F21: infection reported by "chkrootkit".

Michael Schwendt mschwendt at gmail.com
Tue Jul 28 21:18:04 UTC 2015


On Tue, 28 Jul 2015 13:55:47 -0400, William wrote:

>  > By examining the chkrootkit program -- it's a large shell script with
>  > a few helper tools -- to understand what it does to perform a check.
> 
> ???  I looked at that long sh script.  It didn't help.  I don't see how 
> knowing that chkrootkit uses "netstat" to check a port tells me whether 
> or not I have a real problem.  I don't understand what it means that a 
> port is infected.  I am a home user stuck doing his own sysadmin and 
> security with no training or experience in these things.

Then I suggest that chkrootkit is not the right tool for you.
You may ask why not? Because it's far from bullet-proof. Some of
the checks it implements are no longer relevant these days. There
are more modern rootkits that are not covered by chkrootkit. There is
no database that would receive online updates to cover more known
rootkits or vulnerabilities. It only tries to check for a few modifications
it is aware of. Other checks are not safe but only very rudimentary.
Even normal processes running on a normal installation can confuse
it. For a very long time, it considered the main systemd executable as
infected, and nobody did anything about that. Everywhere you could
meet Fedora users asking whether Fedora's official ISO images would be
infected. There's a README file included in the Fedora package, which
comments on the problem of "false positives". It's the user's
responsibility to verify what chkrootkit reports, because it's not
safe to rely on it. Running chkrootkit gives a false sense of
security. If it doesn't find anything (and rkhunter not either), you
could still be affected by something it cannot find (even an only
slightly modified rootkit) or by some other vulnerability it doesn't
even check for.

There are multiple layers of security. As a home user, better focus on
tools that protect your machine from intruders. Such as a firewall,
SELinux, security relevant updates, not running things as superuser
root, and deciding carefully what to install or execute on your machine.


More information about the users mailing list