dwww Home | Show directory contents | Find package

logcheck-database (1.4.0) unstable; urgency=medium

  logcheck rules that target /var/log/syslog likely need to be updated
  if you are using rsyslog.

  Since version 8.2210.0-3, rsyslog defaults to 'high precision
  timestamps' so rules (including locally generated rules) that target
  /var/log/syslog are likely to stop working unless they are
  modified. The rules provided by the logcheck-database package have
  been updated but you will need to update all your local rules (or
  configure rsyslog to use the 'old' format).

  The following can be run as root to update all local rules:

  for rule in /etc/logcheck/*.d*/local-*; do
   sed --in-place --regexp-extended \
    's,^\^((\\w|\[\[:alpha:\]\])\{3\} \[ :(0-9|\[:digit:\])\]\{11\}),^(\1|[0-9T:.+-]{32}),' \
    "$rule"
  done

  This replaces "^<old prefix>" with "^(<old prefix>|<new prefix>)" in
  all rules that start 'local-' -- if you have added rules not named
  like that you will want to apply a similar change.

  The ^<old prefix> includes the following four regexes which were
  commonly used to match the start of the 'old-format' timestamp used
  by rsyslog in debian bullseye:

      ^\w{3} [ :0-9]{11}
      ^\w{3} [ :[:digit:]]{11}
      ^[[:alpha:]]{3} [ :[:digit:]]{11}
      ^[[:alpha:]]{3} [ :0-9]{11}

  Each of these match timestamps such as "Tue 06 Dec 21:00:00", which
  is the format used by the systemd journal and by rsyslog without the
  'high-precision' format.

  The <new prefix> is '^[0-9T:.+-]{32}' which matches timestamps that
  look like "2022-12-06T21:00:00.123456+01:00", the new
  'high-precision' format which is now used by a default rsyslog
  installation.

  It is recommended to retain the '<old prefix>' in rules to ensure
  rules can also be used against log entries from the systemd journal:
  checking the journal is not done by default (yet), but can be
  enabled by writing the string 'journal' into
  /etc/logcheck/logfiles.d/journal.logfiles

 -- Richard Lewis <richard.lewis.debian@googlemail.com>  Tue, 6 Dec 2022 21:00:00 +0100

logcheck-database (1.3.0) unstable; urgency=low

  logcheck-database dropped violations.d/logcheck a while ago because it was
  causing too many false positives and required insane amounts of rule
  duplication. As a result, unless packages themselves elevate their log
  messages (and provide their own filters), logcheck now uses only the
  ignore.d.* layer by default.

  If you prefer to continue use of violations.d/logcheck, then repopulate the
  file; the violations.ignore.d/logcheck-* filter files are still being
  distributed (but no longer maintained). They will be dropped in a future
  release.

  If you don't like this, please work with the package maintainers of the
  packages responsible for messages that are elevated to security events
  (violations) and ask them to provide package-specific elevation filters in
  violations.d/<packagename> and appropriate ignore filters in
  violations.ignore.d/<packagename>.

 -- martin f. krafft <madduck@debian.org>  Fri, 18 Jul 2008 15:38:40 +0200

logcheck-database (1.2.49) unstable; urgency=low

  logcheck-database now filters all SMART attribute changes reported by
  smartd, except for temperature changes (attribute 194) if the target value
  is greater than or equal to 55, which will be reported as security events
  (violations.d), and changes to the following four attributes, which will be
  reported as security alerts (cracking.d):

        Reallocated_Sector_Ct
        Current_Pending_Sector  (when > 0 only)
        Offline_Uncorrectable   (when > 0 only)
        UDMA_CRC_Error_Count

  This decision was made based on several arguments, which have been brought
  up as part of a mailing list discussion [0]. Among these were:

  1. smartd can send warning mails and is configured to do so by default on
     Debian.

  2. attribute values are not standardised, so it is not possible to sensibly
     filter out truly informational messages which are of no interest to the
     administrator.

  3. logcheck does not have any context information and can thus not filter
     attributes whose values simply oscillate.

  [0] http://marc.theaimsgroup.com/?t=116015459000003&r=1&w=2

  Unfortunately, some harddrives manufactures in the USA use the Fahrenheit
  scale for the temperature values (braindeadedness!), so these will generate
  spurious security events which you will have to filter out by uncommenting
  the appropriate line in /etc/logcheck/violations.ignore.d/logcheck-smartd.

 -- martin f. krafft <madduck@debian.org>  Wed, 18 Oct 2006 19:57:18 +0200

logcheck-database (1.1.1-8) unstable; urgency=low

  [This message was previously issued with debconf and has now been moved to
  a NEWS file (where it should be). If you are seeing this again, do note that
  it applies to an ancient version and you probably know all this already.]

  From version 1.1.1-8, logcheck supports run-parts controled rule
  directories:

  - /etc/logcheck/cracking.d
  - /etc/logcheck/cracking.ignore.d [for local use only]
  - /etc/logcheck/violations.d
  - /etc/logcheck/violations.ignore.d
  - /etc/logcheck/ignore.d.workstation
  - /etc/logcheck/ignore.d.server
  - /etc/logcheck/ignore.d.paranoid

  The ignore.d.{workstation,server,paranoid} directory to be used is set by
  the REPORTLEVEL option in the file "/etc/logcheck/logcheck.conf".

  These directories may contain files prefixed with "logcheck-" (containing
  generic alert/override patterns), named "(packagename)" (containing patterns
  specific to that one package), or named "local" respectively prefixed with
  "local-" (created by the local administrator to contain patterns tailored
  for a particular site).  Logcheck will then use rules collected from all the
  files found in the appropriate directories.

  Please see /usr/share/doc/logcheck for more details.

 -- martin f. krafft <madduck@debian.org>  Sat,  8 Jul 2006 16:00:09 +0200

Generated by dwww version 1.15 on Fri Aug 29 12:35:31 CEST 2025.