If remoted is failing, it is likely you have another program running on 
that port that remoted is trying to bind to. For example, syslog is a 
common application on UNIX/BSD/Linux systems, and uses port 514.  If you 
also attempt to use port 514 for remoted, you will get a conflict and 
remoted will exit. OSSEC uses 1514 for its default event data, so if you 
want to collect syslog data for analysis, port 1515 would be a good logical 
choice.

Another issue exists with remoted when you attempt to bind to port numbers 
less than 1024 -- anything less than 1024 is privileged (root only). 
Because OSSEC runs as user ossec, you cannot bind to ports lower than 1024 
on most *NIX systems unless the attachment occurs prior to the change to 
user ossec. This privileged port restriction is by design (for example, it 
prevents a non-root user from running a rogue SSH server to collect userids 
and passwords on port 22, or a user from running their own email server on 
port 25). Unless you write a lot of UNIX socket code or you have extensive 
UNIX admin experience, most people are unaware of the privileged port 
restriction issue. It would probably be useful to note this information in 
the documentation to alleviate confusion. Best,

Dave Stoddard
Network Alarm Corporation
https://networkalarmcorp.com
301-850-0668 x101

-- 

--- 
You received this message because you are subscribed to the Google Groups 
"ossec-list" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to ossec-list+unsubscr...@googlegroups.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to