blob: aca690df95fa7934a3a496c58c9afa19c08bb057 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
|
#!/bin/bash
# msec: rootkit security check
# check if we are run from main script
if [ -z "$MSEC_TMP" -o -z "$INFOS" -o -z "$SECURITY" -o -z "$DIFF" -o -z "$SECURITY_LOG" -o -z "${CURRENT_CHECK_TYPE}" ]; then
# variables are set in security.sh and propagated to the subscripts
echo "Error: this check should be run by the main msec security check!"
echo " do not run it directly unless you know what you are doing."
return 1
fi
export CHKROOTKIT_TODAY="/var/log/security/chkrootkit.${CURRENT_CHECK_TYPE}.today"
CHKROOTKIT_YESTERDAY="/var/log/security/chkrootkit.${CURRENT_CHECK_TYPE}.yesterday"
CHKROOTKIT_DIFF="/var/log/security/chkrootkit.${CURRENT_CHECK_TYPE}.diff"
if [[ -f ${CHKROOTKIT_TODAY} ]]; then
mv ${CHKROOTKIT_TODAY} ${CHKROOTKIT_YESTERDAY};
if [ ! -x /usr/sbin/chkrootkit ]; then
printf "\nSecurity Warning: chkrootkit is enabled but was uninstalled\n" >> ${CHKROOTKIT_DIFF}
fi
fi
### chkrootkit checks
if check_is_enabled "${CHECK_CHKROOTKIT}" ; then
if [ -x /usr/sbin/chkrootkit ]; then
# do not check on NFS
/usr/sbin/chkrootkit -n ${CHKROOTKIT_OPTION} > ${CHKROOTKIT_TODAY}
res=$?
if [ "$res" = "0" ]; then
chkrootkit_result="passed"
else
chkrootkit_result="failed"
fi
if [[ -s ${CHKROOTKIT_TODAY} ]]; then
printf "\nChkrootkit report:\n" >> ${SECURITY}
cat ${CHKROOTKIT_TODAY} >> ${SECURITY}
echo "Chkrootkit check: $chkrootkit_result" >> ${INFOS}
fi
else
printf "\nChkrootkit check skipped: chkrootkit not found" >> ${SECURITY}
echo "Chkrootkit check: skipped (chkrootkit not found)" >> ${INFOS}
fi
fi
### Changed chkrootkit
if check_is_enabled "${CHECK_CHKROOTKIT}" ; then
if [ -x /usr/sbin/chkrootkit ]; then
Diffcheck ${CHKROOTKIT_TODAY} ${CHKROOTKIT_YESTERDAY} ${CHKROOTKIT_DIFF} "chkrootkit results"
fi
fi
|