summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorRainer Gerhards <rgerhards@adiscon.com>2008-03-28 15:33:04 +0000
committerRainer Gerhards <rgerhards@adiscon.com>2008-03-28 15:33:04 +0000
commit6b9369c95f8dab6571ae508311a6318bddfd7cc9 (patch)
tree4bf95681d6eb7ca3419113e8b271971f3c418cad
parent9d2f32339f9e364dd8492564e29f253d2f176161 (diff)
downloadrsyslog-6b9369c95f8dab6571ae508311a6318bddfd7cc9.tar.gz
rsyslog-6b9369c95f8dab6571ae508311a6318bddfd7cc9.tar.xz
rsyslog-6b9369c95f8dab6571ae508311a6318bddfd7cc9.zip
a bit less humor as tribute to the corporate world ;)
-rw-r--r--rsyslogd.812
1 files changed, 1 insertions, 11 deletions
diff --git a/rsyslogd.8 b/rsyslogd.8
index ae6cebd2..eecf96d6 100644
--- a/rsyslogd.8
+++ b/rsyslogd.8
@@ -1,7 +1,7 @@
.\" Copyright 2004-2005 Rainer Gerhards and Adiscon for the rsyslog modifications
.\" May be distributed under the GNU General Public License
.\"
-.TH RSYSLOGD 8 "12 February 2008" "Version 2.0.2" "Linux System Administration"
+.TH RSYSLOGD 8 "28 March 2008" "Version 2.0.5" "Linux System Administration"
.SH NAME
rsyslogd \- reliable and extended syslogd
.SH SYNOPSIS
@@ -481,16 +481,6 @@ that this will require rsyslogd to be run as a non-root process.
rsyslogd will be unable to bind to the 514/UDP socket.
.IP 4.
Disabling inet domain sockets will limit risk to the local machine.
-.IP 5.
-Use step 4 and if the problem persists and is not secondary to a rogue
-program/daemon get a 3.5 ft (approx. 1 meter) length of sucker rod*
-and have a chat with the user in question.
-
-Sucker rod def. \(em 3/4, 7/8 or 1in. hardened steel rod, male
-threaded on each end. Primary use in the oil industry in Western
-North Dakota and other locations to pump 'suck' oil from oil wells.
-Secondary uses are for the construction of cattle feed lots and for
-dealing with the occasional recalcitrant or belligerent individual.
.SS Message replay and spoofing
If remote logging is enabled, messages can easily be spoofed and replayed.
As the messages are transmitted in clear-text, an attacker might use