Everyone knows the Internet is a dangerous place.  Folks who've been on
this list for a whileave probably heard me harp about security by now. 
If you have, then you know I'm a nut when it comes to protecting your
system - AND - protecting others FROM your system if it's been cracked.

It is for this reason that I'd like to suggest the following.  Take 10
minutes to download, compile and run chkrootkit on your Linux systems. 
Review the output to see if you've been compromised.  If you are, take
the appropriate steps to isolate and/or repair the damaged system.

If you're not familiar with chkrootkit already, please review what this
fine program can do for you at http://www.chkrootkit.org.  Chkrootkit is
an easily installed utility that checks for the existence of rootkits,
trojans, LKM's, sniffers, hidden directories, etc.  Quite simply, if
your system has been cracked, chkrootkit should be able to tell you so. 
For anyone that has questions about chkrootkit, please don't hesitate to
contact me on- or (preferably) off-list.  Some tips to using chkrootkit:

- Use md5sum to verify your downloaded tarball
- Use trusted binaries.  There are a handful of system utilities (awk,
cut, netstat, etc.) that are used by chkrootkit to analyze the system. 
As there's a chance these files have been modified by exploit, upload a
tarball of these from a compatible system to a temporary directory.  Use
the "-p" flag to tell chkrootkit where to find the preferred binaries.
- Chkrootkit is a "one-time-use" utility.  It isn't meant to sit
statically on a system like a host IDS system.  Use it once, remove it. 
Download it a month later, test again.  Don't bother leaving it on the
box... you never know when *IT* might be compromised, affecting your
tests.

I know that a lot of folks will probably blow this off since most still
don't take security as seriously as they should.  Nevertheless, if only
1 out of 100 users take my advice... and 1 out of those 100 discover and
isolate an exploited server... that's potentially thousands of exploited
servers that have been pulled offline and aren't hammering my firewall
with nonsense.

Why did this end up sounding like a chain letter?  ;-) 

-- 
Jason Dixon, RHCE
DixonGroup Consulting
http://www.dixongroup.net


-- 
redhat-list mailing list
unsubscribe mailto:[EMAIL PROTECTED]
https://www.redhat.com/mailman/listinfo/redhat-list

Reply via email to