Re: systemd rootkit signature?

2014-11-08 Thread Michael Biebl
Am 08.11.2014 um 21:16 schrieb Hans:
> 
>> So I'm not sure if it should be reported as a bug or not.
>>
>> Maybe a documentation bug?
> 
> Sorry guys, I just forgot about the bugreport. As I wrote in my earlier 
> message, I do not believe, that systemd has really a rootkit signature.
> 
> I also already mentioned, that I think, it is just a false positiv. However, 
> I 
> found it worth, that other people should this information get, too, so they 
> might not get into trouble.
> 
> Additionally I checked my system with other rootkit searchers, like rkhunter, 
> which is also checking for "suckit".
> 
> It is just a false positiv, and I think, no onwe should worry about. If I 
> would have meant, this means trouble, I would have created a bugreport.

It's a valid bug, and apparently already reported as
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=740898

-- 
Why is it that all of the instruments seeking intelligent life in the
universe are pointed away from Earth?



signature.asc
Description: OpenPGP digital signature


Re: systemd rootkit signature?

2014-11-08 Thread Hans

> So I'm not sure if it should be reported as a bug or not.
> 
> Maybe a documentation bug?

Sorry guys, I just forgot about the bugreport. As I wrote in my earlier 
message, I do not believe, that systemd has really a rootkit signature.

I also already mentioned, that I think, it is just a false positiv. However, I 
found it worth, that other people should this information get, too, so they 
might not get into trouble.

Additionally I checked my system with other rootkit searchers, like rkhunter, 
which is also checking for "suckit".

It is just a false positiv, and I think, no onwe should worry about. If I 
would have meant, this means trouble, I would have created a bugreport.

But I did not!

So, for my opinion, this case could be closed. 

But thank you for all your feedback.

Best regards

Hans


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/4952663.jAVMoX2eTK@protheus2



Re: systemd rootkit signature?

2014-11-08 Thread Joel Rees
On Sat, Nov 8, 2014 at 8:03 PM, Jonathan de Boyne Pollard
 wrote:
> Psst!

No need to whisper dramatically.

> Listmaster!

No need to disturb the listmaster, I'm sure.

The list members, maybe:

   *** HEY LIST!! ***
   THIS IS NOT EVIDENCE THAT SYSTEMD IS AN EVIL MALWARE VECTOR!

That better?

> This was a false positive.

And all two of the participants in this thread acknowledged that probability.

But if I had hit the warning, I'd look for proof, just to be safe and
to be sure I'd not hit a man in the middle.

(Man in the middle being basically the only way such an attack could
be pulled off.)

If I can put a jessie/systemd system together, I'd be curious enough
to load checkrootkit and look for all the false positives, this one in
particular. Until then, maybe you'd care to more specific?

Specifically, it would be nice for you to assert that you've actually

(1) installed checkrootkit and got the warning on a known-good system, and
(2) then modified a copy of the binary (making it inoperable of
course, which is why you do it to a copy) to remove the editing of the
HOME environment variable, and
(3) ascertained that the warning went away.

> M. Ullrich has actually hit
> a genuine, and widely reported, bug in checkrootkit. Ironically, that's a
> false positive too.
>
> Hans Ullrich:
>>
>> Searching for Suckitrootkit... Warning:
>
>> /sbin/init INFECTED
>>
>> The file "/sbin/init" is a symlink to "/lib/systemd/systemd", that
>> means, that systemd is infected.
>
> No it does not.  It means that checkrootkit's test for the Suckit rootkit is
> extremely simplistic to the point of being downright incorrect.  If you
> look, you'll find that it's looking for the string "HOME" in the binary, and
> that's it.  systemd sets various environment variables when it starts
> services, and HOME is one of them.  (See the list on the systemd.exec(5)
> manual page.)  So it quite legitimately has the string "HOME" in the program
> file image found at "/sbin/init" and matches the erroneous test.

For what it's worth, my memory of checkrootkit (I installed it when I
was using Fedora some years ago, never took it seriously.) is that it
would have throw a warning simply about something like init being a
link instead of an actually executable.

It's looking for theoretically suspicious behaviors. It generates a
lot of warnings, by design. Users of the package are supposed to have
an idea of whether the things it warns about are real issues or not.

> If you
> have any contact with the developers of checkrootkit, you might want to make
> them aware that this bug has hit two init programs (system and upstart both
> have the string "HOME" in their program images, because they both do this.)
> and has spawned quite a lot of bug reports over at least four years with no
> apparent fix to checkrootkit.  Here are some:
>
> * https://bugs.launchpad.net/ubuntu/+source/upstart/+bug/676376
> * https://bugs.launchpad.net/ubuntu/+source/chkrootkit/+bug/454566
> * https://bugzilla.novell.com/show_bug.cgi?id=731281
> * https://bugzilla.redhat.com/show_bug.cgi?id=636231
> * https://bugzilla.redhat.com/show_bug.cgi?id=743696
> * https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=740898

Contrary to what I said further up in the thread, my guess is that the
only way to fix those kinds of bugs is to set up a built-in,
pre-configured white-list, and a built-in, pre-configured white-list
might constitute a vulnerability, according to their design.

So I'm not sure if it should be reported as a bug or not.

Maybe a documentation bug?

-- 
Joel Rees

Be careful when you look at conspiracy.
Look first in your own heart,
and ask yourself if you are not your own worst enemy.
Arm yourself with knowledge of yourself, as well.


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
https://lists.debian.org/caar43in4wnm8kmd6t+twnqxwzmpbfsx6epkibxyhklpoh10...@mail.gmail.com



Re: systemd rootkit signature?

2014-11-08 Thread Jonathan de Boyne Pollard
Psst!  Listmaster!  This was a false positive.  M. Ullrich has actually 
hit a genuine, and widely reported, bug in checkrootkit. Ironically, 
that's a false positive too.


Hans Ullrich:

Searching for Suckitrootkit... Warning:

> /sbin/init INFECTED
>
> The file "/sbin/init" is a symlink to "/lib/systemd/systemd", that
> means, that systemd is infected.

No it does not.  It means that checkrootkit's test for the Suckit 
rootkit is extremely simplistic to the point of being downright 
incorrect.  If you look, you'll find that it's looking for the string 
"HOME" in the binary, and that's it.  systemd sets various environment 
variables when it starts services, and HOME is one of them.  (See the 
list on the systemd.exec(5) manual page.)  So it quite legitimately has 
the string "HOME" in the program file image found at "/sbin/init" and 
matches the erroneous test.  If you have any contact with the developers 
of checkrootkit, you might want to make them aware that this bug has hit 
two init programs (system and upstart both have the string "HOME" in 
their program images, because they both do this.) and has spawned quite 
a lot of bug reports over at least four years with no apparent fix to 
checkrootkit.  Here are some:


* https://bugs.launchpad.net/ubuntu/+source/upstart/+bug/676376
* https://bugs.launchpad.net/ubuntu/+source/chkrootkit/+bug/454566
* https://bugzilla.novell.com/show_bug.cgi?id=731281
* https://bugzilla.redhat.com/show_bug.cgi?id=636231
* https://bugzilla.redhat.com/show_bug.cgi?id=743696
* https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=740898


--
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Archive: https://lists.debian.org/545df89e.4040...@ntlworld.com



systemd rootkit signature?

2014-11-02 Thread Hans
Hello all,

I get the following warning from checkrootkit on debian/jessie:



.
.
Searching for Suckit rootkit... Warning: 
/sbin/init INFECTED
.
.
.

The file "/sbin/init" is a symlink to "/lib/systemd/systemd", that means, that 
systemd is infected. 

However, I do not think it is a rootkit at all, but it got its signature.
Maybe either systemd should be changed or checkrootkit.

Can someone confirm this bug?

Best 

Hans


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/2549216.jhzyGpmzyp@protheus7