Hi folks,

while logcheck's README.logcheck-database says that
cracking.ignore.d is not enabled by default, only README.Maintainer
says that packages should not install files there.

However, all mail servers I administer keep spitting stuff like this
*all* *the* time:

Security Alerts
=-=-=-=-=-=-=-=
Aug 31 05:31:00 clegg postfix/smtpd[21557]: NOQUEUE: reject: RCPT
from unknown[203.154.151.45]: 554 5.7.1 Service unavailable; Client
host [203.154.151.45] blocked using list.dsbl.org;
http://dsbl.org/listing?203.154.151.45;
from=<[EMAIL PROTECTED]>
to=<[EMAIL PROTECTED]> proto=SMTP helo=<BSL4-001.globlex.com>

I don't care, and I think the entire cracking.d layer is a joke.
Logcheck is not an IDS and it cannot detect ongoing attacks.

So instead of maintaining local rules for all systems I administer,
I decided to leverage my role as logcheck maintainer and do
something about it.

And I see two solutions:

1. disable the cracking.d layer
2. duplicate countless postfix rules into cracking.ignore.d and
   install files there with logcheck-database

To be honest, I am much in favour of (1) and shall release logcheck
1.3 in the near future with cracking.d disabled, unless I hear some
valid objections.

Cheers,

-- 
martin;              (greetings from the heart of the sun.)
  \____ echo mailto: !#^."<*>"|tr "<*> mailto:"; [EMAIL PROTECTED]
 
"being shot is not as bad as i always thought it might be.
 as long as you can keep the fear from your mind."
                                          -- special agent dale cooper
 
spamtraps: [EMAIL PROTECTED]

Attachment: digital_signature_gpg.asc
Description: Digital signature (see http://martin-krafft.net/gpg/)

_______________________________________________
Logcheck-devel mailing list
[email protected]
http://lists.alioth.debian.org/mailman/listinfo/logcheck-devel

Reply via email to