Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 10 Feb 1999 10:25:02 -0800 (PST)
From:      jbarbee@singular.com (John Barbee)
To:        mhx <mhx@execpc.com>
Cc:        freebsd-questions@FreeBSD.ORG
Subject:   Re: syslogd in freebsd 3.0
Message-ID:  <Pine.BSF.4.05.9902101021320.28204-100000@server7.singular.com>
In-Reply-To: <36C1C847.FB7B9EF@execpc.com>

next in thread | previous in thread | raw e-mail | index | archive | help
Personally, the only only security I've heard of is when you send your
messages to other hosts.  Afraid that someone might capture your system
messages when they're not supposed to.

However, syslogd does run as a daemon on port 514 and is susceptible to
attacks just like any other daemon.  But, once again, personally I don't
know of any outstanding security flaw.

john.

On Wed, 10 Feb 1999, mhx wrote:

> well i run www.sekurenet.com and someone told me that syslogd is remotly
> exploitable and not to run it so i never ran it i just want to know if you
> guys new about this or is it a rumor?  And if there is something else i can
> run to log things?  I dont see anything on bugtraq for it.
> 
> -Ryan
> 
> John Barbee wrote:
> 
> > What do you mean by exploit?  To what degree?  What are you considering?
> > Or do you mean security-wise?
> >
> > john.
> >
> > On Wed, 10 Feb 1999, mhx wrote:
> >
> > > I was wondering if syslogd is exploitable some how?  Is there a newer
> > > program that i can use that does the same thing?
> > >
> > > -Ryan
> > >
> > >
> > >
> > > To Unsubscribe: send mail to majordomo@FreeBSD.org
> > > with "unsubscribe freebsd-questions" in the body of the message
> > >
> 


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-questions" in the body of the message



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.05.9902101021320.28204-100000>