identd's -l option no longer logs the host which has contacted it. While identd is a small eough program to be "safe" I still want a log of who's querying the system. (All TCP connections should be loggable for security auditing purposes.) I would at least recommend changing the entry in /etc/inetd.conf to read: auth stream tcp nowait nobody /usr/sbin/tcpd in.identd -l -e -o So that tcpd can log the host id for you.
Using tcpd to log things may cause an identd loop if each side has a tcpd-wrapped identd, and each side is configured to do identd lookups in tcpd.
Try removing the '-l' switch from the auth entry in /etc/inetd.conf and uncomment the 'result:syslog-level =' entry in /etc/identd.conf and set it's value to 'info'. #-- Log all request replies to syslog (none == don't) result:syslog-level = info
Suggested configuration change works. The documentation and comments in config file could be clearer about use of syslog-level. As it stands it's not immediately obvious that setting it to a value other than none enables additional logging rather than just "redirecting" the basic log messages. Close this or reassign it for documentation at your discretion.
This one ends up being a "the default behaviour changed and the documentation could use some clarification" problem. Otherwise the suggestions above have resolved the problem.