Date: Sat, 22 Aug 1998 08:58:52 -0400 (EDT) From: Thomas Valentino Crimi <tcrimi+@andrew.cmu.edu> To: freebsd-security@FreeBSD.ORG Subject: Re: Scaring the bezeesus out of your system admin as a normal user: Message-ID: <cprg2AW00YUq02dGM0@andrew.cmu.edu> In-Reply-To: <Pine.BSF.3.96.980821183339.26762D-100000@Tyr.office.EFN.org> References: <Pine.BSF.3.96.980821183339.26762D-100000@Tyr.office.EFN.org>
next in thread | previous in thread | raw e-mail | index | archive | help
Of course, one could also build an authentication system into syslogd ( using ssh with RSAauth as a portal comes to mind as a quick way to accomplish this. ) syslogd would have to be modified to use long-lived TCP sockets, or, a second daemon could be written for the sole purpose of passing syslogd messages around. Say, a named pipe which syslogd logs to, then that info is sent to the daemon on the next machine via secure means, which then uses it's PF_LOCAL auth to pass the messages to the the second machine's syslogd. All of this of course is as reliable as the root account on all the machines, as always with syslogd, at least it woudl make forgery a cryptographic challenge, though. Tom To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?cprg2AW00YUq02dGM0>