For my usage, I need two modes of operation for syslog daemons.
1 - local syslog. Requires privileges to on local devices (/dev/log,
/dev/klogd or similar), write to local log-files, and send to
remote log server.
2 - central log server. Only listen on the needed network ports
(514/udp/tcp), and write to local log files (possibly also send
to other remote log servers).
For #1 I think it's OK not being able to chroot, keep more privileges,
etc., as the attacks against it will mostly be from local processes.
#2 needs to be *very* openly available on the network ports, since all
my servers needs to send logs to it. #2 will also be holding a lot more
sensitive data than #1, so I think this server needs to be protected as
much as possible. If chroot'ing, or dropping privileges prevents it from
reading from local /proc og /dev, I think that wouldn't matter much. One
could always run two instances on these few central servers, i.e. #1
sending to #2.
-jf
_______________________________________________
rsyslog mailing list
http://lists.adiscon.net/mailman/listinfo/rsyslog
http://www.rsyslog.com