From owner-freebsd-security Wed Apr 5 10:38:14 2000 Delivered-To: freebsd-security@freebsd.org Received: from linux.sduteam.com (adsl-216-102-118-84.dsl.scrm01.pacbell.net [216.102.118.84]) by hub.freebsd.org (Postfix) with ESMTP id 9F3B437B6B1 for ; Wed, 5 Apr 2000 10:38:12 -0700 (PDT) (envelope-from goten@linux.sduteam.com) Received: from localhost (goten@localhost) by linux.sduteam.com (8.9.3/8.9.3) with ESMTP id LAA09901 for ; Wed, 5 Apr 2000 11:26:44 -0700 Date: Wed, 5 Apr 2000 11:26:44 -0700 (PDT) From: To: security@freebsd.org Subject: Queston on secure syslogd Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org Ok, I am just wondering if there is any secure alternative for syslogd. Since I want to send the log file via TCP/IP over the Internet, using @1.2.3.4 in syslogd.conf is not secure enough if that IP is not on the LAN. I have tried to use nsyslogd, but the SSL not seems to be working right. I can use Snort -dvC to read all the content in clear text when nsyslogd send message thru UDP port 514. Any suggestions? rgd, Derek ps. I have tried ssyslogd also, it won't even compile on FreeBSD 4.0. To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message