On Fri, 20 Apr 2012, Jo Rhett wrote:

the string <190> is the encoded priority and severity of the message (in this 
case local7.user). A properly formatted syslog message will have this (try sending a 
message with the format RSYSLOG_Traditional_Forward_Format and you should see a 
similar thing before the timestamp) If this is breaking the message parsing, the 
receiving system is broken

I think you mean local7.info? ;-) Thanks for the explanation. Anyway, if I just send a message directly to it the system works fine so this isn't apparently a problem. It's just having issues with the udpspoofed messages.

oops yes

Here's some examples -- msg:2:2048 created with logger -p local7.info "123 This is 
another test message" and forwarded via udpspoof

0000  78 2b cb 29 ff 1b 00 26  b9 33 00 3a 08 00 4a 00   x+.)...& .3.:..J.
0010  00 52 00 f2 00 00 40 11  b6 bd 0a d2 82 76 0a d2   .R....@. .....v..
0020  1e ca 00 01 01 01 01 01  01 01 01 01 01 00 01 01   ........ ........
0030  00 01 00 01 01 00 07 7d  05 ea 00 2a 63 a3 31 32   .......} ...*c.12
0040  33 20 54 68 69 73 20 69  73 20 61 6e 6f 74 68 65   3 This i s anothe
0050  72 20 74 65 73 74 20 6d  65 73 73 61 67 65 2e 0a   r test m essage..

rawmsg created with logger -p local7.info 123 "This is another test message" 
and forwarded via udpspoof

0000  78 2b cb 29 ff 1b 00 26  b9 33 00 3a 08 00 4a 00   x+.)...& .3.:..J.
0010  00 79 00 f2 00 00 40 11  b6 9a 0a d2 82 76 0a d2   .y....@. .....v..
0020  1e ca 01 00 01 01 00 00  00 01 01 01 01 00 00 00   ........ ........
0030  01 01 01 00 01 00 02 7d  05 ea 00 51 33 98 3c 31   .......} ...Q3.<1
0040  39 30 3e 41 70 72 20 32  30 20 31 31 3a 30 30 3a   90>Apr 2 0 11:00:
0050  30 36 20 73 32 32 2d 77  77 77 30 38 20 6a 6f 72   06 s22-w ww08 jor

Here's a normal syslog message from the same host sent directly, not forwarded 
by udpspoof: you might recognize the message ;-)

0000  78 2b cb 29 ff 1b 00 26  b9 33 00 3a 08 00 45 00   x+.)...& .3.:..E.
0010  00 6d 00 00 40 00 40 11  e7 53 0a d2 1e bf 0a d2   .m..@.@. .S......
0020  1e ca cb aa 05 ea 00 59  32 64 41 70 72 20 32 30   .......Y 2dApr 20
0030  20 31 37 3a 35 39 3a 33  37 20 73 32 32 2d 66 32    17:59:3 7 s22-f2
0040  30 31 20 6b 65 72 6e 65  6c 3a 20 69 6d 6b 6c 6f   01 kerne l: imklo
0050  67 20 35 2e 38 2e 31 30  2c 20 6c 6f 67 20 73 6f   g 5.8.10 , log so

looking at these dumps, I don't think the problem is the <190>, I think the 
problem is the three characters before that (Q3. in the text represnetation), those 
start at the same point that the timestamp starts in the last example.

Actually the timestamp starts like 18 bytes earlier in the normal non-spoofed 
example. Similar position in the row, but a whole row earlier.

note that the last example is missing the priority/severity information. This 
is unfortunantly not an uncommon bug.

That is straight from the following line in rsyslog.conf, so if that is broken 
then it's an rsyslog bug:

kern.info                       @[zenhost]:1154

what is your default template? if you could run a quick test and add ;RSYSLOG_Traditional_Forward_Format to the line and see if you get the format I am expecting.

the fact that the contents is starting so much later in the omspoof version is definantly a bug. I wonder what it thinks it's doing? could you write to a file using the same template and see what shows up in the file?

David Lang
_______________________________________________
rsyslog mailing list
http://lists.adiscon.net/mailman/listinfo/rsyslog
http://www.rsyslog.com/professional-services/
What's up with rsyslog? Follow https://twitter.com/rgerhards

Reply via email to