> Article about using stunnel with rsyslog
> http://freecode.com/articles/ssl-encrypting-syslog-with-stunnel

hello again :-)

I've setup a server log centralized following the above link (and
thanks). Whole connections fly on vpn.

I also read:

>Preventing Systems from Talking Directly to the rsyslog Server
>It is possible for remote systems (or attackers) talk to the rsyslog
>server by directly connecting to its port 61514. Currently, rsyslog
>does not offer the ability to bind to the local host only. This
>feature is planned, but as long as it is missing, rsyslog must be
>protected via a firewall. This can easily be done via, for example,
>iptables. Just be sure not to forget it.

So, to protect my self about the hackers attempts, I need only close
61514 port of centralized log server?

If an attacker has root access on a client, can talking with syslogd
centralized log server?

If yes, how I protect that server?

thanks!

Pol


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/51e438a7.7010...@fuckaround.org

Reply via email to