On Tue, Dec 20, 2016 at 1:19 PM, David Breise <dbre...@eticainc.com> wrote: > Tested commands manually, no errors returned. This is still a problem for > us. >
Which distribution are you using? I'm wondering why mktemp isn't being used (or why it's failing). > On Wednesday, January 21, 2015 at 9:32:27 AM UTC-8, dan (ddpbsd) wrote: >> >> On Wed, Jan 21, 2015 at 11:11 AM, Gil Vidals <gvi...@gmail.com> wrote: >> > Thanks for the quick reply. >> > >> > I do see that mktemp exists and that the temp files have been created >> > successfully on more than one occasion as you can see below. What other >> > reason could there be for cat and tr running astray and consuming lots >> > of >> > CPU. (cat and tr will run for hours unless killed manually). >> > >> > # which mktemp >> > /bin/mktemp >> > >> > # ls -l /var/ossec/ossec-hosts.* >> > -rw------- 1 root ossec 0 Jan 2 01:15 /var/ossec/ossec-hosts.7aypDtwpES >> > -rw------- 1 root ossec 0 Dec 3 00:31 /var/ossec/ossec-hosts.IeJGMBWseD >> > -rw------- 1 root ossec 0 Nov 2 01:58 /var/ossec/ossec-hosts.IxQvPzkSbn >> > -rw------- 1 root ossec 0 Dec 10 23:31 /var/ossec/ossec-hosts.QV2a7VwilS >> > -rw------- 1 root ossec 0 Nov 10 23:32 /var/ossec/ossec-hosts.Rr0j0L3RTV >> > -rw------- 1 root ossec 0 Jan 17 02:23 /var/ossec/ossec-hosts.SKfz9m2LPG >> > -rw------- 1 root ossec 0 Jan 17 02:39 /var/ossec/ossec-hosts.SrSTWhUNH1 >> > >> > >> > >> > >> > On Tuesday, January 20, 2015 at 3:47:28 PM UTC-8, Gil Vidals wrote: >> >> >> >> We're running ossec 2.8 and are finding instances where cat and tr are >> >> consuming a lot of CPU. The cat and tr processes have to be killed with >> >> the >> >> kill command since restarting ossec doesn't kill them. >> >> >> >> How can the run away cat and tr process be prevented? >> >> >> >> I found the portion of the ossec code that calls the cat and tr >> >> functions: >> >> >> >> elif [ "x${ACTION}" = "xdelete" ]; then >> >> lock; >> >> TMP_FILE=`mktemp /var/ossec/ossec-hosts.XXXXXXXXXX` >> >> if [ "X${TMP_FILE}" = "X" ]; then >> >> # Cheap fake tmpfile, but should be harder then no random data >> >> TMP_FILE="/var/ossec/ossec-hosts.`cat /dev/urandom | tr -dc >> >> 'a-zA-Z0-9' | fold -w 32 | head -1 `" >> >> fi >> >> if [ "X$UNAME" = "XFreeBSD" ]; then >> >> cat /etc/hosts.allow | grep -v "ALL : ${IP} : deny$"> ${TMP_FILE} >> >> mv ${TMP_FILE} /etc/hosts.allow >> >> else >> >> cat /etc/hosts.deny | grep -v "ALL:${IP}$"> ${TMP_FILE} >> >> cat ${TMP_FILE} > /etc/hosts.deny >> >> rm ${TMP_FILE} >> >> fi >> >> unlock; >> >> exit 0; >> >> >> >> Thanks in advance for any help you can provide in resolving this issue. >> > >> >> Ok, what happens if you run that command manually? >> >> > -- >> > >> > --- >> > You received this message because you are subscribed to the Google >> > Groups >> > "ossec-list" group. >> > To unsubscribe from this group and stop receiving emails from it, send >> > an >> > email to ossec-list+...@googlegroups.com. >> > For more options, visit https://groups.google.com/d/optout. > > -- > > --- > You received this message because you are subscribed to the Google Groups > "ossec-list" group. > To unsubscribe from this group and stop receiving emails from it, send an > email to ossec-list+unsubscr...@googlegroups.com. > For more options, visit https://groups.google.com/d/optout. -- --- You received this message because you are subscribed to the Google Groups "ossec-list" group. To unsubscribe from this group and stop receiving emails from it, send an email to ossec-list+unsubscr...@googlegroups.com. For more options, visit https://groups.google.com/d/optout.