Re: Regarding latest Linux level 3 rootkits

2016-09-07 Thread jdow
Is the part of the filesystem which handles links in kernel space or user space? That would make a great deal of difference as this rootkit tool evolves. At the moment it appears it is "contagious", meaning Linux installs can become infected. Since the files that are infected are shared system

Re: Regarding latest Linux level 3 rootkits

2016-09-07 Thread Steven J. Yellin
Are rpm and the check sum tools statically linked? If not, hiding copies of them might not help if libraries have been compromised. But busybox is statically linked, and it looks like it can be easily used to replace most commands used to check security without going to the trouble of

Re: Re: Regarding latest Linux level 3 rootkits

2016-09-07 Thread jdow
Very simple. This rootkit works in user space by coopting glib. The new versions tell the user what the rootkit wants it to use. It creates a new user. This user has an exception to the /etc/passwd etc rewrites on the way to the application from the disk. The files involved do not show up in

Re: Regarding latest Linux level 3 rootkits

2016-09-07 Thread prmarino1
Jdow, Why are you looking at that‎ for root kit prevention? It's a very old fashion approach, I would use the RPM's verify  command or one of the many filesystem  check sum tools available for that instead. Either one can tell you if ‎any critical binaries or libraries have been compromised

Re: Re: Regarding latest Linux level 3 rootkits

2016-09-07 Thread jdow
Thanks Vladimir, I suppose I could pull the necessary files from busybox as a means of keeping a more generic Linux system in security trim. This might be a useful tool set to suggest upstream. A statically linked less would allow a quick check for the hidden user. A statically linked

"spinning" application startup MATE

2016-09-07 Thread Yasha Karant
This query may belong on some MATE list, but I cannot find one. On my office SL 7 with MATE, when I click on a GUI application, as it is loading, the GUI arrow becomes a spinning dots-within-circle. On my nominally same environment on my laptop, it does not, and there is no "starting"

Re: Regarding latest Linux level 3 rootkits

2016-09-07 Thread Vladimir Mosgalin
Hi jdow! On 2016.09.06 at 23:15:04 -0700, jdow wrote next: > Is there any source for a VI, VIM, or even EMACS that has all libraries > compiled into it statically? That would make monitoring for the rootkit much > easier. The same could be said for utilities such as chkrootkit. With > compiled

Regarding latest Linux level 3 rootkits

2016-09-07 Thread jdow
Is there any source for a VI, VIM, or even EMACS that has all libraries compiled into it statically? That would make monitoring for the rootkit much easier. The same could be said for utilities such as chkrootkit. With compiled in static libraries these level three (user space) rootkits can't