From owner-freebsd-questions@FreeBSD.ORG Tue Feb 10 12:04:57 2004 Return-Path: Delivered-To: freebsd-questions@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 1B77516A4CE for ; Tue, 10 Feb 2004 12:04:57 -0800 (PST) Received: from dan.emsphone.com (dan.emsphone.com [199.67.51.101]) by mx1.FreeBSD.org (Postfix) with ESMTP id C759B43D1F for ; Tue, 10 Feb 2004 12:04:56 -0800 (PST) (envelope-from dan@dan.emsphone.com) Received: (from dan@localhost) by dan.emsphone.com (8.12.10/8.12.10) id i1AK4nDc096339; Tue, 10 Feb 2004 14:04:49 -0600 (CST) (envelope-from dan) Date: Tue, 10 Feb 2004 14:04:48 -0600 From: Dan Nelson To: Jerry McAllister Message-ID: <20040210200448.GB44504@dan.emsphone.com> References: <34605.207.5.142.198.1076441813.squirrel@new.host.name> <200402101926.i1AJQVQ07757@clunix.cl.msu.edu> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <200402101926.i1AJQVQ07757@clunix.cl.msu.edu> X-OS: FreeBSD 5.2-CURRENT X-message-flag: Outlook Error User-Agent: Mutt/1.5.5.1i cc: questions@freebsd.org Subject: Re: checking checksums on binaries and checking for rootkits X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.1 Precedence: list List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 10 Feb 2004 20:04:57 -0000 In the last episode (Feb 10), Jerry McAllister said: > > hello, im using FBSD 4.9 ... IS there a way to check the checksum > > on binairies like "ls , ps" etc.. to check for rootkits ? > > > > On Solaris you can run md5 on a binary and compare it against a > > utility on SUNS website that will cehck the finger print to see > > whether the binary is part of a rootkit or the original binary. > > Does Freebsd have a tool like this ? > > The checksums are available for the ISOs on the FreeBSd site in the > same directory as the ISOs. > > As for individual routines, I don't know. mtree is great for this. Run "mtree -k sha1digest,time,size -c -p /etc", save the output to a secure location, and run "mtree -p /etc < mtree.txt" later to verify timestamps and checksums. Although it's mainly for self-verification. I suppose you could run it against the live cdrom. -- Dan Nelson dnelson@allantgroup.com