Deleted Added
full compact
syslogd.8 (119893) syslogd.8 (131500)
1.\" Copyright (c) 1983, 1986, 1991, 1993
2.\" The Regents of the University of California. All rights reserved.
3.\"
4.\" Redistribution and use in source and binary forms, with or without
5.\" modification, are permitted provided that the following conditions
6.\" are met:
7.\" 1. Redistributions of source code must retain the above copyright
8.\" notice, this list of conditions and the following disclaimer.

--- 16 unchanged lines hidden (view full) ---

25.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30.\" SUCH DAMAGE.
31.\"
32.\" @(#)syslogd.8 8.1 (Berkeley) 6/6/93
1.\" Copyright (c) 1983, 1986, 1991, 1993
2.\" The Regents of the University of California. All rights reserved.
3.\"
4.\" Redistribution and use in source and binary forms, with or without
5.\" modification, are permitted provided that the following conditions
6.\" are met:
7.\" 1. Redistributions of source code must retain the above copyright
8.\" notice, this list of conditions and the following disclaimer.

--- 16 unchanged lines hidden (view full) ---

25.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30.\" SUCH DAMAGE.
31.\"
32.\" @(#)syslogd.8 8.1 (Berkeley) 6/6/93
33.\" $FreeBSD: head/usr.sbin/syslogd/syslogd.8 119893 2003-09-08 19:57:22Z ru $
33.\" $FreeBSD: head/usr.sbin/syslogd/syslogd.8 131500 2004-07-02 23:13:00Z ru $
34.\"
35.Dd November 24, 2001
36.Dt SYSLOGD 8
37.Os
38.Sh NAME
39.Nm syslogd
40.Nd log systems messages
41.Sh SYNOPSIS

--- 30 unchanged lines hidden (view full) ---

72If this option is specified,
73.Nm
74tries to send the message to all addresses.
75.It Fl a Ar allowed_peer
76Allow
77.Ar allowed_peer
78to log to this
79.Nm
34.\"
35.Dd November 24, 2001
36.Dt SYSLOGD 8
37.Os
38.Sh NAME
39.Nm syslogd
40.Nd log systems messages
41.Sh SYNOPSIS

--- 30 unchanged lines hidden (view full) ---

72If this option is specified,
73.Nm
74tries to send the message to all addresses.
75.It Fl a Ar allowed_peer
76Allow
77.Ar allowed_peer
78to log to this
79.Nm
80using UDP datagrams. Multiple
80using UDP datagrams.
81Multiple
81.Fl a
82options may be specified.
83.Pp
84.Ar Allowed_peer
85can be any of the following:
86.Bl -tag -width "ipaddr/masklen[:service]XX"
87.It Xo
88.Sm off

--- 11 unchanged lines hidden (view full) ---

100can be also IPv6 address by enclosing the address with
101.Ql \&[
102and
103.Ql \&] .
104If specified,
105.Ar service
106is the name or number of an UDP service (see
107.Xr services 5 )
82.Fl a
83options may be specified.
84.Pp
85.Ar Allowed_peer
86can be any of the following:
87.Bl -tag -width "ipaddr/masklen[:service]XX"
88.It Xo
89.Sm off

--- 11 unchanged lines hidden (view full) ---

101can be also IPv6 address by enclosing the address with
102.Ql \&[
103and
104.Ql \&] .
105If specified,
106.Ar service
107is the name or number of an UDP service (see
108.Xr services 5 )
108the source packet must belong to. A
109the source packet must belong to.
110A
109.Ar service
110of
111.Ql \&*
111.Ar service
112of
113.Ql \&*
112allows packets being sent from any UDP port. The default
114allows packets being sent from any UDP port.
115The default
113.Ar service
114is
115.Ql syslog .
116If
117.Ar ipaddr
118is IPv4 address, a missing
119.Ar masklen
120will be substituted by the historic class A or class B netmasks if
121.Ar ipaddr
122belongs into the address range of class A or B, respectively, or
116.Ar service
117is
118.Ql syslog .
119If
120.Ar ipaddr
121is IPv4 address, a missing
122.Ar masklen
123will be substituted by the historic class A or class B netmasks if
124.Ar ipaddr
125belongs into the address range of class A or B, respectively, or
123by 24 otherwise. If
126by 24 otherwise.
127If
124.Ar ipaddr
125is IPv6 address, a missing
126.Ar masklen
127will be substituted by 128.
128.It Xo
129.Sm off
130.Ar domainname Op : Ar service
131.Sm on
132.Xc
133Accept datagrams where the reverse address lookup yields
134.Ar domainname
128.Ar ipaddr
129is IPv6 address, a missing
130.Ar masklen
131will be substituted by 128.
132.It Xo
133.Sm off
134.Ar domainname Op : Ar service
135.Sm on
136.Xc
137Accept datagrams where the reverse address lookup yields
138.Ar domainname
135for the sender address. The meaning of
139for the sender address.
140The meaning of
136.Ar service
137is as explained above.
138.It Xo
139.Sm off
140.No * Ar domainname Op : Ar service
141.Sm on
142.Xc
143Same as before, except that any source host whose name

--- 16 unchanged lines hidden (view full) ---

160Disable the compression of repeated instances of the same line
161into a single line of the form
162.Dq Li "last message repeated N times"
163when the output is a pipe to another program.
164If specified twice, disable this compression in all cases.
165.It Fl d
166Put
167.Nm
141.Ar service
142is as explained above.
143.It Xo
144.Sm off
145.No * Ar domainname Op : Ar service
146.Sm on
147.Xc
148Same as before, except that any source host whose name

--- 16 unchanged lines hidden (view full) ---

165Disable the compression of repeated instances of the same line
166into a single line of the form
167.Dq Li "last message repeated N times"
168when the output is a pipe to another program.
169If specified twice, disable this compression in all cases.
170.It Fl d
171Put
172.Nm
168into debugging mode. This is probably only of use to developers working on
173into debugging mode.
174This is probably only of use to developers working on
169.Nm .
170.It Fl f
171Specify the pathname of an alternate configuration file;
172the default is
173.Pa /etc/syslog.conf .
174.It Fl k
175Disable the translation of
176messages received with facility

--- 27 unchanged lines hidden (view full) ---

204Specify a location where
205.Nm
206should place an additional log socket.
207Up to 19 additional logging sockets can be specified.
208The primary use for this is to place additional log sockets in
209.Pa /var/run/log
210of various chroot filespaces.
211.It Fl s
175.Nm .
176.It Fl f
177Specify the pathname of an alternate configuration file;
178the default is
179.Pa /etc/syslog.conf .
180.It Fl k
181Disable the translation of
182messages received with facility

--- 27 unchanged lines hidden (view full) ---

210Specify a location where
211.Nm
212should place an additional log socket.
213Up to 19 additional logging sockets can be specified.
214The primary use for this is to place additional log sockets in
215.Pa /var/run/log
216of various chroot filespaces.
217.It Fl s
212Operate in secure mode. Do not log messages from remote machines. If
218Operate in secure mode.
219Do not log messages from remote machines.
220If
213specified twice, no network socket will be opened at all, which also
214disables logging to remote machines.
215.It Fl u
221specified twice, no network socket will be opened at all, which also
222disables logging to remote machines.
223.It Fl u
216Unique priority logging. Only log messages at the specified priority.
224Unique priority logging.
225Only log messages at the specified priority.
217Without this option, messages at the stated priority or higher are logged.
218This option changes the default comparison from
219.Dq =>
220to
221.Dq = .
222.It Fl v
226Without this option, messages at the stated priority or higher are logged.
227This option changes the default comparison from
228.Dq =>
229to
230.Dq = .
231.It Fl v
223Verbose logging. If specified once, the numeric facility and priority are
224logged with each locally-written message. If specified more than once,
232Verbose logging.
233If specified once, the numeric facility and priority are
234logged with each locally-written message.
235If specified more than once,
225the names of the facility and priority are logged with each locally-written
226message.
227.El
228.Pp
229The
230.Nm
231utility reads its configuration file when it starts up and whenever it
232receives a hangup signal.

--- 69 unchanged lines hidden (view full) ---

302and
303.Fl v
304options are
305.Fx 2.2
306extensions.
307.Sh BUGS
308The ability to log messages received in UDP packets is equivalent to
309an unauthenticated remote disk-filling service, and should probably be
236the names of the facility and priority are logged with each locally-written
237message.
238.El
239.Pp
240The
241.Nm
242utility reads its configuration file when it starts up and whenever it
243receives a hangup signal.

--- 69 unchanged lines hidden (view full) ---

313and
314.Fl v
315options are
316.Fx 2.2
317extensions.
318.Sh BUGS
319The ability to log messages received in UDP packets is equivalent to
320an unauthenticated remote disk-filling service, and should probably be
310disabled by default. Some sort of
321disabled by default.
322Some sort of
311.No inter- Ns Nm syslogd
323.No inter- Ns Nm syslogd
312authentication mechanism ought to be worked out. To prevent the worst
324authentication mechanism ought to be worked out.
325To prevent the worst
313abuse, use of the
314.Fl a
315option is therefore highly recommended.
316.Pp
317The
318.Fl a
319matching algorithm doesn't pretend to be very efficient; use of numeric
326abuse, use of the
327.Fl a
328option is therefore highly recommended.
329.Pp
330The
331.Fl a
332matching algorithm doesn't pretend to be very efficient; use of numeric
320IP addresses is faster than domain name comparison. Since the allowed
333IP addresses is faster than domain name comparison.
334Since the allowed
321peer list is being walked linearly, peer groups where frequent messages
322are being anticipated from should be put early into the
323.Fl a
324list.
325.Pp
326The log socket was moved from
327.Pa /dev
328to ease the use of a read-only root file system.
329This may confuse
330some old binaries so that a symbolic link might be used for a
331transitional period.
335peer list is being walked linearly, peer groups where frequent messages
336are being anticipated from should be put early into the
337.Fl a
338list.
339.Pp
340The log socket was moved from
341.Pa /dev
342to ease the use of a read-only root file system.
343This may confuse
344some old binaries so that a symbolic link might be used for a
345transitional period.