Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 6 Jan 1999 18:55:02 -0800
From:      Don Lewis <Don.Lewis@tsc.tdk.com>
To:        Peter Jeremy <peter.jeremy@auss2.alcatel.com.au>, Don.Lewis@tsc.tdk.com
Cc:        freebsd-security@FreeBSD.ORG
Subject:   Re: kernel/syslogd hack
Message-ID:  <199901070255.SAA02558@salsa.gv.tsc.tdk.com>
In-Reply-To: Peter Jeremy <peter.jeremy@auss2.alcatel.com.au> "Re: kernel/syslogd hack" (Jan  7, 12:23pm)

next in thread | previous in thread | raw e-mail | index | archive | help
On Jan 7, 12:23pm, Peter Jeremy wrote:
} Subject: Re: kernel/syslogd hack
} Don Lewis <Don.Lewis@tsc.tdk.com> wrote:
} >If syslogd received a message without the credentials, it could log the
} >information that it was handed with an indication that the information
} >may not be trustworthy.
} 
} Which immediately returns us to the original problem - which is that
} the current syslog protocol makes DOS attacks trivial.

Add an option to tell syslogd to ignore messages that don't have
credentials?  The only reason I'd make this an option is to allow
for statically linked apps that can't be recompiled.

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199901070255.SAA02558>