On Wednesday, 27 February 2019 14:29:40 GMT Rich Freeman wrote:
> On Wed, Feb 27, 2019 at 8:47 AM Peter Humphrey <
pe...@prh.myzen.co.uk>
wrote:
> > On Wednesday, 27 February 2019 12:27:59 GMT Mick wrote:
> > > Could it be these versions are now launching /run/udev.pid? Is a file
> > > /run/ udev.pid present in your system?
> >
> > Yes, I have such a text file, containing just a PID.
> >
> > > In any case, the file merely contains the PID number of
> > > /lib/systemd/systemd- udevd, rather than an ELF binary and /etc/init.d/
> > > does not contain anything suspicious. However, with armies generating
> > > variants of every conceivable malware I don't know if it pays to be a
> > > bit
> > > paranoid about this.
> >
> > They really are out to get us...
>
> If it really looks like a PID file I'd assume that this is a false
> positive.
Yes.
> It would likely be generated by openrc and the init.d script.
Yes.
> Since almost no other distros use OpenRC it isn't entirely
> surprising that a tool like rkhunter wasn't tested using it to catch
> the false positive. I'd report the issue to them.
Well, if the offending file were a binary the warning would still be valid -
so worth investigating anyway.
> If by "they" you meant systemd I don't really see how they're actually
> involved. Well, other than indirectly by virtue of not creating this
> file and being the only config the rkhunter maintainers are probably
> using.
I think Peter was reinforcing my statement. 'They' know who they are, so
better left at that. LOL!
> Keep in mind that by its nature rkhunter is going to be a bit limited,
> at least when used in this way. If it supports offline scanning (ie
> from a rescue disk) then that would be pretty secure, but if it is
> running on a potentially-compromised kernel then a clever rootkit
> could evade it. Just the usual cat-and-mouse game with these sorts of
> things, but rkhunter can only see the filesystem and process tree that
> the potentially-compromised kernel lets it see. Offline scanning
> tools are always going to be superior in this regard, if you have
> known-clean (ideally read-only) boot media, and a clean firmware to
> boot it from. Really the cleanest solution would be to remove the
> hard drives and scan them on a separate machine.
I ran it offline too and investigated the fs and its contents at the same
time, but still didn't find anything suspicious. rkhunter often comes up with
false positives or issues warnings about innocuous files. It is not some
superior diagnostic tool, but nevertheless made me pay attention. Better be
safe than sorry with these matters.
--
Regards,
Mick