The reason this works for me is not because of the scenario's you have 
outlined, but because command line interaction with production servers are only 
limited to admins (3 people). Where I'm coming from is more of an audit trail. 
I want to know (if by some miracle) that if a server is broken into I can see 
what commands were put in and what was done. That's it....I do see the points 
of view on it. If I had regular users that needed access to the command line or 
what not, then yeah I could see that being an issue. 


----------------------------------------------------------------
This is a good point, but you are missing the fact that you are already logging 
passwords.

You are logging failed login attempts, right?

I guarantee you that at some point a user will get out of sync with the login 
prompt and type their password into the userid field, and therefor you will 
have that user's password in the logs (usually followed almost immediatly by 
the userid as the user realizes their mistake and logs in correctly)

So you really need to be protecting your log data and/or implement something 
better than simple password authentication.

David Lang
_______________________________________________
rsyslog mailing list
http://lists.adiscon.net/mailman/listinfo/rsyslog
http://www.rsyslog.com/professional-services/
What's up with rsyslog? Follow https://twitter.com/rgerhards
NOTE WELL: This is a PUBLIC mailing list, posts are ARCHIVED by a myriad of 
sites beyond our control. PLEASE UNSUBSCRIBE and DO NOT POST if you DON'T LIKE 
THAT.

Reply via email to