Malware in /tmp/nginx_client
Lucas Rolff
lucas at slcoding.com
Mon Jun 29 09:12:22 UTC 2015
It's not cached requests:
http://nginx.org/en/docs/http/ngx_http_core_module.html#client_body_in_file_only
It's just temporary files that isn't deleted, if you set it to 'clean'
instead of 'on' - I think you can even put it off as default... I don't
know why it's actually enabled.
> guillefar <mailto:nginx-forum at nginx.us>
> 29 Jun 2015 11:08
> Yes, I think I will do that. So they are indeed cached requests?
>
> Posted at Nginx Forum:
> http://forum.nginx.org/read.php?2,259948,259960#msg-259960
>
> _______________________________________________
> nginx mailing list
> nginx at nginx.org
> http://mailman.nginx.org/mailman/listinfo/nginx
> Lucas Rolff <mailto:lucas at slcoding.com>
> 27 Jun 2015 16:35
> It's not harmful that they're there, but you could simply exclude the
> /tmp/nginx_client folder from maldet,
>
> It's due to the option client_body_in_file_only being set to on in
> your nginx.conf (Sounds like you're using http://www.nginxcp.com/ for
> cpanel)
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mailman.nginx.org/pipermail/nginx/attachments/20150629/84e87e35/attachment.html>
More information about the nginx
mailing list