7.5 Prevent Syslog from accepting messages from network. Check if 'LOG_FROM_REMOTE' is set to NO in file /etc/default/syslogd

Information

By default the system logging daemon, syslogd, listens for log messages from other systems on network port 514/udp. Unfortunately, the protocol used to transfer these messages does not include any form of authentication, so a malicious outsider could simply barrage the local system's syslog port with spurious traffic either as a denial of service attack on the system, or to fill up the local system's logging file systems so that subsequent attacks will not be logged.

See Also

https://workbench.cisecurity.org/files/633

Item Details

Audit Name: CIS Solaris 9 v1.3

Category: AUDIT AND ACCOUNTABILITY

References: 800-53|AU-9(2)

Plugin: Unix

Control ID: 164f3713384e2bbe39aa18497836a326e0b55ca5b3924a5454fe781b8c7370da