6.1.3 Configuring syslog - remote messages - remote messages

Information

This recommendation prevents the local syslogd daemon from accepting messages from other hosts on the network.

Rationale:

Apart from a central syslog server, all other hosts should not accept remote syslog messages. By default the syslogd daemon accepts all remote syslog messages as no authentication is required. This means that a hacker could flood a server with syslog messages and potentially fill up the /var filesystem.

Solution

If the server does not act as a central syslog server, suppress the logging of messages originating from remote servers:

chssys -s syslogd -a '-r'

Re-cycle syslogd to activate the configuration change:

stopsrc -s syslogd
startsrc -s syslogd

Default Value:

Not configured

Additional Information:

Reversion:

Remove the suppression of remote syslog messages:

chssys -s syslogd -a ''

Re-cycle syslogd to activate the configuration change:

stopsrc -s syslogd

startsrc -s syslogd

See Also

https://workbench.cisecurity.org/files/4119

Item Details

Category: AUDIT AND ACCOUNTABILITY

References: 800-53|AU-6(3), CSCv7|6.5

Plugin: Unix

Control ID: 5f4ffb0a9d3f6250f2f0cda0a0fa7c2b08b554557be7b0b8ee22f9d20be6bdc1