and causing all kinds of, for example SSL problems. The fix is simple, but why happens this at all? I checked already
all start scripts we provide and which are called at boot time without any luck. Don Google shows, that we are not allone with this, but
I have found only pointers to Ubuntu systems.
I have seen this inhouse on some of our SLES 11 development servers and some day ago as well on a server of one of our customers.
can you pinpoint when this happens? It might be worth to correlate this with package installations (i.e. via /var/log/zypp/history) to see if some post-install script causes these changes.
can you pinpoint when this happens? It might be worth to correlate this with package installations (i.e. via /var/log/zypp/history) to see if some post-install script causes these changes.
Regards,
Jens[/QUOTE]
As often, the problem was a mixture of two or more. The /dev/urandom modification was caused by a wrong udev-rule. The /dev/null was more sofisticated.
I identified the start script (launched at system boot as user root); the script, which brings up one of our application servers, could even modify the
permissions of /dev/null when started by a normal user; this is ofc impossible for this proc. But, the proc was doing syslog with facility local5 and
someone configured in /etc/syslog-ng/*.conf as target file /dev/null; a strace shows that the syslog-ng was changing the perms of the file:
[QUOTE=gurucubano;32051]As often, the problem was a mixture of two or more. […]
We can close the thread.[/QUOTE]
I do have weird ideas many times, but I wouldn’t have come close to that problem source Thanks for reporting back and I’ll keep that syslog side-effect in mind!