Sponsored Content
Top Forums UNIX for Advanced & Expert Users Disable connection logging for a specfic service (/var/log/secure) Post 302477302 by droid on Saturday 4th of December 2010 06:24:02 AM
Old 12-04-2010
Hi,
it depends on the operating system you are using and which program does the logging.
 

9 More Discussions You Might Find Interesting

1. UNIX for Advanced & Expert Users

difference between logging into unix through f-secure ssh client and telnet

hi, what is the difference between logging into unix through f-secure ssh client and telnet is there any more security check is involved can any one explain thanks in advance (1 Reply)
Discussion started by: trichyselva
1 Replies

2. SCO

Disable the SNMP Service

Dear All, Kindly guide how to Disable the SNMP Service on sco unix release 5.0 Regards (2 Replies)
Discussion started by: sak900354
2 Replies

3. Red Hat

/var/log/messages and secure not updating

Hello all, I recently deleted some lines from the messages and secure files, in /var/log and now they are not keeping a log anymore. The last update shows the date of when I deleted the lines. I had to delete some failed login attempts to stop denyhosts from blocking the ips (probably not the... (3 Replies)
Discussion started by: z1dane
3 Replies

4. Shell Programming and Scripting

Is my TLSFTP connection secure?

What is difference in the below Two commands? 1) tlsftp -v -d -i -a -z verify=0 opts=17 $SERVERNAME << ! 2) tlsftp -i -v -n ${ SERVERNAME } << ! Presently I am using the second command for get the files from Mainframe system to Unix system. But it is not secure. Now i want to... (0 Replies)
Discussion started by: gbellamk
0 Replies

5. Linux

Disable connection logging for a specfic service (/var/log/secure)

Hello, is there a way to disable connection logging for a specific service? Or eventually to disable /var/log/secure in general? Closed. Double post (0 Replies)
Discussion started by: TehOne
0 Replies

6. Cybersecurity

/var/log/secure* mysteriously empty!

Hello everyone. I'm a newbie and this is my first post, and I'm hoping to get some help understanding what happened on my server. I did as much research as I could, but now I turn to the forums for help :) I've set up a VPS server and I "thought" I had good enough security on it, but all of a... (2 Replies)
Discussion started by: antondev
2 Replies

7. Solaris

secure connection between two servers ?

hello all, i have a question if i have two servers each one run an application i want to make a tunnel channel between the two servers the two application each one has a specific port . for example server A has port 2001 and server B has port 2002 server A talk to server A using any... (1 Reply)
Discussion started by: maxim42
1 Replies

8. Red Hat

Disable copying secure key's to remote system

Hi, We all know as we can connect remote system through ssh without entering username and password by copy the public key to remote host using ssh-copy-id. But my query is to i want to restrict the user as do not implement this feature.Whenever he is trying to login, he has to enter his/her... (1 Reply)
Discussion started by: mastansaheb
1 Replies

9. Shell Programming and Scripting

Transfer the logs being thrown into /var/log/messages into another file example /var/log/volumelog

I have been searching and reading about syslog. I would like to know how to Transfer the logs being thrown into /var/log/messages into another file example /var/log/volumelog. tail -f /var/log/messages dblogger: msg_to_dbrow: no logtype using missing dblogger: msg_to_dbrow_str: val ==... (2 Replies)
Discussion started by: kenshinhimura
2 Replies
POSTLOG(1)						      General Commands Manual							POSTLOG(1)

NAME
postlog - Postfix-compatible logging utility SYNOPSIS
postlog [-iv] [-c config_dir] [-p priority] [-t tag] [text...] DESCRIPTION
The postlog(1) command implements a Postfix-compatible logging interface for use in, for example, shell scripts. By default, postlog(1) logs the text given on the command line as one record. If no text is specified on the command line, postlog(1) reads from standard input and logs each input line as one record. Logging is sent to syslogd(8); when the standard error stream is connected to a terminal, logging is sent there as well. The following options are implemented: -c config_dir Read the main.cf configuration file in the named directory instead of the default configuration directory. -i Include the process ID in the logging tag. -p priority Specifies the logging severity: info (default), warn, error, fatal, or panic. -t tag Specifies the logging tag, that is, the identifying name that appears at the beginning of each logging record. A default tag is used when none is specified. -v Enable verbose logging for debugging purposes. Multiple -v options make the software increasingly verbose. ENVIRONMENT
MAIL_CONFIG Directory with the main.cf file. CONFIGURATION PARAMETERS
The following main.cf parameters are especially relevant to this program. The text below provides only a parameter summary. See postconf(5) for more details including examples. config_directory (see 'postconf -d' output) The default location of the Postfix main.cf and master.cf configuration files. syslog_facility (mail) The syslog facility of Postfix logging. syslog_name (see 'postconf -d' output) The mail system name that is prepended to the process name in syslog records, so that "smtpd" becomes, for example, "postfix/smtpd". SEE ALSO
postconf(5), configuration parameters syslogd(8), syslog daemon LICENSE
The Secure Mailer license must be distributed with this software. AUTHOR(S) Wietse Venema IBM T.J. Watson Research P.O. Box 704 Yorktown Heights, NY 10598, USA POSTLOG(1)
All times are GMT -4. The time now is 01:06 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy