Well, that's actually a broader question. You can repeat it for any other output. Granted, it may not disturb the admin from doing something but an attack could still exhaust resources like file system or database space or ...
The key point is to guard the ingres points. That's even better to do today than in the distant past, because rate-limiting applies on a per-process basis. more inline below... On Tue, May 6, 2014 at 1:49 PM, Thomas D. <[email protected]> wrote: > Hi, > > in most configurations you will find a directive like > > > *.emerg action( > > type="omusrmsg" > > Users="*" > > ) > > or > > > *.alert action( > > type="omusrmsg" > > Users="root" > > Users="operator" > > ) > > Now I wanted to see if it is possible to disturb the administrator > (root) from doing its job as user. So I run > > $ logger -p local0.alert -t flood-test I am flooding root > > as user in loop. > > The messages appeared as expected in root's terminal, so root was unable > to do something. The messages appeared from "syslogd". > > Also, "# mesg n" as root didn't stop that. > > Like I have learned today, "$RepeatedMsgReduction = on" just before the > omusrmsg actions wouldn't help when the "attacker" uses logger. > wouldn't stop any decent attacker. I would just insert random gibberish. Rate-limiting, however, does not look at the message content but at the message rate, and it will stop this -- except, if it different sources (e.g. processes) are used. > > How to react on this issue when this will happen? Stopping (r)syslog is > not an option, because this will stop logging (this is what an attacker > would want... doing something which won't be logged). > > And this doesn't need to be an attack at all. Think about a RAID > monitoring tool which goes crazy when your RAID degraded... > > That's a case for rate-limiting. Note that we had imuxsock ratelimiting active by default for some time, and received soooo many complains about missing log records that we disabled it by default. Another thing that you can do (and probably should) is to make sure that only such and such many messages get through during a time interval. There is an option to specify how often an action at most should be executed. It is usually used with ommail and I think this would solve your case. A sample is in the ommail doc. Rainer I have the feeling that I am missing something. If not, the usage of > "omusrmsg" shouldn't be recommended, is it? > > -Thomas > _______________________________________________ > rsyslog mailing list > http://lists.adiscon.net/mailman/listinfo/rsyslog > http://www.rsyslog.com/professional-services/ > What's up with rsyslog? Follow https://twitter.com/rgerhards > NOTE WELL: This is a PUBLIC mailing list, posts are ARCHIVED by a myriad > of sites beyond our control. PLEASE UNSUBSCRIBE and DO NOT POST if you > DON'T LIKE THAT. > _______________________________________________ rsyslog mailing list http://lists.adiscon.net/mailman/listinfo/rsyslog http://www.rsyslog.com/professional-services/ What's up with rsyslog? Follow https://twitter.com/rgerhards NOTE WELL: This is a PUBLIC mailing list, posts are ARCHIVED by a myriad of sites beyond our control. PLEASE UNSUBSCRIBE and DO NOT POST if you DON'T LIKE THAT.

