[lug] logs

John Hernandez John.Hernandez at noaa.gov
Mon Jul 30 14:21:01 MDT 2001

The best solution that comes to mind is having some type of "syslog appliance" -- strip down the functionality to just the bare bones.  I think NFR markets precisely such a toaster.  As Stimits mentioned, CD-R (or better DVD-R) are probably good storage mediums because they are indelible.

Sean Reifschneider wrote:
> On Mon, Jul 30, 2001 at 01:47:47AM -0600, D. Stimits wrote:
> >out in the first place. Sending logs via email to a machine that is
> >completely isolated from the breached machine is a way to do that
> >(separate machines with no direct interface).
> Sendmail has had more exploits than syslogd.  I don't see why moving to a
> more complex setup that's using software with a history of more exploits
> against it would make it more secure.
> Sean
> --
>  Give me immortality or give me death!
> Sean Reifschneider, Inimitably Superfluous <jafo at tummy.com>
> tummy.com - Linux Consulting since 1995. Qmail, KRUD, Firewalls, Python
> _______________________________________________
> Web Page:  http://lug.boulder.co.us
> Mailing List: http://lists.lug.boulder.co.us/mailman/listinfo/lug


  - John Hernandez - Network Engineer - 303-497-6392 -
 |  National Oceanic and Atmospheric Administration   |
 |  Mailstop R/OM12. 325 Broadway, Boulder, CO 80305  |

More information about the LUG mailing list