[lug] logs
John Hernandez
John.Hernandez at noaa.gov
Mon Jul 30 14:21:01 MDT 2001
The best solution that comes to mind is having some type of "syslog appliance" -- strip down the functionality to just the bare bones. I think NFR markets precisely such a toaster. As Stimits mentioned, CD-R (or better DVD-R) are probably good storage mediums because they are indelible.
Sean Reifschneider wrote:
>
> On Mon, Jul 30, 2001 at 01:47:47AM -0600, D. Stimits wrote:
> >out in the first place. Sending logs via email to a machine that is
> >completely isolated from the breached machine is a way to do that
> >(separate machines with no direct interface).
>
> Sendmail has had more exploits than syslogd. I don't see why moving to a
> more complex setup that's using software with a history of more exploits
> against it would make it more secure.
>
> Sean
> --
> Give me immortality or give me death!
> Sean Reifschneider, Inimitably Superfluous <jafo at tummy.com>
> tummy.com - Linux Consulting since 1995. Qmail, KRUD, Firewalls, Python
> _______________________________________________
> Web Page: http://lug.boulder.co.us
> Mailing List: http://lists.lug.boulder.co.us/mailman/listinfo/lug
--
- John Hernandez - Network Engineer - 303-497-6392 -
| National Oceanic and Atmospheric Administration |
| Mailstop R/OM12. 325 Broadway, Boulder, CO 80305 |
----------------------------------------------------
More information about the LUG
mailing list