Date: Wed, 6 Jan 1999 18:55:02 -0800 From: Don Lewis <Don.Lewis@tsc.tdk.com> To: Peter Jeremy <peter.jeremy@auss2.alcatel.com.au>, Don.Lewis@tsc.tdk.com Cc: freebsd-security@FreeBSD.ORG Subject: Re: kernel/syslogd hack Message-ID: <199901070255.SAA02558@salsa.gv.tsc.tdk.com> In-Reply-To: Peter Jeremy <peter.jeremy@auss2.alcatel.com.au> "Re: kernel/syslogd hack" (Jan 7, 12:23pm)
next in thread | previous in thread | raw e-mail | index | archive | help
On Jan 7, 12:23pm, Peter Jeremy wrote: } Subject: Re: kernel/syslogd hack } Don Lewis <Don.Lewis@tsc.tdk.com> wrote: } >If syslogd received a message without the credentials, it could log the } >information that it was handed with an indication that the information } >may not be trustworthy. } } Which immediately returns us to the original problem - which is that } the current syslog protocol makes DOS attacks trivial. Add an option to tell syslogd to ignore messages that don't have credentials? The only reason I'd make this an option is to allow for statically linked apps that can't be recompiled. To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199901070255.SAA02558>