OK I sorted out one of the warnings by adding this line to rkhunter.conf
I now just have one warning about root logins as follows
* Check: SSH
Searching for sshd_config...
Checking for allowed root login... Watch out Root login possible. Possible risk!
info: No 'PermitRootLogin' entry found in file /etc/ssh/sshd_config
Hint: See logfile for more information about this issue
Checking for allowed protocols... [25C[ OK (Only SSH2 allowed) ]
* Check: Events and Logging
Search for syslog configuration... [24C[ OK ]
Checking for running syslog slave... [22C[ OK ]
Checking for logging to remote system... [18C[ OK (no remote logging) ]
and sshd_config has this
# Set this to 'yes' to enable PAM authentication, account processing,
# and session processing. If this is enabled, PAM authentication will
# be allowed through the ChallengeResponseAuthentication mechanism.
# Depending on your PAM configuration, this may bypass the setting of
# PasswordAuthentication, PermitEmptyPasswords, and
# "PermitRootLogin without-password". If you just want the PAM account and
# session checks to run without PAM authentication, then enable this but set
what should this setting be I am assuming this is what is spitting out the error and sending me the email with the following quote
Please inspect this machine, because it can be infected