I also saw this, and would like to find some docs.
I am pretty sure I am not hacked.
It's RH9 with vanilla 2.4.24. Maybe it's a confusion between RH's NPTL and
a kernel which isn't?
I now checked which procs aren't shown in ps. They are:
The 3 children of ypbind (the father _is_ shown in ps)
Some nautilus procs (probably the same - one is shown in ps, havn't checked
        if he is their father)
Some xmms procs (same)
I looked at /proc (with ls, cat, etc.) to see this.

Can anyone point me to relevant docs? Maybe simply google for NPTL? I know
I should have done this before posting - see this not as a question but as
an answer (unless you already know it's a wrong one).
Thanks,
-- 
Didi

On Fri, Jun 04, 2004 at 08:34:03AM +0300, [EMAIL PROTECTED] wrote:
> ik wrote:
> 
> >Hello,
> >
> >I'm using debian as my desktop system. Recently i installed the program 
> >"chkrootkit". This program scans the system and give you output regarding 
> >it's findings.
> >
> >Sometimes i have 2-8 hidden proccess that does not seen in "ps". So the 
> >program tells me i might have some backdor known as LVM.
> > 
> >
> See http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=222179.
> In general - chkrootkit is not updated to handle the threading model of 
> kernel 2.6 so
> this check is not reliable. (you do use 2.6 do you?)
> 
> >Now, i know that some programs will use hidden proccess for short time, so 
> >i 
> >
> Really??  I wasn't aware that hidden processes are possible in 
> "standard" linux API's.
> 
> >do not warry that i really have this LVM, because when i'm on console 
> >mode, i do not have any type of report for hidden, but sometiems i have it 
> >when i'm in xfree.
> >
> >And now for the question :) I have firewall (amm iptables that sets by 
> >shorewall), i have my own user.. and two other users as well. How can i 
> >increase my security in a way that i could be relax from warry about 
> >backdoors like rootkits ?
> >
> >Please note i read the officail debian document about security ... but it 
> >does not seems to help me to solve this type of problem..
> > 
> >
> Um. There are many documents about enhancing linux security, you don't 
> necessarily have to follow only
> the official one. Google around.
> 
> I think that SELinux (there is a debian package for this, at least in 
> "unstable", see http://www.nsa.gov/selinux/index.cfm)
> is a pretty mature one but it should be handled with care or you might 
> find yourself easely "locked out" of many
> functions on the system. In short what it does is to provide "strong, 
> flexible mandatory access control architecture
> incorporated into the major subsystems of the kernel".
> 
> >Thank you for all answer
> >
> >Ido
> >
> > 
> >
> 
> 
> 
> =================================================================
> To unsubscribe, send mail to [EMAIL PROTECTED] with
> the word "unsubscribe" in the message body, e.g., run the command
> echo unsubscribe | mail [EMAIL PROTECTED]
> 
> 
> +++++++++++++++++++++++++++++++++++++++++++
> This Mail Was Scanned By Mail-seCure System
> at the Tel-Aviv University CC.

=================================================================
To unsubscribe, send mail to [EMAIL PROTECTED] with
the word "unsubscribe" in the message body, e.g., run the command
echo unsubscribe | mail [EMAIL PROTECTED]

Reply via email to