Re: [arch-general] rkhunter found possible rootkit

2019-08-20 Thread brent s.
On 8/20/19 5:58 AM, Oliver Jaksch via arch-general wrote:
> On Tuesday, 20 August 2019, 10:15:58 CEST you wrote:
>> Am 20.08.19 um 10:00 schrieb Filipe Laíns via arch-general:
>>> On Tue, 2019-08-20 at 08:33 +0200, Oliver Jaksch via arch-general wrote:
 I let rkhunter running around once a week. There were nothing since many
 months. But today it's report complains about */lib64/libkeyutils.so.1.9*
 and therefore other tools they're (seems to be) using this SO.
>>
>> ...
>>
>>> No, those libraries are used for key manipulation, that's why rkhunter
>>> thinks that they might be sniffer.
>>
>> In this particular case the filename was apparently used by a rootkit in
>>  2013 and it was blacklisted. Now the legitimate owner of the
>> libkeyutils filenames has reached the blacklisted version number. I
>> don't know which of the two possibilities it is in your case.
>>
>> https://bugs.archlinux.org/task/63369
>> https://www.webhostingtalk.com/showthread.php?t=1235797
> 
> Thanks to all. I think the URLs Filipe has posted are the most expressive 
> part. Let's hope that this really is a false alarm coming from the past.
> -
> Oliver
> 


If you're in doubt, you can also try chkrootkit. When dealing with
potential false positives, it sometimes helps to try more than one tool.

-- 
brent saner
https://square-r00t.net/
GPG info: https://square-r00t.net/gpg-info



signature.asc
Description: OpenPGP digital signature


Re: [arch-general] espeakup

2019-08-20 Thread Ram Kumar via arch-general
Ofcourse.. windows is dumb when we compare to linux.. thats y microsoft is
trying to make their useless os useful by fitting linux kernels to it

On Tue, 20 Aug 2019, 11:27 am Jack Wu,  wrote:

> Windows is not so smart.
>
> Let's use Linux instead. XD
>
> Bjoern Franke via arch-general 於 2019/8/19 下午8:31 寫道:
> > Am 18.08.19 um 16:24 schrieb adérito :
> >> I have a question: how do I put the espeakup already tried to restart
> espeeakup when putting arch linux in Portuguese and can not make espeakup
> speak in Portuguese has another way to do this?
> >>
> >> Enviado do Correio para Windows 10
> >>
> > Please tell your Windows 10 not to create new threads.
>
> --
> Best regards!
>
> From Jack Wu 
> GPG Fingerprint: 0A5B AD44 5D80 C1CC
> Website: https://origincode.me/
>
>
>


Re: [arch-general] rkhunter found possible rootkit

2019-08-20 Thread Oliver Jaksch via arch-general
On Tuesday, 20 August 2019, 10:15:58 CEST you wrote:
> Am 20.08.19 um 10:00 schrieb Filipe Laíns via arch-general:
> > On Tue, 2019-08-20 at 08:33 +0200, Oliver Jaksch via arch-general wrote:
> >> I let rkhunter running around once a week. There were nothing since many
> >> months. But today it's report complains about */lib64/libkeyutils.so.1.9*
> >> and therefore other tools they're (seems to be) using this SO.
> 
> ...
> 
> > No, those libraries are used for key manipulation, that's why rkhunter
> > thinks that they might be sniffer.
> 
> In this particular case the filename was apparently used by a rootkit in
>  2013 and it was blacklisted. Now the legitimate owner of the
> libkeyutils filenames has reached the blacklisted version number. I
> don't know which of the two possibilities it is in your case.
> 
> https://bugs.archlinux.org/task/63369
> https://www.webhostingtalk.com/showthread.php?t=1235797

Thanks to all. I think the URLs Filipe has posted are the most expressive 
part. Let's hope that this really is a false alarm coming from the past.
-
Oliver


Re: [arch-general] rkhunter found possible rootkit

2019-08-20 Thread Filipe Laíns via arch-general
On Tue, 2019-08-20 at 09:31 +0100, Filipe Laíns via arch-general wrote:
> so I can give any guarantees
*I can't

Filipe Laíns
3DCE 51D6 0930 EBA4 7858 BA41 46F6 33CB B0EB 4BF2


signature.asc
Description: This is a digitally signed message part


Re: [arch-general] rkhunter found possible rootkit

2019-08-20 Thread Filipe Laíns via arch-general
On Tue, 2019-08-20 at 10:15 +0200, ProgAndy wrote:
> Am 20.08.19 um 10:00 schrieb Filipe Laíns via arch-general:
> > On Tue, 2019-08-20 at 08:33 +0200, Oliver Jaksch via arch-general
> > wrote:
> > > I let rkhunter running around once a week. There were nothing
> > > since many 
> > > months. But today it's report complains about
> > > */lib64/libkeyutils.so.1.9* and 
> > > therefore other tools they're (seems to be) using this SO.
> > > 
> ...
> > No, those libraries are used for key manipulation, that's why
> > rkhunter
> > thinks that they might be sniffer.
> > 
> In this particular case the filename was apparently used by a rootkit
> in
>  2013 and it was blacklisted. Now the legitimate owner of the
> libkeyutils filenames has reached the blacklisted version number. I
> don't know which of the two possibilities it is in your case.
> 
> https://bugs.archlinux.org/task/63369
> https://www.webhostingtalk.com/showthread.php?t=1235797

The sources are pulled from [1] and signed by David Howells (Redhat) so
I am pretty inclined to trust them. I did not, however, inspect the
sources myself so I can give any guarantees.

[1] https://git.kernel.org/pub/scm/linux/kernel/git/dhowells/keyutils.git 

Thanks,
Filipe Laíns
3DCE 51D6 0930 EBA4 7858 BA41 46F6 33CB B0EB 4BF2


signature.asc
Description: This is a digitally signed message part


Re: [arch-general] rkhunter found possible rootkit

2019-08-20 Thread Ralf Mardorf via arch-general
On Tue, 20 Aug 2019 10:15:58 +0200, ProgAndy wrote:
>Am 20.08.19 um 10:00 schrieb Filipe Laíns via arch-general:
>> On Tue, 2019-08-20 at 08:33 +0200, Oliver Jaksch wrote:  
>> No, those libraries are used for key manipulation, that's why
>> rkhunter thinks that they might be sniffer.
>>   
>In this particular case the filename was apparently used by a rootkit
>in 2013

If a file name should be a pointer to a {false,} positive, it still not
necessarily is a {false,} positive. rkhunter probably not only checks
file names, if at all.

https://sourceforge.net/projects/rkhunter/support


Re: [arch-general] rkhunter found possible rootkit

2019-08-20 Thread ProgAndy
Am 20.08.19 um 10:00 schrieb Filipe Laíns via arch-general:
> On Tue, 2019-08-20 at 08:33 +0200, Oliver Jaksch via arch-general wrote:
>> I let rkhunter running around once a week. There were nothing since many 
>> months. But today it's report complains about */lib64/libkeyutils.so.1.9* 
>> and 
>> therefore other tools they're (seems to be) using this SO.
>>
...
> No, those libraries are used for key manipulation, that's why rkhunter
> thinks that they might be sniffer.
> 
In this particular case the filename was apparently used by a rootkit in
 2013 and it was blacklisted. Now the legitimate owner of the
libkeyutils filenames has reached the blacklisted version number. I
don't know which of the two possibilities it is in your case.

https://bugs.archlinux.org/task/63369
https://www.webhostingtalk.com/showthread.php?t=1235797


Re: [arch-general] rkhunter found possible rootkit

2019-08-20 Thread Ralf Mardorf via arch-general
On Tue, 2019-08-20 at 08:33 +0200, Oliver Jaksch via arch-general wrote:
> Should I/we be worried?

Hi Oliver,

if something conceivably harmful is found you should take care. If you
wouldn't, then why are you using it at all? If proprietary software
would detect something you suspect to be a false positive, you would
attach it to a report you sent to the company, usually those companies
provide an internet channel to upload such files. The company then would
take a look at those files.

Nobody can tell from the warnings you get when running rkhunter, if it
is or isn't a false positive. Even if those files are known to be false
positives when not being infected, they still could be infected on your
machine.

Probably rkhunter provides support channels, too.

[rocketmouse@archlinux ~]$ pacman -Si rkhunter | grep URL
URL : http://rkhunter.sourceforge.net/

How about https://sourceforge.net/p/rkhunter/_list/tickets ?

Regards,
Ralf


Re: [arch-general] rkhunter found possible rootkit

2019-08-20 Thread Filipe Laíns via arch-general
On Tue, 2019-08-20 at 08:33 +0200, Oliver Jaksch via arch-general wrote:
> I let rkhunter running around once a week. There were nothing since many 
> months. But today it's report complains about */lib64/libkeyutils.so.1.9* and 
> therefore other tools they're (seems to be) using this SO.
> 
> The SO matches the one from 'core/keyutils 1.6.1-1' in size and hash.
> I've uploaded the SO to some "we scan it all" AV sites, but none of them 
> found 
> anything.
> 
> Should I/we be worried? Anything else I can do? Or is this a false alarm and 
> the warnings are somewhat okay because of the package's nature ("Linux Key 
> Management Utilities")?
> 
> 
> > Warning: Checking for possible rootkit files and directories [ Warning ]
> > Found file '/lib/libkeyutils.so.1.9'. Possible rootkit: Sniffer component 
> > Found file '/lib64/libkeyutils.so.1.9'. Possible rootkit: Sniffer component
> > Found file '/usr/lib/libkeyutils.so.1.9'. Possible rootkit: Sniffer 
> component
> > Found file '/usr/lib64/libkeyutils.so.1.9'. Possible
> > rootkit: Sniffer component
> > 
> > Warning: The following processes are using suspicious files:
> >  Command: (sd-pam)
> >UID: 1001PID: 944
> >Pathname:
> >Possible Rootkit: Spam tool component
> >  Command: NetworkManager
> >UID: 0PID: 381
> >Pathname:
> >Possible Rootkit: Spam tool component
> >  Command: NetworkManager
> >UID: 385PID: 381
> >Pathname: 3166425
> >Possible Rootkit: Spam tool component
> >  Command: NetworkManager
> >UID: 387PID: 381
> >Pathname: 3166425
> >Possible Rootkit: Spam tool component
> >  Command: Xorg
> >UID: 0PID: 512
> >Pathname:
> >Possible Rootkit: Spam tool component
> > [...]

No, those libraries are used for key manipulation, that's why rkhunter
thinks that they might be sniffer.

If you are worried you can check the sources.
https://git.archlinux.org/svntogit/packages.git/tree/trunk/PKGBUILD?h=packages/keyutils

Filipe Laíns
3DCE 51D6 0930 EBA4 7858 BA41 46F6 33CB B0EB 4BF2


signature.asc
Description: This is a digitally signed message part