Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 6 Jan 1999 21:43:22 +1100 (EDT)
From:      Darren Reed <avalon@coombs.anu.edu.au>
To:        sthaug@nethelp.no
Cc:        freebsd-security@FreeBSD.ORG
Subject:   Re: kernel/syslogd hack
Message-ID:  <199901061043.VAA24675@cheops.anu.edu.au>
In-Reply-To: <7158.915619144@verdi.nethelp.no> from "sthaug@nethelp.no" at Jan 6, 99 11:39:04 am

next in thread | previous in thread | raw e-mail | index | archive | help
In some mail from sthaug@nethelp.no, sie said:
> 
> > In what I think is a "bug" (or missing feature), commenting out syslog/514
> > in /etc/services causes syslogd not to start rather than to just not open
> > up the UDP port (2.2.5) but "syslogd -s" shuts down the UDP port for
> > reception of syslog messages, so that's covered.
> 
> No, "syslogd -s" does *not* shut down the UDP port - at least not in
> 
> $Id: syslogd.c,v 1.46 1998/12/29 23:14:50 cwt Exp $
> 
> Instead the packets are received and then logged as
> 
> "syslogd: discarded %d unwanted packets in secure mode, last from %s"
> 
> I would much prefer that it actually not listened to the UDP port at all.

Indeed.  It needs to have one open so it can send to other hosts, but it
should not listen at all.

Darren

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199901061043.VAA24675>