Your message dated Sun, 31 Aug 2008 19:32:06 +0000
with message-id <[EMAIL PROTECTED]>
and subject line Bug#474239: fixed in logcheck 1.3.0
has caused the Debian Bug report #474239,
regarding spamassassin: spamd logcheck file doesn't work with shortcircuit
enabled
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)
--
474239: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=474239
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
--- Begin Message ---
Package: spamassassin
Version: 3.2.4-1~bpo40+1
Severity: normal
Tags: patch
If shortcircuit is enabled, the log message emitted on each scan
includes the shortcircuit state at the end. The logcheck db needs to
include that as an optional string in the regex:
^\w{3} [ :0-9]{11} [._[:alnum:]-]+
(spamd|check|re(port|voke))\[[0-9]+\]: (spamd: )?result: [.YN] [
[:digit:]-]+ - ([._[:alnum:],]+ )?s
cantime=[0-9.]+,size=[0-9]+,(user=[^,]+,uid=[0-9]+,required_score=[0-9.]+,rhost=[._[:alnum:]-]+,raddr=[0-9.]+,rport=[0-9]+,)?mid=(<[^[:
space:]]+>|\(unknown\))(rmid=(<[^[:space:]]+>|\(unknown\)),)?,(bayes=[.[:digit:]]+(e-[[:digit:]]+)?,)?autolearn=(ham|spam|no|disabled|u
navailable)(,shortcircuit=(ham|spam|no))? *$
The only change is the last bit: (,shortcircuit=(ham|spam|no))?
- Marc
-- System Information:
Debian Release: 4.0
APT prefers stable
APT policy: (500, 'stable')
Architecture: i386 (i686)
Shell: /bin/sh linked to /bin/bash
Kernel: Linux 2.6.18-6-k7
Locale: LANG=en_CA, LC_CTYPE=en_CA (charmap=ISO-8859-1)
Versions of packages spamassassin depends on:
ii libarchive-tar-perl 1.30-2 Archive::Tar - manipulate tar file
ii libdigest-sha1-perl 2.11-1 NIST SHA-1 message digest algorith
ii libhtml-parser-perl 3.55-1 A collection of modules that parse
ii libio-zlib-perl 1.04-1 IO:: style interface to Compress::
ii libnet-dns-perl 0.59-1 Perform DNS queries from a Perl sc
ii libsocket6-perl 0.19-1 Perl extensions for IPv6
ii libsys-hostname-long-perl 1.4-1 Figure out the long (fully-qualifi
ii libwww-perl 5.805-1 WWW client/server library for Perl
ii perl 5.8.8-7etch1 Larry Wall's Practical Extraction
Versions of packages spamassassin recommends:
ii gcc 4:4.1.1-15 The GNU C compiler
ii gnupg 1.4.6-2 GNU privacy guard - a free PGP rep
ii libc6-dev 2.3.6.ds1-13etch5 GNU C Library: Development Librari
pn libmail-spf-perl <none> (no description available)
ii libsys-syslog-perl 0.18-1 Perl interface to the UNIX syslog(
ii make 3.81-2 The GNU version of the "make" util
ii re2c 0.12.1-1~bpo.1 tool for generating fast C-based r
ii spamc 3.2.4-1~bpo40+1 Client for SpamAssassin spam filte
-- debconf information excluded
--- End Message ---
--- Begin Message ---
Source: logcheck
Source-Version: 1.3.0
We believe that the bug you reported is fixed in the latest version of
logcheck, which is due to be installed in the Debian FTP archive:
logcheck-database_1.3.0_all.deb
to pool/main/l/logcheck/logcheck-database_1.3.0_all.deb
logcheck_1.3.0.dsc
to pool/main/l/logcheck/logcheck_1.3.0.dsc
logcheck_1.3.0.tar.gz
to pool/main/l/logcheck/logcheck_1.3.0.tar.gz
logcheck_1.3.0_all.deb
to pool/main/l/logcheck/logcheck_1.3.0_all.deb
logtail_1.3.0_all.deb
to pool/main/l/logcheck/logtail_1.3.0_all.deb
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
martin f. krafft <[EMAIL PROTECTED]> (supplier of updated logcheck package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.8
Date: Sun, 31 Aug 2008 20:12:08 +0100
Source: logcheck
Binary: logcheck logcheck-database logtail
Architecture: source all
Version: 1.3.0
Distribution: experimental
Urgency: low
Maintainer: Debian logcheck Team <[email protected]>
Changed-By: martin f. krafft <[EMAIL PROTECTED]>
Description:
logcheck - mails anomalies in the system logfiles to the administrator
logcheck-database - database of system log rules for the use of log checkers
logtail - Print log file lines that have not been read (deprecated)
Closes: 471072 474239 489172 491694 493066 494740 495923
Changes:
logcheck (1.3.0) experimental; urgency=low
.
* Formalise the dropping of violations.d/logcheck. Please see
/usr/share/doc/logcheck-database/NEWS.Debian.gz for more information
(closes: #471072).
.
* Remove most messages from cracking.d/logcheck and split up the remaining
ones into separate files.
.
* Add Auto-Submitted header to outgoing mails (closes: #489172).
.
* Thanks to Hanspeter Kunz for all his patches.
.
* ignore.d.server/dovecot:
- ignore connection closed messages.
- ignore auth failure messages whe ruser and rip are known.
- ignore forwards and to cope with missing >'s at the end of long msgids.
- ignore closed connection messages also when connection is reset by peer.
* ignore.d.server/postfix:
- fix most regexps to support IPv6 addresses.
- allow port 587 in regexps whereever port 25 is used.
- ignore messages about untrusted cert issuers that have any of &(), in
their name.
- ignore "NOQUEUE: milter-reject" messages.
- enhanced "TLS library problem" rule to also ignore "bad
certificate" errors.
- added rule to ignore "SSL23_GET_CLIENT_HELLO:unknown protocol"
messages.
- ignore new message format for lacking subject CN in peer cert.
- ignore getting too many errors after END-OF-MESSAGE, not only after four
letter SMTP commands.
- ignore milter-reject messages after RCPT which include the recipient.
- ignore multiple PIX workaround messages.
- ignore anvil connection rate statistics for unknown DNS hosts.
- ignore all data related to untrusted certificate issuers.
- ignore connection concurrency limit warnings for service submission too.
* ignore.d.server/ssh:
- ignore authentication failures with new PAM format.
* ignore.d.server/kernel:
- ignore unsupported function warnings from PnPBIOS
- ignore whitespace before timestamp in newer kernels (closes: #494740).
* ignore.d.server/no-ip:
- ignore message when IP was already set to the current IP.
* ignore.d.server/ntp:
- allow hyphen in interface names in listen messages.
* ignore.d.server/pdns:
- ignore parsing errors for packages of arbitrary size.
- ignore errors due to invalid qdomains causing servfails.
* ignore.d.server/ikiwiki:
- ignore error when "do" parameter has not been passed to CGI.
* ignore.d.server/openvpn:
- ignore messages about clients reconnecting and dropping previous active
connections.
- ignore restarts due to fatal TLS errors.
- ignore replay-window backtrack warnings.
- ignore connection reset messages with negative status (?) numbers.
- do not require TUN devices to be named tun-*.
- also ignore client CNs with @ (closes: #493066).
* ignore.d.server/proftpd:
- ignore when proftpd barfs all over syslog when a passive transfer
failed.
* ignore.d.server/spamd:
- expect shortcircuit status in scan messages; thanks to Marc Sherman
(closes: #474239).
* ignore.d.server/upsd:
- ignore client connection messages (closes: #495923).
.
* violations.d/su:
- match both, user-root and user:root styles (closes: #491694).
.
* Rulefiles are now installed with mode 644; the directories are still moe
700, so the files are not publicly readable (unless the admin hardlinks
them elsewhere).
Checksums-Sha1:
b8e6c01fda43a79645134f4751d41544f3213899 1183 logcheck_1.3.0.dsc
b535e8a831328362a3fb8c182927d8574beab49e 152435 logcheck_1.3.0.tar.gz
86793784fe880a851d4aeb2ea84fbe5fcb50b1d4 68530 logcheck_1.3.0_all.deb
3095d8001f593ad252626c7659d8930f90eeb8c9 116362 logcheck-database_1.3.0_all.deb
cbbcebe10e37d04cf993a4840e6c69606691ac94 54014 logtail_1.3.0_all.deb
Checksums-Sha256:
a36c8b826e4c3d36559c4b109abb23dc038062510cd9e0bb7241fa42aa1f30d7 1183
logcheck_1.3.0.dsc
bc7d3afff0497a2f3b3455d6481cadf4fa3df815e8a1306c701180c56bd17347 152435
logcheck_1.3.0.tar.gz
e53381d3f0307e8d20e0b024de54feaca9c75d4e78652ab3f9718f25d943a17e 68530
logcheck_1.3.0_all.deb
993e3686d8dc4316a60928634432ee9f97c8916eae7ae85a8e2661e1f99a7440 116362
logcheck-database_1.3.0_all.deb
ba3258629b64ff4b5b49d7e9cd539fe22ef6eb8f2e0a780a82519617e914f0fb 54014
logtail_1.3.0_all.deb
Files:
ef1380e360d1d621af5b011e2fb1c940 1183 admin optional logcheck_1.3.0.dsc
9ef0e67076b8d5ea7fa4372d37e4c55f 152435 admin optional logcheck_1.3.0.tar.gz
272d7086948871529af2d8d35b1cf539 68530 admin optional logcheck_1.3.0_all.deb
fe58b5fcf44093042f3ff095e86e9b55 116362 admin optional
logcheck-database_1.3.0_all.deb
4cc51a25eacb7ec77d29e7c6e08d1c59 54014 admin optional logtail_1.3.0_all.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
iEYEARECAAYFAki67iAACgkQIgvIgzMMSnVGJgCePdMt/SfIWGEMzIob8EBTHHM0
8XUAoNVwR76urnz/CYHHlefrXrVLosjl
=WW+Q
-----END PGP SIGNATURE-----
--- End Message ---
_______________________________________________
Logcheck-devel mailing list
[email protected]
http://lists.alioth.debian.org/mailman/listinfo/logcheck-devel