On Thu, Oct 05, 2000 at 12:56:26PM -0400, Isaiah Weiner wrote:
> On Thu, Oct 05, 2000 at 06:07:36AM -0600, Brian Schneider wrote:
> > Any other things I should be looking for?
> 
>     rpm -Va would probably be useful.  Particularly for util-linux,
> net-tools, procps, and fileutils.
> 

Here's the output of
  rpm -V util-linux net-tools procps fileutils

S.5....T c /etc/pam.d/login
..?.....   /usr/bin/chfn
..?.....   /usr/bin/chsh
..?.....   /usr/bin/newgrp
.......T   /usr/lib/getopt/parse.bash
.......T   /usr/lib/getopt/parse.tcsh
.......T   /usr/lib/getopt/test.bash
.......T   /usr/lib/getopt/test.tcsh
.......T   /usr/lib/more.help

All of those come from the util-linux package.

I was wondering if I might be possible that no-one actually gained
access to the system, but instead I installed a (malicious) package
that added the line.

If so, how could I find the offending package?  Most importantly, how
can I prevent this from happening again.  I have ipchains set up now
(I didn't until a little while ago), and when I go to www.grc.com it
shows me to be completely stealth.  Of course, that wouldn't help
protect me against trojans, but no-one could have been connecting via
port 9704.

I have ordered RH 7.0 from www.lsl.com, and I plan on installing it
as soon as it gets here.

Thanks,
Ben Logan



_______________________________________________
Redhat-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/redhat-list

Reply via email to