Date: Wed, 6 Jan 1999 21:43:22 +1100 (EDT) From: Darren Reed <avalon@coombs.anu.edu.au> To: sthaug@nethelp.no Cc: freebsd-security@FreeBSD.ORG Subject: Re: kernel/syslogd hack Message-ID: <199901061043.VAA24675@cheops.anu.edu.au> In-Reply-To: <7158.915619144@verdi.nethelp.no> from "sthaug@nethelp.no" at Jan 6, 99 11:39:04 am
next in thread | previous in thread | raw e-mail | index | archive | help
In some mail from sthaug@nethelp.no, sie said: > > > In what I think is a "bug" (or missing feature), commenting out syslog/514 > > in /etc/services causes syslogd not to start rather than to just not open > > up the UDP port (2.2.5) but "syslogd -s" shuts down the UDP port for > > reception of syslog messages, so that's covered. > > No, "syslogd -s" does *not* shut down the UDP port - at least not in > > $Id: syslogd.c,v 1.46 1998/12/29 23:14:50 cwt Exp $ > > Instead the packets are received and then logged as > > "syslogd: discarded %d unwanted packets in secure mode, last from %s" > > I would much prefer that it actually not listened to the UDP port at all. Indeed. It needs to have one open so it can send to other hosts, but it should not listen at all. Darren To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199901061043.VAA24675>