On Tuesday, 2006-09-26 at 00:03:30 -0700, Debian Bug Tracking System wrote:

> Their explanation is attached below.  If this explanation is
> unsatisfactory and you have not received a better one in a separate
> message then please contact Manoj Srivastava <[EMAIL PROTECTED]> by replying
> to this email.

>         The obviously right thing to do here is to fix a naively
>  simple rootkit checker. Doing security by file names is seriously
>  broken.

The right thing to do is not to use pathes that are known to be used by
malware. Deliberately triggering rootkit scanners is B.A.D.

You are confusing security measures with detection. Running a rootkit
scanner is a means of intrusion detection. It should detect any sign of
suspicious activity. This does not provide any security for the system
because it will only trigger too late. Securing a system means trying to
prevent intruders from entering, or if they do enter, from tampering
with the system. A rootkit scanner cannot do that.

Try not to make intrusion detection harder than necessary. chkrootkit
can be updated to test for a flex executable and *assume* that the
library in question belongs to it. But it would also test for the
version of the flex binary and incorporate knowledge about the versions
of flex and their library pathes.

Don't you think it would be easier and more robust not to use such a
path at all?

Lupe Christoph
-- 
| You know we're sitting on four million pounds of fuel, one nuclear     |
| weapon and a thing that has 270,000 moving parts built by the lowest   |
| bidder. Makes you feel good, doesn't it?                               |
| Rockhound in "Armageddon", 1998, about the Space Shuttle               |


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to