow,
>
> Why are you looking at that˙˙ for root kit prevention? It's a very old 
> fashion approach, I would use the RPM's verify  command or one of the 
> many filesystem  check sum tools available for that instead. Either one 
> can tell you if ˙˙any critical binaries or libraries have been 
> compromised very easily and there are even tools built around them to do 
> it on a network wide level. Further more if you really want to make your 
> systems resistant to root kits, readonly mount of / and /usr˙˙ is still 
> your best bet, even Red Hat products like RHEV use that method on 
> appliances.
>
>
>   Original Message  
> From: jdow
> Sent: Wednesday, September 7, 2016 19:09
> To: [log in to unmask]
> Subject: Re: Re: Regarding latest Linux level 3 rootkits
>
> Thanks Vladimir,
>
> I suppose I could pull the necessary files from busybox as a means of keeping a
> more generic Linux system in security trim. This might be a useful tool set to
> suggest upstream. A statically linked less would allow a quick check for the
> hidden user. A statically linked chkrootkit would find the bad file size for the
> affected glib libraries.
>
> {^_^} Joanne
>
> On 2016-09-07 03:36, Vladimir Mosgalin wrote:
>> Hi jdow!
>> ˙˙
>> On 2016.09.06 at 23:15:04 -0700, jdow wrote next:
>>
>>> Is there any source for a VI, VIM, or even EMACS that has all libraries
>>> compiled into it statically? That would make monitoring for the rootkit much
>>> easier. The same could be said for utilities such as chkrootkit. With
>>> compiled in static libraries these level three (user space) rootkits can't
>>> edit the results you get, as easily. (Any file system components in user
>>> space would also have to be statically linked.)
>>
>> Busybox would work. It's usually build statically (either that, or it's
>> easy to make that kind of build) and includes vi clone. Very poor man's
>> vi, just like other busybox utilities, but nevertheless. Current version
>> supports some neat stuff like autoindent and undo.
>>
>

ATOM RSS1 RSS2