Docs / Security / Rootkit Detection with rkhunter and chkrootkit

Rootkit Detection with rkhunter and chkrootkit

By Admin · Apr 4, 2026 · Updated Apr 23, 2026 · 8 views · 3 min read

Managing rkhunter effectively is a crucial skill for any system administrator. This tutorial provides step-by-step instructions for chkrootkit configuration, along with best practices for production environments.

Prerequisites

  • Root or sudo access to the server
  • A VPS running Ubuntu 22.04 or later (2GB+ RAM recommended)
  • Backup of existing configuration files
  • Current system packages (run apt update && apt upgrade)

Installation and Configuration

The rkhunter configuration requires careful attention to resource limits and security settings. On a VPS with limited resources, it's important to tune these parameters according to your available RAM and CPU cores.


# Install and configure rkhunter
sudo apt update && sudo apt install -y rkhunter

# Backup existing config
sudo cp /etc/rkhunter/rkhunter.conf /etc/rkhunter/rkhunter.conf.bak

# Edit configuration
sudo nano /etc/rkhunter/rkhunter.conf

The configuration above sets the recommended values for a VPS with 2-4GB of RAM. Adjust the memory-related settings proportionally if your server has different specifications.

  • Profile before optimizing - measure first
  • Scale vertically before scaling horizontally
  • Use connection pooling for database connections

Creating Security Rules

The chkrootkit component plays a crucial role in the overall architecture. Understanding how it interacts with rkhunter will help you make better configuration decisions.


# Check security status
sudo rkhunter --check
sudo systemctl status rkhunter

# View logs for security events
sudo journalctl -u rkhunter --since "1 hour ago"
sudo tail -f /var/log/rkhunter.log

This configuration provides a good balance between performance and resource usage. For high-traffic scenarios, you may need to increase the limits further.

Testing the Configuration

The rkhunter configuration requires careful attention to resource limits and security settings. On a VPS with limited resources, it's important to tune these parameters according to your available RAM and CPU cores.


# Firewall rules for security
sudo ufw allow ssh
sudo ufw allow http
sudo ufw allow https
sudo ufw enable
sudo ufw status verbose

This configuration provides a good balance between performance and resource usage. For high-traffic scenarios, you may need to increase the limits further.

Common Issues and Solutions

  • Permission denied errors: Ensure files and directories have the correct ownership. Use chown -R to fix ownership and chmod for permissions.
  • Service won't start: Check the logs with journalctl -xe -u rkhunter. Common causes include port conflicts, missing configuration files, or insufficient permissions.

Summary

You've successfully configured rkhunter on your VPS. Remember to monitor performance, keep your software updated, and maintain regular backups. If you run into issues, consult the official documentation or open a support ticket for assistance.

Was this article helpful?