We actively support the following versions with security updates:
| Version | Supported |
|---|---|
| 1.4.x | ✅ |
| 1.3.x | ✅ |
| < 1.3 | ❌ |
We take security vulnerabilities seriously. If you discover a security issue in systemd-netlogd, please follow these steps:
DO NOT open a public GitHub issue for security vulnerabilities.
Instead, please report security issues to:
- Email: [email protected]
- Subject line: "[SECURITY] systemd-netlogd: "
Please provide as much information as possible:
- Description: Clear description of the vulnerability
- Impact: What could an attacker achieve?
- Reproduction: Step-by-step instructions to reproduce the issue
- Affected Versions: Which versions are affected?
- Proposed Fix: If you have suggestions for a fix (optional)
- CVE: If you've already obtained a CVE identifier (optional)
- Initial Response: Within 48 hours
- Status Update: Within 7 days with assessment and planned fix timeline
- Fix Release: Depends on severity:
- Critical: Within 7 days
- High: Within 14 days
- Medium: Within 30 days
- Low: Next regular release
We follow responsible disclosure:
- You report the issue privately
- We confirm receipt and assess severity
- We develop and test a fix
- We release the fix in a security update
- We publicly disclose the issue after users have had time to update (typically 7-14 days)
We will credit security researchers in our release notes unless they prefer to remain anonymous.
When using TLS or DTLS for log transmission:
- Always use certificate verification in production (
CertificateAuthentication=deny) - Use
CertificateAuthentication=warnonly for testing - Never use
CertificateAuthentication=allowin production - Keep OpenSSL libraries up to date
- Use certificates from trusted CAs
- systemd-netlogd runs with limited capabilities (
CAP_NET_ADMIN,CAP_NET_BIND_SERVICE,CAP_NET_BROADCAST) - Drops privileges to the
systemd-journal-netloguser after initialization - Consider using firewall rules to restrict outbound connections to trusted log servers
- The daemon only reads from the systemd journal (no write access)
- Journal filtering (facilities, levels) happens before network transmission
- Ensure journal permissions are properly configured
- State file (cursor position) is stored in
/var/lib/systemd/journal-netlogd/state - Permissions are automatically set to
0644 - Contains only cursor information, no sensitive data
Applications can write arbitrary content to the journal, which is then forwarded. Receiving syslog servers should:
- Properly validate and sanitize incoming log messages
- Implement rate limiting
- Use structured data parsing with care
- Man-in-the-Middle: Use TLS/DTLS with certificate verification
- Denial of Service: systemd-netlogd includes rate limiting, but ensure your syslog server also has DoS protection
- Replay Attacks: TLS/DTLS provide replay protection
- Logs may contain sensitive information
- Use TLS/DTLS encryption for log transmission
- Ensure syslog server security and access controls
- Consider log retention and disposal policies
Security updates are announced via:
- GitHub Security Advisories
- Git commit messages tagged with
[SECURITY] - CHANGELOG.md entries under "Security" section
Subscribe to repository notifications to stay informed.
- Keep Updated: Always run the latest supported version
- Use Encryption: Enable TLS/DTLS for remote log transmission
- Verify Certificates: Use strict certificate authentication
- Filter Logs: Only forward necessary log levels and facilities
- Monitor: Track systemd-netlogd status and errors
- Network Segmentation: Isolate log infrastructure on dedicated networks
- Regular Audits: Periodically review configuration and security settings
For security-related questions or concerns:
- Email: [email protected]
- PGP Key: (if available, include fingerprint or link)