Red Condor Syslog Server Configurations



Similar documents
NTP and Syslog in Linux. Kevin Breit

Network Monitoring & Management Log Management

NAS 272 Using Your NAS as a Syslog Server

Cisco Setting Up PIX Syslog

SYSLOG 1 Overview... 1 Syslog Events... 1 Syslog Logs... 4 Document Revision History... 5

Network Monitoring & Management Log Management

Syslog & xinetd. Stephen Pilon

Network Monitoring & Management Log Management

CERT-In Indian Computer Emergency Response Team Handling Computer Security Incidents

Kiwi SyslogGen. A Freeware Syslog message generator for Windows. by SolarWinds, Inc.

Security Correlation Server Quick Installation Guide

Security Correlation Server Quick Installation Guide

Tools. (Security) Tools. Network Security I-7262a

EMC VNX Version 8.1 Configuring and Using the Audit Tool on VNX for File P/N Rev 01 August, 2013

Eventlog to Syslog v4.5 Release 4.5 Last revised September 29, 2013

WinAgentLog Reference Manual

Log Forwarder for Windows SolarWinds, Inc.

Configuring LocalDirector Syslog

logstash The Book Log management made easy James Turnbull

RSA Authentication Manager

Configuring System Message Logging

Users Manual OP5 Logserver 1.2.1

Configuring System Message Logging

An Introduction to Syslog. Rainer Gerhards Adiscon

Syslog Monitoring Feature Pack

Computer Security DD2395

Knowledge Base Articles

Presented by Henry Ng

The Ins and Outs of System Logging Using Syslog

Using Syslog C H A P T E R. Overview of Syslog

Getting Started in Red Hat Linux An Overview of Red Hat Linux p. 3 Introducing Red Hat Linux p. 4 What Is Linux? p. 5 Linux's Roots in UNIX p.

Using Debug Commands

Lab 5.5 Configuring Logging

The syslog-ng Premium Edition 5LTS

Configuring System Message Logging

The syslog-ng Premium Edition 5F2

About this Getting Started Guide. Enabling Log Management... 2 Applying a License... 4 Using Log Management How to forward logs...

PIM SOFTWARE TR50. Configuring the Syslog Feature TECHNICAL REFERENCE page 1

syslog - centralized logging

Using Debug Commands

System Log Setup (RTA1025W Rev2)

Configuring Syslog Server on Cisco Routers with Cisco SDM

Syslog (Centralized Logging and Analysis) Jason Healy, Director of Networks and Systems

Using RADIUS Agent for Transparent User Identification

Alert Logic Log Manager

Linux Networking Basics

Chapter 8 Monitoring and Logging

Device Integration: Checkpoint Firewall-1

System Message Logging

Network Monitoring. SAN Discovery and Topology Mapping. Device Discovery. Topology Mapping. Send documentation comments to

Chapter 9 Monitoring System Performance

Using Debug Commands

Configuring Logging. Information About Logging CHAPTER

Topics. CIT 470: Advanced Network and System Administration. Logging Policies. System Logs. Throwing Away. How to choose a logging policy?

Using Likewise Enterprise to Boost Compliance with Sarbanes-Oxley

Linux MDS Firewall Supplement

logstash The Book Log management made easy James Turnbull

Syslog Windows Tool Set (WTS) Configuration File Directives And Help

Logging with syslog-ng, Part One

RSA Event Source Configuration Guide. McAfee Firewall Enterprise

Protecting and controlling Virtual LANs by Linux router-firewall

Chapter 4 Restricting Access From Your Network

Table of Contents INTRODUCTION About EventLog Analyzer... 4 Release Notes... 5 INSTALLATION AND SETUP... 7

Configuring System Message Logging

orrelog SNMP Trap Monitor Software Users Manual

Owner of the content within this article is Written by Marc Grote

Firewall Setup. Contents. Getting Started 2. Running A Firewall On A Mac Server 2. Configuring The OS X Firewall 3. Remote Rumpus Administration 4

ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details

TECHNICAL NOTE. Technical Note P/N REV 03. EMC NetWorker Simplifying firewall port requirements with NSR tunnel Release 8.

Sys::Syslog is an interface to the UNIX syslog(3) program. Call syslog() with a string priority and a list of printf() args just like syslog(3).

SYSLOG Client User Manual

Where can I install GFI EventsManager on my network?

Guidelines for Auditing and Logging

RSA Security Analytics

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

Table Of Contents INTRODUCTION About EventLog Analyzer... 5 Release Notes... 6 INSTALLATION AND SETUP... 8

Firewalls (IPTABLES)

Service Managed Gateway TM. How to Configure a Firewall

Table Of Contents INTRODUCTION...4. About EventLog Analyzer... 5 Release Notes... 6 INSTALLATION AND SETUP...8

Introduction to Network Security Lab 1 - Wireshark

Linux System Administration. System Administration Tasks

Course Title: Penetration Testing: Security Analysis

Active FTP vs. Passive FTP, a Definitive Explanation

Where can I install GFI EventsManager on my network?

Distributed syslog architectures with syslog-ng Premium Edition

Chapter 3 Restricting Access From Your Network

PCI DSS Best Practices with Snare Enterprise Agents PCI DSS Best Practices with Snare Enterprise Agents

Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst

EventTracker Windows syslog User Guide

Review Quiz 1. What is the stateful firewall that is built into Mac OS X and Mac OS X Server?

Device Integration: CyberGuard SG565

Syslog Server Configuration on Wireless LAN Controllers (WLCs)

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

How To Configure Syslog over VPN

Sys::Syslog is an interface to the UNIX syslog(3) program. Call syslog() with a string priority and a list of printf() args just like syslog(3).

Transcription:

Red Condor Syslog Server Configurations May 2008

2

Red Condor Syslog Server Configurations This application note describes the configuration and setup of a syslog server for use with the Red Condor mail exchanger. This scenario configures the Red Condor mail exchanger to log remotely to a properly configured syslog server. What is Syslog? Syslog is a client-server protocol for IP networks, as defined in RFC 3164. Syslog uses UDP on port number 514. Syslog clients are implemented in devices ranging from home wireless routers to mainframes. Syslog has become the de facto standard for logging. The protocol defines 24 facilities and 8 severities, as shown in the following tables: Numerical Code Facility 0 kernel messages 1 user-level messages 2 mail system 3 system daemons 4 security/authorization messages 5 messages generated internally by syslogd 6 line printer subsystem 7 network news subsystem 8 UUCP subsystem 9 clock daemon 10 security/authorization messages 11 FTP daemon 12 NTP subsystem 13 log audit 14 log alert 15 clock daemon 16 local use 0 (local0) 3

17 local use 1 (local1) 18 local use 2 (local2) 19 local use 3 (local3) 20 local use 4 (local4) 21 local use 5 (local5) 22 local use 6 (local6) 23 local use 7 (local7) Numerical Code Severity 0 Emergency: system is unusable 1 Alert: action must be taken immediately 2 Critical: critical conditions 3 Error: error conditions 4 Warning: warning conditions 5 Notice: normal but significant condition 6 Informational: informational messages 7 Debug: debug-level messages Security Concerns The syslog service was initially designed as a networked logging service using an unauthenticated UDP socket for message delivery. Before long, Denial of Service (DOS) attacks on the syslog service began to surface, and vendors began to change the default configurations to use (host-only) UNIX domain sockets. This document discusses transmission of log messages from a Red Condor mail exchanger to a remote logging host, and requires allowing incoming network connections from this remote logging host. Be aware of the dangers of doing this, and take steps to protect the logging host. The following methods supply adequate protection: A firewall that allows only known logging clients to connect to your syslog daemon. A syslog daemon configured to only bind to an internal interface. In addition to the DOS threat of inundating the logging host with huge numbers of nuisance messages, there is the threat of log file growth without bound. This can easily happen with legitimate logging messages, especially if logging verbosity is increased (for example, for debugging purposes) and then forgotten. To mitigate this threat: 4

Use built-in log file size limiting directives. Use an external log file rotation facility, like logrotate (http://sourceforge.net/projects/logrotate). Red Condor recommends logrotate to reduce the hazard of self-inflicted DOS. UNIX/Linux Syslog Servers syslogd Syslogd is the traditional syslog server, originating in early BSD UNIX distributions. It is configured with a single file (syslog.conf) typically located in /etc. The standard syslogd server has very little filtering capability. It can direct messages of a given facility-severity tuple to an individual output file, or to a remote host. Multiple facility-severity tuples are commonly directed to the same destination. After determining the facility that the Red Condor mail exchanger is logging to, configuration of syslogd is straightforward. For example, assume the Red Condor mail exchanger is logging to 'local7'. Simply add the line: local7.* /some/log/file to /etc/syslog.conf and restart the logging daemon. Configuring syslogd to accept connections from remote hosts, however, is typically not done in /etc/syslog.conf. Rather it is a command line option when the daemon is started. To ensure syslogd is started with the proper options, investigate the mechanism by which services are started. For example with: Solaris: start syslogd with a '-T' option to allow it to receive remote log messages. HP-UX: specify '-N' to not listen for log messages on a socket. Linux: run syslogd, a '-r' option to allow it to receive remote log messages. On Solaris systems, syslog is started with the 'svc' subsystem. Most other platforms use some form of init. Consult your vendor documentation for the exact requirements. 5

syslog-ng Syslog-ng is a second-generation logger intended to replace syslog on UNIX and Linux systems. It is also available with Cygwin for Windows systems. Red Condor recommends syslog-ng for logging mail exchanger messages. Syslog-ng has flexible message filtering capabilities. All relevant configurations are done in the config file syslog-ng.conf. Some distributions place this file in /etc/syslogng/syslog-ng.conf, others put it in /etc/syslog-ng.conf. To configure syslog-ng to receive remote logging messages, add a line in the source block of the format: udp(ip( 0.0.0.0 ) port(514)); This will allow incoming log messages from anywhere. To restrict incoming messages to a specific interface, change the 0.0.0.0 to the IP address of the interface on the logging host that you want to receive messages. Next, make a filter specification to select your Red Condor mail exchanger messages. For example: filter f_rci { facility(local7); }; #assuming Red Condor logs on local7 Finally, specify a logging destination. For example: destination RCI_Log { file( /var/log/rcilog ); }; log { source(src); filter(f_rci); destination(rci_log); }; Since syslog is an integral part of any system, these lines must be merged into an existing configuration. You can make further configurations to ensure proper file permissions, timestamp messages, and so forth. Windows Syslog Servers Perhaps in a nod to syslog's dominance, most Windows syslog software available is designed to send eventlog events to a remote syslog server. A few syslog servers exist. Configure one to forward syslog events to the Windows Event Log. Microsoft Windows Services for UNIX Windows Services for UNIX is distributed free of charge by Microsoft. It supplies a syslog daemon similar to syslogd discussed in syslogd (on page 5). 6

The syslogd supplied does not log to the Windows Event Log. Rather it is completely orthogonal to the traditional Windows logging facility. By using the supplied korn shell, and the supplied editor /bin/vi you can edit /etc/syslog.conf to send logging with the correct facility and severity to a log file. See syslogd (on page 5) for more information. Cygwin syslog-ng Cygwin's syslog-ng configures exactly the same as described above for UNIX/Linux systems. Red Condor recommends using Cygwin and syslog-ng on Windows systems for syslog logging. See http://www.cygwin.com for more information about Cygwin. After installing Cygwin and syslog-ng, the program /usr/bin/syslog-ng-configure will create a default setup that can then be further customized. CodeProject Syslog Daemon for Windows Event Log The CodeProject Syslog daemon for Windows Event Log, (http://www.codeproject.com/kb/ip/syslogd.aspx) is a C# demonstration project that nonetheless might be interesting because it offers tight integration with the Windows Event Log. Further Reading For more information about the Windows Event Log/Event Viewer, visit: http://www.syslog.org/wiki/eventlog/eventlogwiki. Mac OS-X Syslog Mac OS-X Syslog is similar in functionality to the traditional syslogd discussed in syslogd (on page 5). However, syslog-ng can easily replace it. Since OS-X is UNIX, configuration is similar to the methods outlined above. 7

8