So I'm busy tracking down a tcp connection issue on my server and I see that 
*.shell is open (not a good thing).

So I do the 'netstat -pl' command to see who has that socket open and, low and 
behold, it happens to be syslog-ng.

So I'm thinking that's kinda odd, there's no reason that syslog-ng should have 
the shell port open for any reason.

Looking at my syslog-ng.conf file, the only sources I have defined are:

source src {    unix-stream("/dev/log");
                internal();
                pipe("/proc/kmsg");
                udp();
                tcp(max_connections(10));
            };

These, to me, do not look like they should result in an open shell port.

Anyone out there with ideas as to why it is opened by syslog-ng and how I can 
get it closed down?

Thanks!

Dave
-- 
gentoo-user@gentoo.org mailing list

Reply via email to