On Wed, Jun 20, 2001 at 02:39:35PM +0200, Matthias Fritschi wrote:
> my linux knowledge comes more from the user/developer side of view, so im
> learning a lot at the moment to be able to set up our new webserver.
> today, i had the following two lines in auth.log, which scared me a bit:
> > Jun 20 06:25:02 blacksun su: + ??? root-nobody
> > Jun 20 06:25:02 blacksun PAM_unix: (su) session opened for user nobody by (uid=0)
That looks like a su from root _to_ nobody.
> could that mean somebody got into the server using a security leak in
> a process running as nobody?
> at this time, i was still sleepeing, and nobody else has access to the server
> yet... [...] cron [...] running on the machine at this moment.
nausea ~% grep 25 /etc/crontab
25 6 * * * root test -e /usr/sbin/anacron || run-parts --report /etc/cron.daily
It's a cron job that does a su nobody before running something, do a
grep nobody /etc/cron.daily/* and it'll probably be there.
Colin Phipps PGP 0x689E463E http://www.netcraft.com/
- From: Matthias Fritschi <email@example.com>