So I'm busy tracking down a tcp connection issue on my server and I see that *.shell is open (not a good thing).
So I do the 'netstat -pl' command to see who has that socket open and, low and behold, it happens to be syslog-ng. So I'm thinking that's kinda odd, there's no reason that syslog-ng should have the shell port open for any reason. Looking at my syslog-ng.conf file, the only sources I have defined are: source src { unix-stream("/dev/log"); internal(); pipe("/proc/kmsg"); udp(); tcp(max_connections(10)); }; These, to me, do not look like they should result in an open shell port. Anyone out there with ideas as to why it is opened by syslog-ng and how I can get it closed down? Thanks! Dave -- gentoo-user@gentoo.org mailing list