Date: Tue, 19 Aug 2014 18:17:46 +0000 From: bugzilla-noreply@freebsd.org To: freebsd-bugs@FreeBSD.org Subject: [Bug 192827] `syslogd -s` listens on 514/udp6 Message-ID: <bug-192827-8-bkButf470Y@https.bugs.freebsd.org/bugzilla/> In-Reply-To: <bug-192827-8@https.bugs.freebsd.org/bugzilla/> References: <bug-192827-8@https.bugs.freebsd.org/bugzilla/>
next in thread | previous in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=192827 --- Comment #2 from florian.ermisch@alumni.tu-berlin.de --- You're right, I just took a quite glance at the part of the manpage I've pasted earlier today and just read "Operate in secure mode. Do not log messages from remote machines. ... no network socket will be opened at all". Maybe the "If specified twice" should be bold or something so it's harder to overlook. Can someone give me a usecase for `syslogd -s` (opening the upd-socket but apparently not logging received log messages)? I can't imagine any common usecase for this behaviour (only, like, "implementing a syslog-blackhole on your network"). And '-s' only circumvents a malicious hosts filling the logservers disks with garbage but seems to still allow trafic to be directed at syslogd. -- You are receiving this mail because: You are the assignee for the bug.
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-192827-8-bkButf470Y>