there seem to be some files in the aspell-en package affected by this issue. That does not happen with md5sums as they are hand-picked by package maintainers. If the archives contain configuration files the direct comparison or the sha256sum may not match since such files can be altered automatically by installation scripts. All other information is extracted from the archive of a package. The information for md5sums is fetched from the package header. UGM user, group or mode of the file have been altered Here is a listing on how to interprete the results in fileserror.lis: 5. debcheckroot can thus also be used to spot manually altered files before you reinstall. It has been meant for integrity checking not for security issues! Debsums furthermore does not provide an output as clean and neatly structured as debcheckroot and does not spot files additionally added to your system by someone else. Usage of debsums instead of Debian-checkroot is strongly discouraged because debsums uses locally stored md5sums which can be modified by an attacker along with the files themselves. debcheckroot is mostly used to check against rootkits including previously unknown rootkits, a task which neither debsums nor chkrootkit or rkhunter can perform. This tool does not use signatures as most private keys are being systematically stolen by the NSA and other services by a specific key stealing programme. You can verify online, offline or from CD/DVD/BD. Debcheckroot is a tool that can use exisiting file cheksum lists, create such lists from packages or do a trusted verification of your root file system by directly comparing the package content with the files on disk.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |