Malware in /tmp/nginx_client

Lucas Rolff lucas at slcoding.com
Mon Jun 29 09:12:22 UTC 2015


It's not cached requests:
http://nginx.org/en/docs/http/ngx_http_core_module.html#client_body_in_file_only

It's just temporary files that isn't deleted, if you set it to 'clean' 
instead of 'on' - I think you can even put it off as default... I don't 
know why it's actually enabled.


> guillefar <mailto:nginx-forum at nginx.us>
> 29 Jun 2015 11:08
> Yes, I think I will do that. So they are indeed cached requests?
>
> Posted at Nginx Forum: 
> http://forum.nginx.org/read.php?2,259948,259960#msg-259960
>
> _______________________________________________
> nginx mailing list
> nginx at nginx.org
> http://mailman.nginx.org/mailman/listinfo/nginx
> Lucas Rolff <mailto:lucas at slcoding.com>
> 27 Jun 2015 16:35
> It's not harmful that they're there, but you could simply exclude the 
> /tmp/nginx_client folder from maldet,
>
> It's due to the option client_body_in_file_only being set to on in 
> your nginx.conf (Sounds like you're using http://www.nginxcp.com/ for 
> cpanel)
>

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mailman.nginx.org/pipermail/nginx/attachments/20150629/84e87e35/attachment.html>


More information about the nginx mailing list