Keith Lofstrom wrote:
I run ancient old tripwire nightly on my machines.  Yesterday, on my
SL4.4 laptop, I noticed that it had found changes to  "vipw" and other
security related tools.  A little concerned, I downloaded the latest
version of chkrootkit and ran it, finding no problems.  I looked at
the yum logs, and found a yum upgrade of util-linux from sl-errata;
the header file shows that vipw and the rest had been updated.
False alarm, I am probably safe, assuming no outbreak of evil at SL or
TUV (=The Upstream Vendor in North Carolina, for those wondering).

I will react similarly if I ever see a change of the basic security
programs.  Is there anything else a prudent administrator should check
when these programs change?
Keith


If you are running tripwire on a machine, you should always check your yum update logs before your tripwire logs, so you aren't surprised.

Also, you should be subscribed to [EMAIL PROTECTED] so that you get the announcements about the released security errata. We do occasionally put out an errata without an e-mail, but not too often, and the users usually help remind us if this happens.

To see which files can potentially change
  rpm -ql <package>
If you are seeing a changed file outside of those files listed you need to check scripts.
  rpm -q --scripts --triggers <package>

Troy
--
__________________________________________________
Troy Dawson  [EMAIL PROTECTED]  (630)840-6468
Fermilab  ComputingDivision/LCSI/CSI DSS Group
__________________________________________________

Reply via email to