On Thu, 2010-11-04 at 02:38 -0700, Al Varnell wrote:

> >
> Haven't noticed any Mac OS X testers report in, so I figured I'd better
> spend the day getting you something.
> 
Okay, many thanks for this.

> 
> 5) --propupd went well, which is a change from the previous versions where I
> had to use STAT_CMD=BUILTIN to get it to do anything.
> 
Yes, the OS X 'stat' command output was incompatible with previous RKH
versions, so the builtin perl module had to be used. That was fixed for
this next release.

> 6) --enable all completed with the following warnings:
> 
> [18:02:33] Performing file properties checks
> [18:04:08]   /usr/bin/fuser                                  [ Warning ]
> [18:04:09] Warning: The command '/usr/bin/fuser' has been replaced by a
> script: /usr/bin/fuser: perl script text executable
> 
> [18:05:33]   /usr/bin/whatis                                 [ Warning ]
> [18:05:34] Warning: The command '/usr/bin/whatis' has been replaced by a
> script: /usr/bin/whatis: Bourne shell script text executable
> 
> [18:08:07]   /sbin/nologin                                   [ Warning ]
> [18:08:08] Warning: The command '/sbin/nologin' has been replaced by a
> script: /sbin/nologin: Bourne shell script text executable
> 
Those look similar to what I had on my Mac, so can probably be
whitelisted.


> [18:10:05] Checking for rootkits...
> [18:10:05] Performing check of known rootkit files and directories
> [18:11:46] Checking for Dica-Kit Rootkit...
> [18:11:56]   Checking for file '/etc/sshd_config'            [ Found ]
> [18:12:01] Warning: Dica-Kit Rootkit                         [ Warning ]
> [18:12:02]          File '/etc/sshd_config' found
> 
Yes, this has to be whitelisted for OS X. As the config file suggests
though, you ma then want to add the file to the list of monitored files,
just to ensure no-one does change it without your knowledge.
(add USER_FILEPROP_FILES_DIRS=/etc/sshd_config)


> [18:22:44]   Performing check for possible rootkit strings
> [18:22:44] Info: Using system startup paths: /etc/rc.d /etc/rc.local
> /usr/local/etc/rc.d /usr/local/etc/rc.local /etc/conf.d/local.start
> /etc/init.d /etc/inittab
> [18:22:44] Warning: Checking for possible rootkit strings    [ Warning ]
> [18:22:45]          No system startup files found.
> 
I used:

   STARTUP_PATHS="/etc/rc.* /etc/*.rc"

> [18:22:47] Info: Starting test name 'running_procs'
> [18:25:42]   Checking running processes for suspicious files [ Warning ]
> [18:25:43] Warning: The following processes are using suspicious files:
> [18:25:44]          Command: launchd
> [18:25:45]            UID: 0    PID: 1
> [18:25:46]            Pathname: /private/etc/crontab
> [18:25:47]            Possible Rootkit: Unknown rootkit
> 
I suspect this is a false-positive. RKH just happened to catch launchd
using crontab. On my Linux box it is probably possible for RKH to catch
'crond' catching the same crontab file. If you re-run RKH the warning
may well have disappeared.


> 
> [19:03:47]   Checking if SSH root access is allowed          [ Warning ]
> [19:03:48] Warning: The SSH configuration option 'PermitRootLogin' has not
> been set.
>            The default value may be 'yes', to allow root access.
> 
On OS X the default is to allow root access. So I would suggest either
setting 'PermitRootLogin' to no, or without-password, unless you
actually want to allow root access.


> 
> [19:04:18] Checking application versions...
> [19:04:26]   Checking version of Bind DNS                    [ Warning ]
> [19:04:27] Warning: Application 'named', version '9.4.3-P3', is out of date,
> and possibly a security risk.
> 
I'm not a great fan of the 'apps' test, so I am not surprised by
warnings here.


> And noted the following skipped:
> 
Most of these seem to be perfectly valid in being skipped for OS X. 

> 
> [18:26:05] Info: Starting test name 'os_specific'
> [18:26:06] Performing Darwin specific checks                 [ Skipped ]
> [18:26:06] Info: No specific tests available
> 
correct, there are no OS X specific tests. You can either just ignore
this, or disable the 'os_specific' test in the config file if you want.

> 
> 9) You previously told us that RKH does not support any package manager for
> OSX, so I'm guessing I can ignore this one.
> 
Correct. I took a look at this but as far as I remember could find
nothing suitable.

> I've got some thoughts, but I'll save them for a separate email and if I run
> into any further issues I'll be back.
> 
Okay, thanks again.

One point, OS X does not have a /dev/shm directory, so if you want to
run 'suspscan', then I tend to use:

   SUSPSCAN_TEMP=/var/lib/rkhunter/tmp

or wherever your TMPDIR in /etc/rkhunter.conf points to. The test won't
run as fast as using /dev/shm, but at least it should work and any
dumped files (there shouldn't be any!) will be secure there.




John.

-- 
John Horne, University of Plymouth, UK
Tel: +44 (0)1752 587287    Fax: +44 (0)1752 587001


------------------------------------------------------------------------------
The Next 800 Companies to Lead America's Growth: New Video Whitepaper
David G. Thomson, author of the best-selling book "Blueprint to a 
Billion" shares his insights and actions to help propel your 
business during the next growth cycle. Listen Now!
http://p.sf.net/sfu/SAP-dev2dev
_______________________________________________
Rkhunter-users mailing list
Rkhunter-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/rkhunter-users

Reply via email to