Marek Michalkiewicz <marekm@I17LINUXB.ISTS.PWR.WROC.PL> wrote:
: It seems that most of the RedHat 5.3.12 security patches are in the
: standard 5.4.17, except for the patch below. Also, there are more
: (different) fixes in 5.4.18 (check h_length against sizeof(sin_addr)
: in inet/rcmd.c and inet/rexec.c).
: + {
: + syslog(LOG_NOTICE|LOG_AUTH,
: + "Attempt to feed me an
overlong A record. Probably a breakin attempt.");
: + host.h_length=4;
: + }
This came from the linux-server list. But reminded me of a something I
wanted to know about. Is there a standard for people to syslog possible
security violations? This would make it easier to find them in huge log
files with swatch or other monitoring tools.
[mod: Except for the LOG_AUTH "priority" field, probably not.... --
REW]
--
-Matt (panzer@dhp.com) -- DataHaven Project - http://www.dhp.com/
"That which can never be enforced should not be prohibited."
Andrew G. Morgan
1997-Jan-04 09:12 UTC
Re: [linux-security] Re: libc bugs (was Re: Distributions...)
Matt wrote:> This came from the linux-server list. But reminded me of a something I > wanted to know about. Is there a standard for people to syslog possible > security violations? This would make it easier to find them in huge log > files with swatch or other monitoring tools. > > [mod: Except for the LOG_AUTH "priority" field, probably not.... -- REW]This is something that would interest me. For Linux-PAM there are some comments in the programming notes of the Linux-PAM Module writers'' guide. They are not very complete (ammendments welcome), but they are a start. The various Linux-PAM guides are available from the addresses in my .sig file. Regards Andrew -- Linux-PAM, libpwdb, Orange-Linux and Linux-GSS http://parc.power.net/morgan/index.html [ For those that prefer FTP --- ftp://ftp.lalug.org/morgan ]
David Holland
1997-Jan-04 13:17 UTC
Re: [linux-security] Re: libc bugs (was Re: Distributions...)
> This came from the linux-server list. But reminded me of a something I> wanted to know about. Is there a standard for people to syslog possible > security violations? This would make it easier to find them in huge log > files with swatch or other monitoring tools. > > [mod: Except for the LOG_AUTH "priority" field, probably not.... -- REW] Far as I know there isn''t. What I did on one system where I cared about this was write a set of postprocessing scripts that sorted log messages via regexp. Anything unusual, of course, ended up in a place where it got particular attention... Has anyone considered dropping this LOG_* stuff (which, under the best of circumstances, doesn''t work that well) and added regexp matching to syslogd? -- - David A. Holland | VINO project home page: dholland@eecs.harvard.edu | http://www.eecs.harvard.edu/vino