I'm running rkhunter 1.4.6-5 on Debian 10 (buster). I run a Jitsi Docker container which recently added a process in their container.
rkhunter marks the process saslauthd as a Possible Rootkit: Spam tool component (full output below). I don't see how I can allow this process without disabling the running_procs test.
Is this even supported? Or does rkhunter not take container hosts into account?
Warning: The following processes are using suspicious files:
Command: saslauthd
UID: 0 PID: 20095
Pathname:
Possible Rootkit: Spam tool component
Command: saslauthd
UID: 0 PID: 20147
Pathname:
Possible Rootkit: Spam tool component
Command: saslauthd
UID: 0 PID: 20148
Pathname:
Possible Rootkit: Spam tool component
Command: saslauthd
UID: 0 PID: 20152
Pathname:
Possible Rootkit: Spam tool component
Command: saslauthd
UID: 0 PID: 20153
Pathname:
Possible Rootkit: Spam tool component
I ran
rkhunter --sk -c --vl --debugand checked the log files in /tmp/rkhunter*Probably this file below has to be added to rkhunter to suppress this warning. Will check this later, first I'll check why rkhunter thinks this file is bad.
Seems like this cannot be whitelisted? Since it runs in an container environment, it's not part of the host's local path. How to fix this?
I've similar issue. I ran sogo in a docker container, and rkhunter report this process as spam. I tried some configurations in rkhunter.conf, but without any success.
As K. de Jong mentioned, this file doesn't exists on the local OS, only in a running docker container.
I have a similar issue. Running Nextcloud in a docker-container leading since Nextcloud version 22 to the same warning as mentioned above:
As the above users wrote, here it's the same, that the package is not installed on the local machine and therefore the corresponding file not present:
I did try to Whitelist Apache, but as expected it didn't work:
Last edit: jens 2022-01-25
Same for postgres in a docker container:
Using rkhunter 1.4.6 on Debian bullseye 11.2 and having a Docker container in Docker swarm (20.10.11, build dea9396) running Apache (Apache/2.4.52 Debian) inside the container we see the same problem here as well:
This produces a new message every day which has to be actively ignored on a daily basis. This is at least annoying and it would be very helpful to either find a workaround or even better fix this problem in rkhunter.
same for pretty much anything that i'm running in docker... postgres, saslauthd, java-based stuff, pretty much anything that runs inside containers is found as "Possible rootkit".
please do something about this.