From 7e10c67a1737d19f5038ad1164b29804d47d9bce Mon Sep 17 00:00:00 2001
From: Rainer Gerhards
It is possible that remote systems (or attackers) talk to the rsyslog server -by directly connecting to its port 61514. Currently (Jule of 2005), rsyslog does +by directly connecting to its port 61514. Currently (July of 2005), rsyslog does not offer the ability to bind to the local host, only. This feature is planned, but as long as it is missing, rsyslog must be protected via a firewall. This can easily be done via e.g iptables. Just be sure not to forget it.
-- cgit