Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 22 Jan 2001 21:38:42 -0800
From:      "Crist J. Clark" <cjclark@reflexnet.net>
To:        Garrett Wollman <wollman@khavrinen.lcs.mit.edu>
Cc:        current@FreeBSD.ORG
Subject:   Re: excessive paranoia in syslogd(8)?
Message-ID:  <20010122213842.O10761@rfx-216-196-73-168.users.reflex>
In-Reply-To: <200101221740.MAA39988@khavrinen.lcs.mit.edu>; from wollman@khavrinen.lcs.mit.edu on Mon, Jan 22, 2001 at 12:40:00PM -0500
References:  <20010120224944.I387@bonsai.knology.net> <20010120212039.M10761@rfx-216-196-73-168.users.reflex> <200101221740.MAA39988@khavrinen.lcs.mit.edu>

next in thread | previous in thread | raw e-mail | index | archive | help
On Mon, Jan 22, 2001 at 12:40:00PM -0500, Garrett Wollman wrote:
> <<On Sat, 20 Jan 2001 21:20:39 -0800, "Crist J. Clark" <cjclark@reflexnet.net> said:
> 
> > If you want to or need to use network sockets,
> 
> >   # syslogd -a localhost
> 
> > Should provide the behavior you want.
> 
> I.e., no security whatsoever.

Well, yeah, it's syslogd(8) and as the manpage says,

  BUGS
       The ability to log messages received in UDP packets is equivalent to an
       unauthenticated remote disk-filling service...

However, doing 'syslogd -a localhost' should really not be much worse
than 'syslogd -s' or '-ss'. In all three cases, a local user can nail
you. The only risk I see is 127.0.0.1 being forced in from the LAN, and
even then, I can't recall if FreeBSD will ever accept loopback numbers
coming in a non-loopback interface. And that still is only local net,
127/8 packets aren't going to be routed.
-- 
Crist J. Clark                           cjclark@alum.mit.edu


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-current" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20010122213842.O10761>