[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: Secure remote syslogging?



Stefan Neufeind <stefan@neufeind.net> wrote:
> what is the best way to remotely syslog? In

Use a dedicated machine. Cut the 'transmit' pair in the CAT5 cable.
syslog is UDP, which is only one-way, so it doesn't need to transmit.

Obviously you'll have no remote access to the syslog server, but neither
will an attacker.

Or, print each syslog message as it's received. Your attacker will have
to work the printer hard enough to set it on fire to destroy your logs.

http://www.techimo.com/photo/showphoto.php?photo=3067

> I make it secure that there can't exist any log-entries somebody 
> "faked" into our remote-syslog-file?

You can't really authenticate a syslog entry, they carry no
authentication information. Try this:
logger -p kern.crit Kernel panic\!

You'll just have to work out somehow which messages are real and which
are fake.
-- 
Sam "Eddie" Couter  |  mailto:sam@couter.dropbear.id.au
Debian Developer    |  mailto:eddie@debian.org
                    |  jabber:sam@teknohaus.dyndns.org
OpenPGP fingerprint:  A46B 9BB5 3148 7BEA 1F05  5BD5 8530 03AE DE89 C75C

Attachment: pgpnWclRrMYoJ.pgp
Description: PGP signature


Reply to: