On Thursday 14 Apr 2016 19:43:52 Jonathan Callen wrote:
> On 04/14/2016 04:40 PM, Mick wrote:
> > I run chkrootkit and rkhunter on my laptop.  Suddenly I noticed
> > this in my logs:
> > 
> > /dev/shm/pulse-shm-2469735543 Possible Linux/Ebury - Operation
> > Windigo installetd
> > 
> > 
> > Then, rkhunter shows:
> > 
> > [20:23:27] Info: Starting test name 'filesystem' [20:23:27]
> > Performing filesystem checks [20:23:27] Info: SCAN_MODE_DEV set to
> > 'THOROUGH' [20:23:33]   Checking /dev for suspicious file types
> > [ Warning ] [20:23:33] Warning: Suspicious file types found in
> > /dev: [20:23:33]          /dev/shm/pulse-shm-3629268439: data
> > [20:23:33]          /dev/shm/pulse-shm-2350047684: data [20:23:33]
> > /dev/shm/pulse-shm-2469735543: data [20:23:33]
> > /dev/shm/pulse-shm-2586322339: data [20:23:33]
> > /dev/shm/PostgreSQL.1804289383: data [20:23:34]   Checking for
> > hidden files and directories       [ Warning ] [20:23:34] Warning:
> > Hidden file found: /usr/share/man/man5/.k5login.5: troff or
> > preprocessor input, ASCII text [20:23:34] Warning: Hidden file
> > found: /usr/share/man/man5/.k5identity.5: troff or preprocessor
> > input, ASCII text [20:23:34]   Checking for missing log files
> > [ Skipped ] [20:23:34]   Checking for empty log files
> > [ Skipped ]
> > 
> > 
> > I search on the errors and I arrive at this FAQs:
> > 
> > https://www.cert-bund.de/ebury-faq
> > 
> > 
> > Now, I frequently login using ssh into remote servers and LAN boxen
> > for admin purposes, but not the other way around.  Is my box
> > compromised, or is this two false positives in a row?
> > 
> > Are you getting anything similar on your systems?
> 
> The hidden files in /usr/share/man/man5 are definitely false
> positives.  These two files are installed by the app-crypt/mit-krb5
> package, and just allow you to type "man .k5login" instead of "man
> k5login" to get information about the ".k5login" file that you might
> want to create in your home directory (if using kerberos).

OK, this is good to know.  I am not using kerberos, but I think it was 
installed as a dependency somewhere along the line.


> The files in /dev/shm/ named "pulse-shm-*" are created by pulseaudio
> for its own internal use; applications that may play sounds through
> pulseaudio will create those files automatically.
> 
> The PostgreSQL.* file is likely also a false positive, but I do not
> have postgres installed here to confirm.

I can't think why postgres would be flagged up as a warning.  I use it for 
akonadi instead of mysql, so unless some email ran a sql injection on it via 
kmail and got access to the database, it should be OK.

All these chrootkit and rkhunter warnings are about /dev/shm/ files/devices.  
Is there something that makes anything in /dev/shm inherently suspicious?

-- 
Regards,
Mick

Attachment: signature.asc
Description: This is a digitally signed message part.

Reply via email to