>I hope someone can help me. I wish to know how to configure a SECURE REMOTE
>LOGGING host.
>

Check out the Linux Administrator's Security Guide 
(http://www.securityportal.com/lasg/logging/).  It describes some basic security 
measures like chattr'ing log files and the use of alternatives to syslog.

I once saw an article which describes another method.  It involves a bit of hacking of 
syslog on the "clients" such that it uses a different default configuration file (say 
/usr/local/bin/yes instead of /etc/syslog.conf).  Of course, there should exist a 
"dummy" /etc/syslog.conf.  This way if any of the clients are compromised, the 
attacker could not easily determine the loghost's address.

Obviously, the basic rule of limiting the services to the barest minimum (syslogd and 
sshd only?) running on any "sensitive" host should be observed.

HTH,
abramos


__________________________________
www.edsamail.com
_
Philippine Linux Users Group. Web site and archives at http://plug.linux.org.ph
To leave: send "unsubscribe" in the body to [EMAIL PROTECTED]

To subscribe to the Linux Newbies' List: send "subscribe" in the body to 
[EMAIL PROTECTED]

Reply via email to