[Bug 192827] `syslogd -s` listens on 514/udp6
bugzilla-noreply at freebsd.org
bugzilla-noreply at freebsd.org
Tue Aug 19 18:17:46 UTC 2014
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=192827
--- Comment #2 from florian.ermisch at alumni.tu-berlin.de ---
You're right, I just took a quite glance at the part of the manpage I've pasted
earlier today and just read "Operate in secure mode. Do not log messages from
remote machines. ... no network socket will be opened at all".
Maybe the "If specified twice" should be bold or something so it's harder to
overlook.
Can someone give me a usecase for `syslogd -s` (opening the upd-socket but
apparently not logging received log messages)? I can't imagine any common
usecase for this behaviour (only, like, "implementing a syslog-blackhole on
your
network"). And '-s' only circumvents a malicious hosts filling the logservers
disks with garbage but seems to still allow trafic to be directed at syslogd.
--
You are receiving this mail because:
You are the assignee for the bug.
More information about the freebsd-bugs
mailing list