Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 22 Aug 1998 08:58:52 -0400 (EDT)
From:      Thomas Valentino Crimi <tcrimi+@andrew.cmu.edu>
To:        freebsd-security@FreeBSD.ORG
Subject:   Re: Scaring the bezeesus out of your system admin as a normal user:
Message-ID:  <cprg2AW00YUq02dGM0@andrew.cmu.edu>
In-Reply-To: <Pine.BSF.3.96.980821183339.26762D-100000@Tyr.office.EFN.org>
References:  <Pine.BSF.3.96.980821183339.26762D-100000@Tyr.office.EFN.org>

next in thread | previous in thread | raw e-mail | index | archive | help


  Of course, one could also build an authentication system into syslogd
( using ssh with RSAauth as a portal comes to mind as a quick way to
accomplish this. )

  syslogd would have to be modified to use long-lived TCP sockets, or, a
second daemon could be written for the sole purpose of passing syslogd
messages around.  Say, a named pipe which syslogd logs to, then that
info is sent to the daemon on the next machine via secure means, which
then uses it's PF_LOCAL auth to pass the messages to the the second
machine's syslogd.

  All of this of course is as reliable as the root account on all the
machines, as always with syslogd, at least it woudl make forgery a
cryptographic challenge, though.

  Tom


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?cprg2AW00YUq02dGM0>