On Wed, 20 Oct 1999, Darren Reed wrote:

 > > Not really. The protocol should be able to work without multiple
 > > channels or out-of-band data, or we need an underlying packet transport
 > > mechanism. And any additional mechanism increases the possibility of a
 > > buffer overrun/remote root attack, which I, if I cannot avoid this on the
 > > server, still want my logging host to be exempt from.

 > You're confused about what you're using your serial device as.  Unless you
 > are using "custom software" with syslogd, your serial devices are being
 > treated as storage devices by syslogd, not remote syslog daemons.  This
 > effort is to build/describe a protocol which provides a more reliable and
 > secure mechanism for syslog daemons to talk to each other - not where they
 > store messages.

Using the serial device as a pure storage device has two disadvantages:
You get no acknowledge and you can very easily send any amount of any data
to it.

 > > > >  - Compression of equal/similar(?) lines at the originating host.

 > I think that is an implementation issue.  A protocol (which is what we're
 > here for) should dictate how messages are formatted and sent.  That "300x"
 > thing is fluff and may be represented differently for different
 > implementations.

There should be a machine-readable format on the wire. Everything else is
implementation dependant.

 > It is of *vital* importance (as I'm sure audit people will agree) that it
 > is possible to store each message that is generated and none of this
 > compression thing with "multiple matching messages received" crap.

Well, I match protocols against my needs and see whether they will be
usable for me. I have a slow machine running Linux with a soundcard doing
remote logging. Whenever I record sound, several thousand recording
overruns happen, each of them getting logged. Having that stuff compressed
away on the network would be very fine.

I think we all could live with a configuration option in syslogd. Just
leave the possibility in the protocol and add a small note to the protocol
spec that this should be optional.

    Simon

PGP public key available from ftp://phobos.fs.tum.de/pub/pgp/geier.asc
  Fingerprint: 10 62 F6 F5 C0 5D 9E D8  47 05 1B 8A 22 E5 4E C1

Reply via email to