나는 몇 가지 구글을 검색하고 그것이 발견 된 첫 번째 링크 두 개를 체크 아웃했다.
- http://www.skullbox.net/rkhunter.php
- http://www.techerator.com/2011/07/how-to-detect-rootkits-in-linux-with-rkhunter/
그들은 그러한 경고가 발생할 경우 어떻게해야하는지 언급하지 않습니다.
Warning: The command '/bin/which' has been replaced by a script: /bin/which: POSIX shell script text executable
Warning: The command '/usr/sbin/adduser' has been replaced by a script: /usr/sbin/adduser: a /usr/bin/perl script text executable
Warning: The command '/usr/bin/ldd' has been replaced by a script: /usr/bin/ldd: Bourne-Again shell script text executable
Warning: The file properties have changed:
File: /usr/bin/lynx
Current hash: 95e81c36428c9d955e8915a7b551b1ffed2c3f28
Stored hash : a46af7e4154a96d926a0f32790181eabf02c60a4
Q1 : 다른 종류의 경고를 처리하는 방법을 설명하는 확장 된 HowTo가 있습니까?
그리고 두 번째 질문입니다. 이러한 경고를 해결하기위한 조치가 충분 했습니까?
a) 의심스러운 파일을 포함하는 패키지를 찾으려면, 예를 들어 / bin / 파일의 debianutils입니다.
~ > dpkg -S /bin/which
debianutils: /bin/which
b) debianutils 패키지 체크섬을 확인하려면 :
~ > debsums debianutils
/bin/run-parts OK
/bin/tempfile OK
/bin/which OK
/sbin/installkernel OK
/usr/bin/savelog OK
/usr/sbin/add-shell OK
/usr/sbin/remove-shell OK
/usr/share/man/man1/which.1.gz OK
/usr/share/man/man1/tempfile.1.gz OK
/usr/share/man/man8/savelog.8.gz OK
/usr/share/man/man8/add-shell.8.gz OK
/usr/share/man/man8/remove-shell.8.gz OK
/usr/share/man/man8/run-parts.8.gz OK
/usr/share/man/man8/installkernel.8.gz OK
/usr/share/man/fr/man1/which.1.gz OK
/usr/share/man/fr/man1/tempfile.1.gz OK
/usr/share/man/fr/man8/remove-shell.8.gz OK
/usr/share/man/fr/man8/run-parts.8.gz OK
/usr/share/man/fr/man8/savelog.8.gz OK
/usr/share/man/fr/man8/add-shell.8.gz OK
/usr/share/man/fr/man8/installkernel.8.gz OK
/usr/share/doc/debianutils/copyright OK
/usr/share/doc/debianutils/changelog.gz OK
/usr/share/doc/debianutils/README.shells.gz OK
/usr/share/debianutils/shells OK
c) /bin/which
내가 보는 것처럼 긴장을 풀기 위해
/bin/which OK
d)에 파일을 넣으려면 /bin/which
에 /etc/rkhunter.conf
등을SCRIPTWHITELIST="/bin/which"
e) /usr/bin/lynx
체크섬을 업데이트 하는 파일에 대한 경고rkhunter --propupd /usr/bin/lynx.cur
Q2 : 이러한 경고를 올바르게 해결합니까?
In general, the only way to trust that a machine is free from backdoors and intruder modifications is to reinstall the operating system from the distribution media and install all of the security patches before connecting back to the network. We encourage you to restore your system using known clean binaries.