identd's -l option no longer logs the host which has
contacted it. While identd is a small eough program to be
"safe" I still want a log of who's querying the system.
(All TCP connections should be loggable for security
auditing purposes.) I would at least recommend changing the
entry in /etc/inetd.conf to read:
auth stream tcp nowait nobody /usr/sbin/tcpd
in.identd -l -e -o
So that tcpd can log the host id for you.
Using tcpd to log things may cause an identd loop if each side has
a tcpd-wrapped identd, and each side is configured to do identd
lookups in tcpd.
Try removing the '-l' switch from the auth entry in /etc/inetd.conf
and uncomment the 'result:syslog-level =' entry in /etc/identd.conf
and set it's value to 'info'.
#-- Log all request replies to syslog (none == don't)
result:syslog-level = info
Suggested configuration change works. The documentation and comments in config
file could be clearer about use of syslog-level. As it stands it's not
immediately obvious that setting it to a value other than none enables
additional logging rather than just "redirecting" the basic log messages.
Close this or reassign it for documentation at your discretion.
This one ends up being a "the default behaviour changed and the documentation
could use some clarification" problem. Otherwise the suggestions above have
resolved the problem.