For my usage, I need two modes of operation for syslog daemons. 

    1 - local syslog. Requires privileges to on local devices (/dev/log,
        /dev/klogd or similar), write to local log-files, and send to
        remote log server.

    2 - central log server. Only listen on the needed network ports
        (514/udp/tcp), and write to local log files (possibly also send
        to other remote log servers).

For #1 I think it's OK not being able to chroot, keep more privileges,
etc.,  as the attacks against it will mostly be from local processes.

#2 needs to be *very* openly available on the network ports, since all 
my servers needs to send logs to it. #2 will also be holding a lot more
sensitive data than #1, so I think this server needs to be protected as
much as possible. If chroot'ing, or dropping privileges prevents it from
reading from local /proc og /dev, I think that wouldn't matter much. One
could always run two instances on these few central servers, i.e. #1
sending to #2.


  -jf

_______________________________________________
rsyslog mailing list
http://lists.adiscon.net/mailman/listinfo/rsyslog
http://www.rsyslog.com

Reply via email to