[1576] in bugtraq

home help back first fref pref prev next nref lref last post

Re: syslog (WAS: chroot'ed environment?)

daemon@ATHENA.MIT.EDU (Tom Fitzgerald)
Fri Apr 21 22:11:06 1995

From: Tom Fitzgerald <fitz@wang.com>
To: bugtraq@fc.net
Date: Fri, 21 Apr 95 19:52:56 EDT
In-Reply-To: <199504210059.JAA09483@hibiya>; from "Marc Samama" at Apr 21, 95 9:59 am

> The only thing that bothers me is that I didnt want syslogd to listen on its
> UDP port, but i guess I will just check the address of the incoming packets
> against the loopback address. (Didn't try that yet, thougth.)

Packets can be made to show up on your ethernet port with 127.0.0.1 as the
source and destination.

Though I guess if you make sure that the packets have loopback for both
source and destination, and make sure that there are no source-routing
options, then either spoofed packets have from systems on the local LAN, or
your routers have been hacked.

-- 
Tom Fitzgerald    1-508-967-5278    Wang Labs, Lowell MA, USA    fitz@wang.com

home help back first fref pref prev next nref lref last post