On Sat, 24 Sep 2011 06:04:24 +0200 John Connor <judge...@gmx.de> 
wrote:

The most important thing is to know about what you run and Rootkit 
Hunter (RKH) is no exception. RKH comes with documentation (README, 
FAQ, manual page), there's common examples in rkhunter.conf and 
users have contributed to the rkhunter-users mailing list archives. 
So by reading the documentation and the configuration file and 
searching the archives you will find out *how* to check and 
confirmation *if* it is a false positive or not.


>[12:15:21] Warning: The command '(..)' has been replaced by a 
script: (..) script text executable

Common false positive: check by listing contents of a trusted 
package from a trusted distribution repository. See SCRIPTWHITELIST 
examples in rkhunter.conf.


>[12:16:21] Warning: Suspicious file types found in /dev:

Common false positive. More difficult to get verification right 
because file naming scheme may be a ruse. (Would require near real-
time checking of opened files using say inotify, loggedfs or 
auditd.) Find examples, based on naming scheme, in rkhunter.conf, 
see ALLOWDEVFILE.


>[12:16:22] Warning: Application '(..)', version '(..)', is out of 
date, and possibly a security risk.

The application check is of no use where distro's backport fixes 
and can be disabled if you (auto)update your OS timely.


Regards,
unSpawn
---


------------------------------------------------------------------------------
All of the data generated in your IT infrastructure is seriously valuable.
Why? It contains a definitive record of application performance, security
threats, fraudulent activity, and more. Splunk takes this data and makes
sense of it. IT sense. And common sense.
http://p.sf.net/sfu/splunk-d2dcopy2
_______________________________________________
Rkhunter-users mailing list
Rkhunter-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/rkhunter-users

Reply via email to