On Wednesday 05 December 2001 10:25 am, Forrest wrote: > This is not from tripwire. The original message had this > line: X-Mailer: /usr/lib/mon/alert.d/mail.alert > Try rpm -q --whatprovides /usr/lib/mon/alert.d/mail.alert > o see if it is an rpm package. Otherwise, do you > remember installing some program like this?
I don't recall... > Your original post also had this: > localhost: problem connecting to "localhost", port 23: > Connection refused > Which tells me that something was telnetting to localhost > (i.e. not from the outside). If you or any other users > of that system are not telnetting to localhost, I would > say that it must be some program. Try looking in > /usr/lib/mon/alert.d/ and see what you can find. I looked: there are a handful of PERL files: alert.template mail.alert qpage.alert snpp.alert trap.alert file.alert netpage.alert remote.alert test.alert I did the rpm --whatprovides, and found: mon-0.38.18-13. "man mon" gives this: ===== mon(1) Parallel Service Monitoring Daemon NAME mon - monitor services for availability, sending alarms upon failures. ===== Well now! This explains a lot! LOL! <sigh!> I don't know how this got in there; perhaps it was when I was installing games from the RH7.1 "PowerTools" CD! (Funny thing, I never actually find time to PLAY the games; i just wanted to see how good they were...I still haven't even checked them out!) I am not sure of the value of such a program as "mon" anyhow; since, after all, I really DON'T want to have telnet available! There's probably a way to tell it not to check for the telnet port availability; however you should see some of the OTHER weird notices I get! They are very long; which is why I haven't posted them on the list. Besides the headers in the mail, there are 68 lines of either "Security Violations", or "Unusual System Events". And example of the former is: 3 Dec 4 16:01:59 CX9465-a mon[1195]: failure for servers http 1007510519 localhost And the other type's example would be: 37 Dec 4 16:01:59 CX9465-a mon[1195]: failure for servers http 1007510519 localhost Not a lot of difference, huh? I don't get that part at all... And the thing is, I get dozens of mails for root, just like this, every day! I just checked, and there are 42 listed right now! It seems to be monitoring for UNAVAILABLE services...is there an easy way to make it do the inverse? And let me know if, for instance, the telnet port suddenly opened up for no reason? THAT might be useful! <g!> Anyway, I want to turn it off, but in looking at the "man mon" page I don't see a way to do that. It seems harder to make things stop, than it does to make things go. Dang... Any advice would be appreciated. TIA, --Mark VII [EMAIL PROTECTED] _______________________________________________ Seawolf-list mailing list [EMAIL PROTECTED] https://listman.redhat.com/mailman/listinfo/seawolf-list