402
C
HAPTER
16: N
ETWORK
M
ANAGEMENT
the CONTENT field. Traditionally, however, only the hostname has been
included in the HOSTNAME field.
Originating Process Information in MSG
You might want to include some information about the process on the
device that generated the message. This information usually consists of
the process name and process ID (often known as the
pid
) for robust
applications. The process name is commonly displayed in the TAG field.
Quite often, additional information is included at the beginning of the
CONTENT field. The format
TAG [PID]:
is common. The left square bracket is used to terminate the TAG field in
this case, and is then the first character in the CONTENT field. If the
process ID is not needed, it may be omitted.
In that case, a colon and a space character usually follow the TAG. This
would be displayed as
TAG:
. In that case, the colon is the first character in
the CONTENT field.
Syslog Security
Considerations
The Syslog process places Event Notification messages into files on that
system. This process relies upon the integrity of the system for the
protection of the messages. Be aware that event messages might be sent
accidentally, erroneously, and even maliciously. Since Syslog is a relatively
simple protocol, its operations are not secure to the point where its
integrity is robust.
Message Forgery
An attacker might transmit Syslog messages (either from the machine
from which the messages are purportedly sent or from any other
machine) to a collector. In one case, an attacker might hide the true
nature of an attack amidst many other messages.
As an example, an attacker might start generating forged messages
indicating a problem on some machine. This might get the attention of
the system administrators who spend time investigating the alleged
problem. During this time, the attacker might be able to compromise a
different machine, or a different process on the same machine.
Содержание 3C10402B
Страница 18: ...18 ...
Страница 22: ...22 ABOUT THIS GUIDE ...
Страница 26: ...26 CHAPTER 1 INTRODUCTION ...
Страница 74: ...74 CHAPTER 3 FEATURE SETTINGS ...
Страница 130: ...130 CHAPTER 5 TELEPHONE CONFIGURATION ...
Страница 156: ...156 CHAPTER 7 CALL DISTRIBUTION GROUPS ...
Страница 194: ...194 CHAPTER 8 PSTN GATEWAY CONFIGURATION ...
Страница 256: ...256 CHAPTER 10 SIP MODE OPERATIONS ...
Страница 328: ...328 CHAPTER 11 DIAL PLAN ...
Страница 360: ...360 CHAPTER 13 DOWNLOADS ...
Страница 370: ...370 CHAPTER 14 LICENSING AND UPGRADES ...
Страница 406: ...406 CHAPTER 16 NETWORK MANAGEMENT ...
Страница 412: ...412 CHAPTER 17 COUNTRY SETTINGS ...
Страница 450: ...450 APPENDIX A INTEGRATING THIRD PARTY MESSAGING ...
Страница 456: ...456 APPENDIX B ISDN COMPLETION CAUSE CODES ...
Страница 510: ...510 APPENDIX F OUTBOUND CALLER ID AND 911 SERVICE ...
Страница 546: ...546 APPENDIX G NBX ENTERPRISE MIB ...
Страница 566: ...566 GLOSSARY ...
Страница 578: ...578 INDEX ...
Страница 582: ......