Continuing with the scanning for rootkits articles, we now concentrate on installing and configuring rkhunter.
Rkhunter works in the same manner as chkrootkit (see this article) but rkhunter also scans for other types of exploits.
Neither rkhunter nor chkrootkit are necessarily better than the other and can easily be run at the same time, giving added defence measures and peace of mind.
As with chkrootkit, rkhunter is not an active defence method. It does not prevent exploits being placed on your Server but it will inform you if there is a suspected exploit. Again, as with chkrootkit, if you have been exploited then the only real option is to reinstall with a fresh image.
Log into your VPS and move to your sources directory:
Once there, download the latest version of rkhunter from the SourceForge download area:
Version 1.3.4 is the latest stable version but do check with the rkhunter home page to see if a newer version is available.
Being good sysadmins we want to check the md5sum of the downloaded file before extracting it and installing it.
To find the md5 signature of the downloaded package:
Compare this with the signature available on the Debian package list - ensure you look at the original download and not the diff patch that Debian applies.
Once happy, extract the source code:
tar xvfz rkhunter-1.3.4.tar.gz
Then move into the newly created directory:
To install the code, simply issue the following command:
sudo ./installer.sh --layout default --install
At the end of the install a message tells me:
Installation ready. See /usr/local/rkhunter/lib/rkhunter/docs for more information. Run 'rkhunter' (/usr/local/bin/rkhunter)
Have a read of the main docs:
sudo nano /usr/local/rkhunter/lib/rkhunter/docs/README
I won't go through what it says but do take some time to have a look and see what configurations are available.
First thing is to update the signatures and files rkhunter uses to detect anomalies:
sudo /usr/local/bin/rkhunter --update
Do that at least once or until you get an output like this:
Running updater... Mirrorfile /usr/local/rkhunter/lib/rkhunter/db/mirrors.dat rotated Using mirror http://rkhunter.sourceforge.net [DB] Mirror file : Up to date [DB] MD5 hashes system binaries : Up to date [DB] Operating System information : Up to date [DB] MD5 blacklisted tools/binaries : Up to date [DB] Known good program versions : Up to date [DB] Known bad program versions : Up to date
Let's run it:
sudo /usr/local/bin/rkhunter -c
This runs rkhunter in an interactive mode. In other words, when it gets to the end of a particular scan, you need to press 'enter' to continue.
My scan results were as follows:
---------------------------- Scan results ---------------------------- MD5 scan Scanned files: 0 Incorrect MD5 checksums: 0 File scan Scanned files: 342 Possible infected files: 0 Application scan Vulnerable applications: 0 Scanning took 79 seconds -----------------------------------------------------------------------
Which is nice.
If you want to skip the interactive mode, add the -sk option at the end:
sudo /usr/local/bin/rkhunter -c -sk
To see other options available for use:
You may have configured your Server in a way that triggers warnings from rkhunter.
Firstly, I would say listen to what it says and decide if you really need something that is a security risk and, secondly, if you do want the risk, there are ways of configuring rkhunter so it ignores certain things.
Here's an example. Let's say I ran rkhunter and got this message:
Checking for allowed root login... Watch out Root login possible. Possible risk! info: "PermitRootLogin yes" found in file /etc/ssh/sshd_config Hint: See logfile for more information about this issue
That's fairly straight forward: I left the "PermitRootLogin" set to "yes" in my sshd_config file.
Now we know that's a silly thing to do and it's a nice reminder to tighten up our SSH configuration.
But let's say we do want to enable root logins via SSH but don't want a warning every time we run rkhunter.
Enter /usr/local/etc/rkhunter.conf. Open it up:
sudo nano /usr/local/etc/rkhunter.conf
Scan down until you reach this line:
Uncomment the line and change the 0 to a 1
Now when we run rkhunter there are no highlighted warnings and this message:
Checking for allowed root login... [ OK (Remote root login permitted by explicit option) ]
Now it's says root logins are OK, but specifies why it's OK: You explicitly allowed it.
However, please don't allow root logins. Thanks.
Lastly, we know that automation and email notification make an administrator's life a lot easier, so now we can add rkhunter to a cronjob.
This is straight from the rkhunter website: You need to create a short shell script as follows:
#!/bin/sh ( /usr/local/bin/rkhunter --versioncheck /usr/local/bin/rkhunter --update /usr/local/bin/rkhunter --cronjob --report-warnings-only ) | /usr/bin/mail -s "rkhunter output" firstname.lastname@example.org
Save the file and call it something like 'rkhunterscript'. Make the file executable:
chmod 750 rkhunterscript
and place in your local bin folder or in a public bin folder. Now set a root cronjob as follows:
sudo crontab -e
My cronjob looks like this:
10 3 * * * /home/demo/bin/rkhunterscript -c --cronjob
This will run the script at 3.10am each day. Why 3.10am? Well, I have chkrootkit running at 3.00am, I'd like that to finish before starting this one.
© 2011-2013 Rackspace US, Inc.
Except where otherwise noted, content on this site is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 3.0 Unported License