xfs
[Top] [All Lists]

Re: XFS tree for Red Hat should be moved to at least kernel-2.4.20-20

To: linux-xfs@xxxxxxxxxxx
Subject: Re: XFS tree for Red Hat should be moved to at least kernel-2.4.20-20
From: Ethan Benson <erbenson@xxxxxxxxxx>
Date: Tue, 16 Sep 2003 23:36:01 -0800
In-reply-to: <46673.213.173.165.140.1063729347.squirrel@imap01.ch.sauter-bc.com>
Mail-copies-to: nobody
Mail-followup-to: linux-xfs@xxxxxxxxxxx
References: <Pine.LNX.4.44.0309140958220.17784-100000@stout.americas.sgi.com> <Pine.LNX.4.44.0309141045391.15430-100000@burgers.bubbanfriends.org> <20030914214745.GD827@plato.local.lan> <46483.213.173.165.140.1063724939.squirrel@imap01.ch.sauter-bc.com> <Pine.LNX.4.55.0309161127470.8603@linux-sxs.org> <46673.213.173.165.140.1063729347.squirrel@imap01.ch.sauter-bc.com>
Sender: linux-xfs-bounce@xxxxxxxxxxx
User-agent: Mutt/1.3.28i
On Tue, Sep 16, 2003 at 06:22:27PM +0200, Simon Matter wrote:
> 
> > On Tue, 16 Sep 2003, Simon Matter wrote:
> >> No please. There are better solutions than mkfs in most situations. Why
> >> being so afraid about kernel modules and rootkit binaries? Boot from a
> >> CD
> >> like knoppix or similar. Then mount all filesystems and examine the
> >> system. First check whether your rpm database has been touched. A recent
> >> backup may help here. Then rpm is your friend by finding out which files
> >
> > How do you know that you can trust your rpm binary?  How do you know that
> > you can trust your rpm database?  How do you know that you can trust
> > *anything* on the system?
> 
> You boot from CD. Then you can use rpm2cpio running from the CD and
> extract the rpm package which is installed on the target system. Diff all
> the files and you're sure your rpm binaries are okay.

the CD won't include all the security updates, or other upgrades,
local installations etc.  there are many many ways to hide things on a
system, rpm cannot help you.

-- 
Ethan Benson
http://www.alaska.net/~erbenson/

Attachment: pgp5R9R6xRmEF.pgp
Description: PGP signature

<Prev in Thread] Current Thread [Next in Thread>