Was talking with someone and mentioned Ubuntu and Kubuntu and how much I like them. He said 'beware of rootkits" yada yada..., this gave me pause.
Well I know that Linux as a whole is pretty safe from what I have read and that no one is spending alot of time making viruses and such for Linux systems. That being said is there something I am missing? Any validity to the rootkit statement? How can I check for rootkits or anything else for that matter. I have been keeping both systems updated.
If anyone has some good advice on this I would greatly appreciate it. Thanks and have a great day.
-
One thing to keep in mind is a rootkit isn't a virus, it's just a software or a collection of stuff that gives something full access to your computer.
Sure on Windows systems that something is usually a virus, but it's perfectly valid to have an actual hacker install a rootkit manually.
Those are the types of rootkits you commonly see on linux systems, since while linux isn't popular for home systems, it's the majority of servers.
There are programs to detect rootkits and provide security, like chrootkit. But most of these programs are really designed for servers, and thats the main target for hackers. As long as your just running a desktop/laptop system, keeping up to date should be fine. -
1) Don't install stuff from outside of your distro's package repository. EVER. Ignore the advice of anyone who tells you otherwise.
2) Keep on top of updates.
3)Use a firewall.
Done. -
-
ALLurGroceries Vegan Vermin Super Moderator
I guess it is a good warning, but you really shouldn't see a rootkit in the wild unless you are doing something unusual. The packages you get from updates will be signed with a PGP key on any deb-based distro. You will be warned if any packages from additional repos don't have signatures or if the signatures are broken or expired, etc. There is no real need to worry unless you are installing unsigned software packages from unknown sources or have had your system broken into.
-
To clarify, if you are not installing from legit source(say debian), it is no longer rootkits that you need to worry about as you are effectively giving up all security.
rootkits usually refers to programs that is supposed to be run by regular(i.e. non-root) users by penetrate the holes of linux and gain root access. IOW, in addition to not installing from unknown source, you should be very careful for giving people local shell access(including telnet/ssh) to the machine.
Debian once had a high profile incidence of this. The attack started from gaining normal user shell access(bad password or something) then run some rootkit programs to gain root and propagate from there. -
They don't do package signing, so there's no way to verify that you're receiving trusted software. -
Don't add random repositories because some guy in a forum or some random website told you so!
-
-
Anybody installing Oracle, for example, is not likely to be the sort of user to fall prey to a trojaned RPM.
If you think it's "BS and not realistic" for normal users, perhaps you can explain why you think that? -
See attachment for list of repositories I have downloaded from. Should there be any concern here?
Attached Files:
-
-
I would assume these are all good sources. However, the main concern is not they are hackers but that how good their sites are protected. Canonical may have the resource but some amateur guy acting in good faith ?
-
1. "Provided by Ubuntu" should be the official Ubuntu repositories. There's nothing wrong with that if you trust Canonical (if you didn't you wouldn't use Ubuntu, would you?).
2. "Canonical Partners": Is that Multiverse? Afaik Canonical does not do security checks on Multiverse. You totally depend on the word of these external maintainers that they won't infiltrate your system. The risk of a corrupted repository should be very low though. I'd only use that repository if I had good reasons to do so. Do you have them?
3. "For Purchase" nearly always means it's closed source. So not only no independent institution checks it but worse: Nobody can check it because it can't be examined. I'd consider this repository a time bomb.
4. Bunch of PPAs: Same as 2. but with a much higher level of mistrust (except for the Mozilla PPA, here'd be concerned about the stability).
5. System Load ... : No idea what that is but the name sounds like it's pretty superfluous, which might not be harmful but violates the KISS principle and should therefore be thought over. -
Yes it becomes a problem in trusting 3rd part packages - but again if the only way to get those packages not part of the official repos is through these 3rd party repos - then you have only 2 choices:
1. dont install that software - live with some alternative if any from the offical repo
2. take the risk of installing the software and hope it is not tampered
I'd do the second - but that is just me.... Computers basically are not secure beyond a point... -
Debian has tens of thousands of packages. I have yet to come across something which I needed which was not packaged (with the exception of a couple of pieces of software of which I either personally know and trust the authors or was one of the authors.) Obviously YMMV -- but I'd go as far as to say that the vast majority of desktop users don't need anything outside of their distro's repositories. 99% of the time that I see someone installing random software from some random download site it's because they didn't realize that it (or an equivalent) was available from a trusted source (such as their distro's repos.)
-
Thanks for all the insight. I have pretty much only downloaded from "Provided by Ubuntu" site. Never have purchased anything, and the Canonical Partners doesn't have much anyway. The last 4 on the list is what I was most concerned about, although, I have only downloaded maybe a total of 4 things from those sites, all it takes is 1.
I pretty much use this lappy for surfing the net at work and as a linux learning tool. I don't pay bills with it, or anything that requires a level a security beyond surfing the net. I may even wipe it and reinstall if I suspect anything. I will try one of the rootkit programs mentioned earlier but I seem to think that those server "system type " programs and may not do any good on this laptop. Thoughts? -
The main question is, why do you have all those repositories activated if you don't use them?
-
chkrootkit is not intend to protect you for this. As I have mentioned before, if you use compromised repo, all security is already up in heaven.
If you use it the way you are(no sensitive activities), you are fine. That is equivalent to 'sandbox' -
Oh, and another thing, I'm still learning all this and how the linux world works. -
You can use Synaptic to figure out what packages came from where. (Synaptic is *vastly* better than the "Software Center" that Ubuntu's been pushing lately. This is but one example of why Ubuntu's homegrown solution is inferior.)
Besides, that's what discussion forums like this one are for.(Back in my day it was Usenet and IRC, but the principle's the same...)
Rootkits!?
Discussion in 'Linux Compatibility and Software' started by Evil Claw, Aug 27, 2011.