On 8/4/05, poncenby <[EMAIL PROTECTED]> wrote:
> I remember asking how to stop syslogd opening udp port 514 a while ago
> and never doing anything about it, here goes again...
Sure, syslogd opens UDP/514, but unless you use the '-u' flag the very
next thing it does is call shutdown(), which prevents inbound traffic on
the "listening" port:
http://www.bsdforums.org/forums/showthread.php?t=33250
> reading the man page doesn't really answer why there is program
> listening on udp 514, seeing as I haven't passed syslogd the -u switch
>
> -u Select the historical ``insecure'' mode, in which syslogd will
> accept input from the UDP port. Some software wants this, but
> you can be subjected to a variety of attacks over the network,
> including attackers remotely filling logs.
>
> can anyone point me in the right direction so this annoying behaviour stops.
I agree, it is (mildly) annoying.
The syslog daemon must bind UDP/514 even without the '-u' flag because
syslogd uses this socket as the source port if/when you configure a
remote log destination in /etc/syslogd.conf.
FreeBSD has the '-s -s' flag which prevents the daemon from binding the
port at all, but this is not necessary as a security enhancement, forcing
syslogd not to bind the port is purely cosmetic, makes your netstat
output shorter by one line.
Kevin Kadow