Your message dated Sun, 28 Feb 2010 15:23:42 +0100
with message-id <1267367022.9111.1.ca...@gaia>
and subject line Re: Bug#571947: rkhunter gives false positives
has caused the Debian Bug report #571947,
regarding rkhunter gives false positives
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
571947: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=571947
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: rkhunter
Severity: normal



-- System Information:
Debian Release: squeeze/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'testing'), (500, 'stable')
Architecture: x86_64

Kernel: Linux 2.6.32-2-amd64 (SMP w/2 CPU cores)
Locale: lang=de...@euro, lc_ctype=de...@euro (charmap=ISO-8859-15)
Shell: /bin/sh linked to /bin/bash

Dear maintainer-team,

since some time I get the following messages/mails by rkhunter, which are
definetily no rootkits. I checked the relatedt files, which are all correct.
It would be nice, if you could tak an eye on it.

This is the message by rkhunter:

Warning: The command '/sbin/chkconfig' has been replaced by a script:
/sbin/chkconfig: a /usr/bin/perl script text executable
Warning: Checking for possible rootkit strings    [ Warning ]
         Found string 'hdparm' in file '/etc/init.d/.depend.boot'. Possible
rootkit: Xzibit Rootkit
         Found string 'hdparm' in file '/etc/init.d/bootlogd'. Possible
rootkit: Xzibit Rootkit
         Found string 'hdparm' in file '/etc/init.d/checkroot.sh'. Possible
rootkit: Xzibit Rootkit
         Found string 'hdparm' in file '/etc/init.d/hdparm'. Possible
rootkit: Xzibit Rootkit
Warning: Network TCP port 1524 is being used by /usr/sbin/portsentry.
Possible rootkit: Possible FreeBSD (FBRK) Rootkit backdoor
         Use the 'lsof -i' or 'netstat -an' command to check this.
Warning: Network TCP port 6667 is being used by /usr/sbin/portsentry.
Possible rootkit: Possible rogue IRC bot
         Use the 'lsof -i' or 'netstat -an' command to check this.
Warning: Network TCP port 31337 is being used by /usr/sbin/portsentry.
Possible rootkit: Historical backdoor port
         Use the 'lsof -i' or 'netstat -an' command to check this.
Warning: Application 'openssl', version '0.9.8k', is out of date, and
possibly a security risk.

One or more warnings have been found while checking the system.
Please check the log file (/var/log/rkhunter.log)

I am running portsentry, and hdparm is also installed. Please ask me for
more tests.


Best regards

Hans-J. Ullrich



--- End Message ---
--- Begin Message ---
Hi,


Le dimanche 28 février 2010 à 14:42 +0100, Hans-J. Ullrich a écrit :
[...]
> 
> Dear maintainer-team,
> 
> since some time I get the following messages/mails by rkhunter, which are
> definetily no rootkits. I checked the relatedt files, which are all correct.
> It would be nice, if you could tak an eye on it.
> 
> This is the message by rkhunter:
[...]
> 
> I am running portsentry, and hdparm is also installed. Please ask me for
> more tests.

while these may be false-positives on your systems, they might be real
problems on other systems. You have to configure rkhunter
using /etc/rkhunter.conf file to stop these warnings in your particular
case.

I hence close this bug which is not one.

Cheers,
Julien



--- End Message ---

Reply via email to