syslogd.8 (119893) | syslogd.8 (131500) |
---|---|
1.\" Copyright (c) 1983, 1986, 1991, 1993 2.\" The Regents of the University of California. All rights reserved. 3.\" 4.\" Redistribution and use in source and binary forms, with or without 5.\" modification, are permitted provided that the following conditions 6.\" are met: 7.\" 1. Redistributions of source code must retain the above copyright 8.\" notice, this list of conditions and the following disclaimer. --- 16 unchanged lines hidden (view full) --- 25.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 26.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 27.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 28.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 29.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 30.\" SUCH DAMAGE. 31.\" 32.\" @(#)syslogd.8 8.1 (Berkeley) 6/6/93 | 1.\" Copyright (c) 1983, 1986, 1991, 1993 2.\" The Regents of the University of California. All rights reserved. 3.\" 4.\" Redistribution and use in source and binary forms, with or without 5.\" modification, are permitted provided that the following conditions 6.\" are met: 7.\" 1. Redistributions of source code must retain the above copyright 8.\" notice, this list of conditions and the following disclaimer. --- 16 unchanged lines hidden (view full) --- 25.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 26.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 27.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 28.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 29.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 30.\" SUCH DAMAGE. 31.\" 32.\" @(#)syslogd.8 8.1 (Berkeley) 6/6/93 |
33.\" $FreeBSD: head/usr.sbin/syslogd/syslogd.8 119893 2003-09-08 19:57:22Z ru $ | 33.\" $FreeBSD: head/usr.sbin/syslogd/syslogd.8 131500 2004-07-02 23:13:00Z ru $ |
34.\" 35.Dd November 24, 2001 36.Dt SYSLOGD 8 37.Os 38.Sh NAME 39.Nm syslogd 40.Nd log systems messages 41.Sh SYNOPSIS --- 30 unchanged lines hidden (view full) --- 72If this option is specified, 73.Nm 74tries to send the message to all addresses. 75.It Fl a Ar allowed_peer 76Allow 77.Ar allowed_peer 78to log to this 79.Nm | 34.\" 35.Dd November 24, 2001 36.Dt SYSLOGD 8 37.Os 38.Sh NAME 39.Nm syslogd 40.Nd log systems messages 41.Sh SYNOPSIS --- 30 unchanged lines hidden (view full) --- 72If this option is specified, 73.Nm 74tries to send the message to all addresses. 75.It Fl a Ar allowed_peer 76Allow 77.Ar allowed_peer 78to log to this 79.Nm |
80using UDP datagrams. Multiple | 80using UDP datagrams. 81Multiple |
81.Fl a 82options may be specified. 83.Pp 84.Ar Allowed_peer 85can be any of the following: 86.Bl -tag -width "ipaddr/masklen[:service]XX" 87.It Xo 88.Sm off --- 11 unchanged lines hidden (view full) --- 100can be also IPv6 address by enclosing the address with 101.Ql \&[ 102and 103.Ql \&] . 104If specified, 105.Ar service 106is the name or number of an UDP service (see 107.Xr services 5 ) | 82.Fl a 83options may be specified. 84.Pp 85.Ar Allowed_peer 86can be any of the following: 87.Bl -tag -width "ipaddr/masklen[:service]XX" 88.It Xo 89.Sm off --- 11 unchanged lines hidden (view full) --- 101can be also IPv6 address by enclosing the address with 102.Ql \&[ 103and 104.Ql \&] . 105If specified, 106.Ar service 107is the name or number of an UDP service (see 108.Xr services 5 ) |
108the source packet must belong to. A | 109the source packet must belong to. 110A |
109.Ar service 110of 111.Ql \&* | 111.Ar service 112of 113.Ql \&* |
112allows packets being sent from any UDP port. The default | 114allows packets being sent from any UDP port. 115The default |
113.Ar service 114is 115.Ql syslog . 116If 117.Ar ipaddr 118is IPv4 address, a missing 119.Ar masklen 120will be substituted by the historic class A or class B netmasks if 121.Ar ipaddr 122belongs into the address range of class A or B, respectively, or | 116.Ar service 117is 118.Ql syslog . 119If 120.Ar ipaddr 121is IPv4 address, a missing 122.Ar masklen 123will be substituted by the historic class A or class B netmasks if 124.Ar ipaddr 125belongs into the address range of class A or B, respectively, or |
123by 24 otherwise. If | 126by 24 otherwise. 127If |
124.Ar ipaddr 125is IPv6 address, a missing 126.Ar masklen 127will be substituted by 128. 128.It Xo 129.Sm off 130.Ar domainname Op : Ar service 131.Sm on 132.Xc 133Accept datagrams where the reverse address lookup yields 134.Ar domainname | 128.Ar ipaddr 129is IPv6 address, a missing 130.Ar masklen 131will be substituted by 128. 132.It Xo 133.Sm off 134.Ar domainname Op : Ar service 135.Sm on 136.Xc 137Accept datagrams where the reverse address lookup yields 138.Ar domainname |
135for the sender address. The meaning of | 139for the sender address. 140The meaning of |
136.Ar service 137is as explained above. 138.It Xo 139.Sm off 140.No * Ar domainname Op : Ar service 141.Sm on 142.Xc 143Same as before, except that any source host whose name --- 16 unchanged lines hidden (view full) --- 160Disable the compression of repeated instances of the same line 161into a single line of the form 162.Dq Li "last message repeated N times" 163when the output is a pipe to another program. 164If specified twice, disable this compression in all cases. 165.It Fl d 166Put 167.Nm | 141.Ar service 142is as explained above. 143.It Xo 144.Sm off 145.No * Ar domainname Op : Ar service 146.Sm on 147.Xc 148Same as before, except that any source host whose name --- 16 unchanged lines hidden (view full) --- 165Disable the compression of repeated instances of the same line 166into a single line of the form 167.Dq Li "last message repeated N times" 168when the output is a pipe to another program. 169If specified twice, disable this compression in all cases. 170.It Fl d 171Put 172.Nm |
168into debugging mode. This is probably only of use to developers working on | 173into debugging mode. 174This is probably only of use to developers working on |
169.Nm . 170.It Fl f 171Specify the pathname of an alternate configuration file; 172the default is 173.Pa /etc/syslog.conf . 174.It Fl k 175Disable the translation of 176messages received with facility --- 27 unchanged lines hidden (view full) --- 204Specify a location where 205.Nm 206should place an additional log socket. 207Up to 19 additional logging sockets can be specified. 208The primary use for this is to place additional log sockets in 209.Pa /var/run/log 210of various chroot filespaces. 211.It Fl s | 175.Nm . 176.It Fl f 177Specify the pathname of an alternate configuration file; 178the default is 179.Pa /etc/syslog.conf . 180.It Fl k 181Disable the translation of 182messages received with facility --- 27 unchanged lines hidden (view full) --- 210Specify a location where 211.Nm 212should place an additional log socket. 213Up to 19 additional logging sockets can be specified. 214The primary use for this is to place additional log sockets in 215.Pa /var/run/log 216of various chroot filespaces. 217.It Fl s |
212Operate in secure mode. Do not log messages from remote machines. If | 218Operate in secure mode. 219Do not log messages from remote machines. 220If |
213specified twice, no network socket will be opened at all, which also 214disables logging to remote machines. 215.It Fl u | 221specified twice, no network socket will be opened at all, which also 222disables logging to remote machines. 223.It Fl u |
216Unique priority logging. Only log messages at the specified priority. | 224Unique priority logging. 225Only log messages at the specified priority. |
217Without this option, messages at the stated priority or higher are logged. 218This option changes the default comparison from 219.Dq => 220to 221.Dq = . 222.It Fl v | 226Without this option, messages at the stated priority or higher are logged. 227This option changes the default comparison from 228.Dq => 229to 230.Dq = . 231.It Fl v |
223Verbose logging. If specified once, the numeric facility and priority are 224logged with each locally-written message. If specified more than once, | 232Verbose logging. 233If specified once, the numeric facility and priority are 234logged with each locally-written message. 235If specified more than once, |
225the names of the facility and priority are logged with each locally-written 226message. 227.El 228.Pp 229The 230.Nm 231utility reads its configuration file when it starts up and whenever it 232receives a hangup signal. --- 69 unchanged lines hidden (view full) --- 302and 303.Fl v 304options are 305.Fx 2.2 306extensions. 307.Sh BUGS 308The ability to log messages received in UDP packets is equivalent to 309an unauthenticated remote disk-filling service, and should probably be | 236the names of the facility and priority are logged with each locally-written 237message. 238.El 239.Pp 240The 241.Nm 242utility reads its configuration file when it starts up and whenever it 243receives a hangup signal. --- 69 unchanged lines hidden (view full) --- 313and 314.Fl v 315options are 316.Fx 2.2 317extensions. 318.Sh BUGS 319The ability to log messages received in UDP packets is equivalent to 320an unauthenticated remote disk-filling service, and should probably be |
310disabled by default. Some sort of | 321disabled by default. 322Some sort of |
311.No inter- Ns Nm syslogd | 323.No inter- Ns Nm syslogd |
312authentication mechanism ought to be worked out. To prevent the worst | 324authentication mechanism ought to be worked out. 325To prevent the worst |
313abuse, use of the 314.Fl a 315option is therefore highly recommended. 316.Pp 317The 318.Fl a 319matching algorithm doesn't pretend to be very efficient; use of numeric | 326abuse, use of the 327.Fl a 328option is therefore highly recommended. 329.Pp 330The 331.Fl a 332matching algorithm doesn't pretend to be very efficient; use of numeric |
320IP addresses is faster than domain name comparison. Since the allowed | 333IP addresses is faster than domain name comparison. 334Since the allowed |
321peer list is being walked linearly, peer groups where frequent messages 322are being anticipated from should be put early into the 323.Fl a 324list. 325.Pp 326The log socket was moved from 327.Pa /dev 328to ease the use of a read-only root file system. 329This may confuse 330some old binaries so that a symbolic link might be used for a 331transitional period. | 335peer list is being walked linearly, peer groups where frequent messages 336are being anticipated from should be put early into the 337.Fl a 338list. 339.Pp 340The log socket was moved from 341.Pa /dev 342to ease the use of a read-only root file system. 343This may confuse 344some old binaries so that a symbolic link might be used for a 345transitional period. |