John

Thanks for the accuracy and amount of feedback on the issue I raised earlier. 
But I confess I
should have read the man page more closely as you already mentioned the r 
switch.

I may get around to write a mini howto but to refresh....my last email stated 
"My objective is to
use a live cd that I can take to anyone's computer and have it scan a hard 
drive and not write to
disk"....and I should have said a linux desktop home user computer, so I stand 
corrected.

2) Agreed that if we are not using a database already established, we lose the 
scan power of file
integrity checks....but I strongly believe, that detecting a rootkit, in 
itself, is sufficient
proof of intrusion.

3) Some may suggest I am being complacent, but I believe most intruders will 
install a rootkit. If
not, certainly all script kiddies. So I agree that in NOT finding rootkits...I 
can not infer no
intrusion on another computer using re-mastered live cd. 

4) Some excerpts that I think relevant from log.

[19:19:04] Info: Command line is ./rkhunter -c -sk --configfile 
/rkh/etc/rkhunter.conf -r /z
(comment my symbolic link failed and I will try a re-master with a bashrc...RIP 
had none)

[19:19:04] Info: Using configuration file '/rkh/etc/rkhunter.conf'
(comment /rkh was new folder created in re-master and custom layout similar to 
gobolinux style)

[19:19:04] Info: Using '/z' as the root directory
(comment new /z created to allow hard drive partitions to be mounted on new 
tree)

[19:19:04] Info: Using '/rkh/var/lib/rkhunter/tmp' as the temporary directory
(comment I embedded a new conf file with this switch....Thanks John for 
pointing out RKH needs a
temp)

[19:19:04] Info: Found the 'diff' command: /usr/bin/diff
(comment uses the rip command not the hard drive proving no chroot....if 
intrusion has deleted or
modded these files....I will remain ignorant)

[19:19:05] Scanning for string /usr/lib/.../lsof             [ OK ]
(comment ditto)

[19:19:09] /z/bin/find                                       [ OK ]
(comment the z shows these scans are a success....woo hooo)

[19:19:22]   Checking for file '/z/dev/proc/fuckit/hax0r'    [ Not found ]
(comment.....testing rootkits is clearly a success as exhibited by this log and 
similar output)

[19:26:06] Info: Found hidden file '/z/usr/share/man/man1/..1.lzma': it is 
whitelisted.
(comment ....this has me stumped....I made no such config)

Overall I am very happy that the dev team allowed the rootdir and tmp switches 
that allow anyone
to remaster a live cd, or install into a ramdrive live cd your RKH and test for 
rootkits on a
linux computer.

I am resisting the urge to buy another carton of beer. heh heh

cheerio














      Make the switch to the world's best email. Get the new Yahoo!7 Mail now. 
www.yahoo7.com.au/worldsbestemail



-------------------------------------------------------------------------
SF.Net email is sponsored by: The Future of Linux Business White Paper
from Novell.  From the desktop to the data center, Linux is going
mainstream.  Let it simplify your IT future.
http://altfarm.mediaplex.com/ad/ck/8857-50307-18918-4
_______________________________________________
Rkhunter-users mailing list
Rkhunter-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/rkhunter-users

Reply via email to