[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: chkrootkit and rkhunter are too old ?




On Jul 13, 2007, at 4:03 PM, Douglas Allan Tutty wrote:

On Fri, Jul 13, 2007 at 11:57:44AM -0700, David Brodbeck wrote:

* The exception is if tripwire or aid is used after booting from a  
read-only medium (such as a live CD) and uses checksums that are also  
retrieved from read-only media.  But few people do it this way  
because it's a lot of work to maintain and requires taking the  
machine down to do a check.

Is there no way for a 'secure' host to check the md5sums on a remote
host via scp or something?  The checksums could be on that secure host
(or on a CD in a drive on the secure host)?

Then you have to worry about sshd on the remote host being trojaned so it feeds you what you expect to see, not the actual data.

If you're assuming a machine might have been compromised, you can't trust *any* binaries on that machine, full stop.  You also can't trust its kernel, so running binaries off a CD without rebooting doesn't help, either -- you may only *think* it's running your binaries, while it's actually running a trojaned version.

This isn't to say that tools like tripwire don't have any value, but it's important to recognize their limitations.  If you run a local copy of tripwire on a machine, if it fails you know the machine is compromised.  But if it succeeds, you still can't be sure the machine is clean.


David Brodbeck
Information Technology Specialist 3
Computational Linguistics
University of Washington



Reply to: