Please whitelist cPanel in your adblocker so that you’re able to see our version release promotions, thanks!

The Community Forums

Interact with an entire community of cPanel & WHM users!

Checking passwd md5

Discussion in 'Security' started by PeteS, Dec 30, 2017.

  1. PeteS

    PeteS Well-Known Member

    Joined:
    Jun 8, 2017
    Messages:
    127
    Likes Received:
    19
    Trophy Points:
    18
    Location:
    Oregon
    cPanel Access Level:
    Root Administrator
    1- The download for jail_safe_passwd.bz2 is now a .xz, correct?

    2- Downloaded:
    Code:
    wget http://httpupdate.cpanel.net/cpanelsync/11.68.0.21/binaries/linux-c7-x86_64/bin/jail_safe_passwd.xz
    Based on:
    CentOS 7.4, WHM 68.0.21
    # arch
    x86_64

    Correct?

    ---------------

    Then I checked these:
    Code:
    # md5sum /root/test/jail_safe_passwd
    77d6231844a183b7e44234f42e6b636f  jail_safe_passwd
    
    # md5sum /usr/local/cpanel/bin/jail_safe_passwd
    77d6231844a183b7e44234f42e6b636f  /usr/local/cpanel/bin/jail_safe_passwd
    
    # md5sum /bin/passwd
    792964343f6f916d8025bf9b1eb1e839  /bin/passwd
    
    Contrary to what I read on this forum in older posts /bin/passwd is NOT a symlink to /usr/local/cpanel/bin/jail_safe_passwd Has this changed, or else what might be the cause?

    (This is all prompted by chkrootkit-0.52 reporting "Checking `passwd'... INFECTED" which is a know common false positive, but now I'm concerned. Today is the first time it has reported this, and the only thing I know of that changed was updating rkhunter from 1.4.2 to 1.4.4)
     
    #1 PeteS, Dec 30, 2017
    Last edited by a moderator: Dec 30, 2017
  2. cPanelMichael

    cPanelMichael Technical Support Community Manager
    Staff Member

    Joined:
    Apr 11, 2011
    Messages:
    45,214
    Likes Received:
    1,937
    Trophy Points:
    363
    cPanel Access Level:
    Root Administrator
    Twitter:
    Hello,

    Yes, that's the correct archive location for that file from our download mirrors. The MD5 checksums you provided match a test system running CentOS 7.4 and cPanel 68.0.21:

    Code:
    # md5sum /bin/passwd
    792964343f6f916d8025bf9b1eb1e839  /bin/passwd
    
    # md5sum /usr/local/cpanel/bin/jail_safe_passwd
    77d6231844a183b7e44234f42e6b636f  /usr/local/cpanel/bin/jail_safe_passwd
    These are two separate files.

    Thank you.
     
    Stop hovering to collapse... Click to collapse... Hover to expand... Click to expand...
  3. PeteS

    PeteS Well-Known Member

    Joined:
    Jun 8, 2017
    Messages:
    127
    Likes Received:
    19
    Trophy Points:
    18
    Location:
    Oregon
    cPanel Access Level:
    Root Administrator
    Thanks.

    You missed my second question.

    From Passwd Infected Chkrootkit "Check the md5sum of the /bin/passwd file (it should be a symbolic link to /usr/local/cpanel/bin/jail_safe_passwd)..."

    Was that statement an error, or has this changed?

    -Pete
     
  4. cPanelMichael

    cPanelMichael Technical Support Community Manager
    Staff Member

    Joined:
    Apr 11, 2011
    Messages:
    45,214
    Likes Received:
    1,937
    Trophy Points:
    363
    cPanel Access Level:
    Root Administrator
    Twitter:
    Hello Pete,

    It's the case with CentOS 6.x, but it's not applicable to CentOS 7.x. I've updated that post to reflect that information.

    Thank you.
     
    Stop hovering to collapse... Click to collapse... Hover to expand... Click to expand...
  5. PeteS

    PeteS Well-Known Member

    Joined:
    Jun 8, 2017
    Messages:
    127
    Likes Received:
    19
    Trophy Points:
    18
    Location:
    Oregon
    cPanel Access Level:
    Root Administrator
    Thanks for the clarification! :)
     
Loading...

Share This Page

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.
    Dismiss Notice