Date: Mon, 27 Mar 2000 22:06:25 -0800 From: The Mad Scientist <madscientist@thegrid.net> To: freebsd-security@freebsd.org Subject: syslogd compatibility Message-ID: <4.1.20000327220609.00927f00@mail.thegrid.net>
next in thread | raw e-mail | index | archive | help
All, It seems that syslogd on -stable rejects any syslog packets if they do not originate from udp port 514. One of the machines I have is a sparc running 2.8 and its syslogd sends messages from a random high-numbered port. I've poked through the mailing list archives a little and didn't see anything relevant. Is there an undocumented command-line/conf file that will fix the problem? I'm not much of a hacker, but from the syslogd.c code I think I can see the relevant part that drops the packets. Would getting rid of these lines do the trick (~line 1802 in /usr/src/usr.sbin/syslogd/syslogd.c)? if (ntohs(ap->port) != 0 && ap->port != sin->sin_port) { dprintf("rejected in rule %d due to port mismatch.\n", i); continue; } Am I correct in assuming that the idea here is to put more trust in remote syslogds running as root? Are there any other security implications with removing this check? From syslogd -a 10.0.0.0/8 -vv -d <snip> cvthname(10.0.1.4) validate: dgram from IP 10.0.1.4, port 32803, name splitbrain.; rejected in rule 0 due to port mismatch. I also don't see any logs of these rejected packets... My FreeBSD machine is: FreeBSD watchtower 3.4-STABLE FreeBSD 3.4-STABLE #2: Tue Mar 7 21:50:38 PST 2000 root@watchtower:/usr/src/sys/compile/WATCHTOWER i386 The Solaris box is: SunOS splitbrain 5.8 Generic sun4m sparc SUNW,SPARCstation-10 Thanks for the help. -Dean To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?4.1.20000327220609.00927f00>