[55401] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Is it time to block all Microsoft protocols in the core?

daemon@ATHENA.MIT.EDU (Joe Abley)
Tue Jan 28 14:40:53 2003

Date: Wed, 29 Jan 2003 01:25:09 +0545
Cc: nanog@merit.edu
To: Sean Donelan <sean@donelan.com>
From: Joe Abley <jabley@isc.org>
In-Reply-To: <Pine.GSO.4.44.0301270247250.18344-100000@clifden.donelan.com>
Errors-To: owner-nanog-outgoing@merit.edu



On Monday, Jan 27, 2003, at 14:04 Asia/Katmandu, Sean Donelan wrote:

> Its not just a Microsoft thing.  SYSLOG opened the network port by
> default, and the user has to remember to disable it for only local
> logging.

You're using mixed tense in these sentences, so I can't tell whether=20
you think that syslog's network port is open by default on operating=20
systems today.

On FreeBSD, NetBSD, OpenBSD and Darwin/Mac OS X (the only xterms I=20
happen to have open right now) this is not the case, and has not been=20
for some time. I presume, perhaps na=EFvely, that other operating =
systems=20
have done something similar.

>> [...]
>>
>> DESCRIPTION
>>      syslogd reads and logs messages to the system console, log=20
>> files, other
>>      machines and/or users as specified by its configuration file.
>>
>>      The options are as follows:
>>
>> [...]
>>
>>      -u      Select the historical ``insecure'' mode, in which=20
>> syslogd will
>>              accept input from the UDP port.  Some software wants=20
>> this, but
>>              you can be subjected to a variety of attacks over the=20
>> network,
>>              including attackers remotely filling logs.
>>
>> [...]


Joe


home help back first fref pref prev next nref lref last post