mirror of
https://github.com/netblue30/firejail.git
synced 2026-05-15 14:16:14 -06:00
[GH-ISSUE #5236] rkhunter detects possible rootkit in /usr/local/bin/ping #2929
Labels
No labels
LTS merge
LTS merge
bug
bug
converted-to-discussion
doc-todo
documentation
duplicate
enhancement
file-transfer
firecfg
firejail-in-firejail
firetools
graphics
help wanted
information_old
installation
invalid
modif
moved
needinfo
networking
notabug
notourbug
old-version
overlayfs
packaging
profile-request
pull-request
question
question_old
removal
runtime-permissions
sandbox-ipc
security
stale
wiki
wiki
wontfix
wordpress
workaround
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: github-starred/firejail#2929
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @samsamros on GitHub (Jul 5, 2022).
Original GitHub issue: https://github.com/netblue30/firejail/issues/5236
I'm using a Debian based distro called Parrot OS.
firejail version 0.9.64.4
rkhunter -c -skRootkit checks...
Rootkits checked : 477
Possible rootkits: 7
Rootkit names : Ping Rootkit or other backdoor
Warning: Checking for possible rootkit strings [ Warning ]
Found string '/bin/bash' in file '/usr/local/bin/ping'. Possible rootkit: Ping Rootkit or other backdoor
Expected behavior
After running several tests and turning off my system as a precaution, I ran tests on several other computers with this operating system.
Several considerations here: a) all systems are personal computers, b) none have open ports facing the web directly as a service.
I reviewed another computer which is also a personal laptop running Parrot OS. The same possible rootkit appeared. I did much research and couldn't find a bug anywhere or information on the rootkit directly. After purging firejail and reinstalling profiles and the software itself the warning was gone (as the symlinks were gone). I also noticed that the ping hardened version was gone as of July 4th, 2022. I also confirmed this was an actual profile and not product of a possible intrusion: #5184
Behavior without a profile
I used a friend's system who is unrelated to my network and who I seldom share any information with. He also uses Parrot OS as a desktop distro (no ports with services facing the web directly).
He had firejail installed, same version (0.9.64.4), and he also had the ping hardened profile included in /etc/firejail but had not run
sudo firecfgafter installing the software a few months back. He ranrkhunter -c -skand the following came out:Rootkit checks...
Rootkits checked : 477
Possible rootkits: 6 (all of which are confirmed false positives, no worries)
I ran
sudo firecfgand then re-ranrkhunter -c -skand the following came out:Rootkit checks...
Rootkits checked : 477
Possible rootkits: 7
Rootkit names : Ping Rootkit or other backdoor
Warning: Checking for possible rootkit strings [ Warning ]
Found string '/bin/bash' in file '/usr/local/bin/ping'. Possible rootkit: Ping Rootkit or other backdoor
After purging the installation on his computer and reinstalling default profiles and the software (which does not include the ping hardened version), the warning is gone.
In another laptop with a clean Parrot OS install (which was installed and fully updated in July 1st, 2022) I also ran
sudo firecfgand saw the hardened version was not included anymore. As expected, no possible ping rootkit was registered by rkhunter.I'm certain this is a bug as it happened in three different computers, one of which is completely unrelated to mine. However, I wanted to leave this here in case this might be helpful to other users or if more experienced users/devs run into this and are certain it might actually be something worth looking into.
@rusty-snake commented on GitHub (Jul 5, 2022):
#5234
@samsamros commented on GitHub (Jul 5, 2022):
thank you for your quick response, and taking the time to look at this. I have seen rkhunter goes through these paths, and will configure it to handle them differently. However, it is the first time a rootkit warning has resulted from one of these paths in my case
Is it safe to say that the rootkit warning in the /usr/local/bin/ping is a false positive related to firejail?
@rusty-snake commented on GitHub (Jul 5, 2022):
If it happens on different systems, sure.
The main question for me is how does this rootkit check work and why does it only trigger for the ping symlink?
@rusty-snake commented on GitHub (Jul 5, 2022):
Actually the warning already states it:
Found string '/bin/bash' in file '/usr/local/bin/ping'If this is the only reason to mark it as rootkited there is nothing to worry about.
@reinerh commented on GitHub (Jul 5, 2022):
It's looking specifically for
/bin/bashonly for ping:https://sources.debian.org/src/rkhunter/1.4.6-10/files/rkhunter/#L9584
@samsamros commented on GitHub (Jul 5, 2022):
thank you @rusty-snake and @reinerh !
I think this settles the matter, and I hope other users who may run into this find this helpful.
@kmk3 commented on GitHub (Jul 5, 2022):
@samsamros Please consider reporting this as a false positive to rkhunter (and
linking to this issue), so that they (and potentially other affected users) are
made aware of it.
@samsamros commented on GitHub (Jul 5, 2022):
@kmk3 will do!
thank you