John
Thanks for the accuracy and amount of feedback on the issue I raised earlier.
But I confess I
should have read the man page more closely as you already mentioned the r
switch.
I may get around to write a mini howto but to refresh....my last email stated
"My objective is to
use a live cd that I can take to anyone's computer and have it scan a hard
drive and not write to
disk"....and I should have said a linux desktop home user computer, so I stand
corrected.
2) Agreed that if we are not using a database already established, we lose the
scan power of file
integrity checks....but I strongly believe, that detecting a rootkit, in
itself, is sufficient
proof of intrusion.
3) Some may suggest I am being complacent, but I believe most intruders will
install a rootkit. If
not, certainly all script kiddies. So I agree that in NOT finding rootkits...I
can not infer no
intrusion on another computer using re-mastered live cd.
4) Some excerpts that I think relevant from log.
[19:19:04] Info: Command line is ./rkhunter -c -sk --configfile
/rkh/etc/rkhunter.conf -r /z
(comment my symbolic link failed and I will try a re-master with a bashrc...RIP
had none)
[19:19:04] Info: Using configuration file '/rkh/etc/rkhunter.conf'
(comment /rkh was new folder created in re-master and custom layout similar to
gobolinux style)
[19:19:04] Info: Using '/z' as the root directory
(comment new /z created to allow hard drive partitions to be mounted on new
tree)
[19:19:04] Info: Using '/rkh/var/lib/rkhunter/tmp' as the temporary directory
(comment I embedded a new conf file with this switch....Thanks John for
pointing out RKH needs a
temp)
[19:19:04] Info: Found the 'diff' command: /usr/bin/diff
(comment uses the rip command not the hard drive proving no chroot....if
intrusion has deleted or
modded these files....I will remain ignorant)
[19:19:05] Scanning for string /usr/lib/.../lsof [ OK ]
(comment ditto)
[19:19:09] /z/bin/find [ OK ]
(comment the z shows these scans are a success....woo hooo)
[19:19:22] Checking for file '/z/dev/proc/fuckit/hax0r' [ Not found ]
(comment.....testing rootkits is clearly a success as exhibited by this log and
similar output)
[19:26:06] Info: Found hidden file '/z/usr/share/man/man1/..1.lzma': it is
whitelisted.
(comment ....this has me stumped....I made no such config)
Overall I am very happy that the dev team allowed the rootdir and tmp switches
that allow anyone
to remaster a live cd, or install into a ramdrive live cd your RKH and test for
rootkits on a
linux computer.
I am resisting the urge to buy another carton of beer. heh heh
cheerio
Make the switch to the world's best email. Get the new Yahoo!7 Mail now.
www.yahoo7.com.au/worldsbestemail
-------------------------------------------------------------------------
SF.Net email is sponsored by: The Future of Linux Business White Paper
from Novell. From the desktop to the data center, Linux is going
mainstream. Let it simplify your IT future.
http://altfarm.mediaplex.com/ad/ck/8857-50307-18918-4
_______________________________________________
Rkhunter-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/rkhunter-users