Your message dated Sun, 31 Aug 2008 19:32:06 +0000
with message-id <[EMAIL PROTECTED]>
and subject line Bug#493066: fixed in logcheck 1.3.0
has caused the Debian Bug report #493066,
regarding logcheck-database: does not ignore OpenVPN's log if CN has "@"
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
493066: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=493066
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
--- Begin Message ---
Package: logcheck-database
Version: 1.2.63
Priority: wishlist

I'm using a certificate for OpenVPN, that has atmark ("@") 
character in its CN (common name) as "[EMAIL PROTECTED]".
If so, logcheck does NOT ignore normal log lines from openvpn
daemon.

Please apply the attached patch to
/etc/logcheck/ignore.d.server/openvpn file.

Regards,

-- 
-- Name: SATOH Fumiyasu (fumiyas @ osstech co jp)
-- Business Home: http://www.OSSTech.co.jp/
-- Personal Home: http://www.SFO.jp/blog/

Attachment: logcheck-database-openvpn-ignore-atmark.patch
Description: Binary data


--- End Message ---
--- Begin Message ---
Source: logcheck
Source-Version: 1.3.0

We believe that the bug you reported is fixed in the latest version of
logcheck, which is due to be installed in the Debian FTP archive:

logcheck-database_1.3.0_all.deb
  to pool/main/l/logcheck/logcheck-database_1.3.0_all.deb
logcheck_1.3.0.dsc
  to pool/main/l/logcheck/logcheck_1.3.0.dsc
logcheck_1.3.0.tar.gz
  to pool/main/l/logcheck/logcheck_1.3.0.tar.gz
logcheck_1.3.0_all.deb
  to pool/main/l/logcheck/logcheck_1.3.0_all.deb
logtail_1.3.0_all.deb
  to pool/main/l/logcheck/logtail_1.3.0_all.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
martin f. krafft <[EMAIL PROTECTED]> (supplier of updated logcheck package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Sun, 31 Aug 2008 20:12:08 +0100
Source: logcheck
Binary: logcheck logcheck-database logtail
Architecture: source all
Version: 1.3.0
Distribution: experimental
Urgency: low
Maintainer: Debian logcheck Team <[email protected]>
Changed-By: martin f. krafft <[EMAIL PROTECTED]>
Description: 
 logcheck   - mails anomalies in the system logfiles to the administrator
 logcheck-database - database of system log rules for the use of log checkers
 logtail    - Print log file lines that have not been read (deprecated)
Closes: 471072 474239 489172 491694 493066 494740 495923
Changes: 
 logcheck (1.3.0) experimental; urgency=low
 .
   * Formalise the dropping of violations.d/logcheck. Please see
     /usr/share/doc/logcheck-database/NEWS.Debian.gz for more information
     (closes: #471072).
 .
   * Remove most messages from cracking.d/logcheck and split up the remaining
     ones into separate files.
 .
   * Add Auto-Submitted header to outgoing mails (closes: #489172).
 .
   * Thanks to Hanspeter Kunz for all his patches.
 .
   * ignore.d.server/dovecot:
     - ignore connection closed messages.
     - ignore auth failure messages whe ruser and rip are known.
     - ignore forwards and to cope with missing >'s at the end of long msgids.
     - ignore closed connection messages also when connection is reset by peer.
   * ignore.d.server/postfix:
     - fix most regexps to support IPv6 addresses.
     - allow port 587 in regexps whereever port 25 is used.
     - ignore messages about untrusted cert issuers that have any of &(), in
       their name.
     - ignore "NOQUEUE: milter-reject" messages.
     - enhanced "TLS library problem" rule to also ignore "bad
       certificate" errors.
     - added rule to ignore "SSL23_GET_CLIENT_HELLO:unknown protocol"
       messages.
     - ignore new message format for lacking subject CN in peer cert.
     - ignore getting too many errors after END-OF-MESSAGE, not only after four
       letter SMTP commands.
     - ignore milter-reject messages after RCPT which include the recipient.
     - ignore multiple PIX workaround messages.
     - ignore anvil connection rate statistics for unknown DNS hosts.
     - ignore all data related to untrusted certificate issuers.
     - ignore connection concurrency limit warnings for service submission too.
   * ignore.d.server/ssh:
     - ignore authentication failures with new PAM format.
   * ignore.d.server/kernel:
     - ignore unsupported function warnings from PnPBIOS
     - ignore whitespace before timestamp in newer kernels (closes: #494740).
   * ignore.d.server/no-ip:
     - ignore message when IP was already set to the current IP.
   * ignore.d.server/ntp:
     - allow hyphen in interface names in listen messages.
   * ignore.d.server/pdns:
     - ignore parsing errors for packages of arbitrary size.
     - ignore errors due to invalid qdomains causing servfails.
   * ignore.d.server/ikiwiki:
     - ignore error when "do" parameter has not been passed to CGI.
   * ignore.d.server/openvpn:
     - ignore messages about clients reconnecting and dropping previous active
       connections.
     - ignore restarts due to fatal TLS errors.
     - ignore replay-window backtrack warnings.
     - ignore connection reset messages with negative status (?) numbers.
     - do not require TUN devices to be named tun-*.
     - also ignore client CNs with @ (closes: #493066).
   * ignore.d.server/proftpd:
     - ignore when proftpd barfs all over syslog when a passive transfer
       failed.
   * ignore.d.server/spamd:
     - expect shortcircuit status in scan messages; thanks to Marc Sherman
       (closes: #474239).
   * ignore.d.server/upsd:
     - ignore client connection messages (closes: #495923).
 .
   * violations.d/su:
     - match both, user-root and user:root styles (closes: #491694).
 .
   * Rulefiles are now installed with mode 644; the directories are still moe
     700, so the files are not publicly readable (unless the admin hardlinks
     them elsewhere).
Checksums-Sha1: 
 b8e6c01fda43a79645134f4751d41544f3213899 1183 logcheck_1.3.0.dsc
 b535e8a831328362a3fb8c182927d8574beab49e 152435 logcheck_1.3.0.tar.gz
 86793784fe880a851d4aeb2ea84fbe5fcb50b1d4 68530 logcheck_1.3.0_all.deb
 3095d8001f593ad252626c7659d8930f90eeb8c9 116362 logcheck-database_1.3.0_all.deb
 cbbcebe10e37d04cf993a4840e6c69606691ac94 54014 logtail_1.3.0_all.deb
Checksums-Sha256: 
 a36c8b826e4c3d36559c4b109abb23dc038062510cd9e0bb7241fa42aa1f30d7 1183 
logcheck_1.3.0.dsc
 bc7d3afff0497a2f3b3455d6481cadf4fa3df815e8a1306c701180c56bd17347 152435 
logcheck_1.3.0.tar.gz
 e53381d3f0307e8d20e0b024de54feaca9c75d4e78652ab3f9718f25d943a17e 68530 
logcheck_1.3.0_all.deb
 993e3686d8dc4316a60928634432ee9f97c8916eae7ae85a8e2661e1f99a7440 116362 
logcheck-database_1.3.0_all.deb
 ba3258629b64ff4b5b49d7e9cd539fe22ef6eb8f2e0a780a82519617e914f0fb 54014 
logtail_1.3.0_all.deb
Files: 
 ef1380e360d1d621af5b011e2fb1c940 1183 admin optional logcheck_1.3.0.dsc
 9ef0e67076b8d5ea7fa4372d37e4c55f 152435 admin optional logcheck_1.3.0.tar.gz
 272d7086948871529af2d8d35b1cf539 68530 admin optional logcheck_1.3.0_all.deb
 fe58b5fcf44093042f3ff095e86e9b55 116362 admin optional 
logcheck-database_1.3.0_all.deb
 4cc51a25eacb7ec77d29e7c6e08d1c59 54014 admin optional logtail_1.3.0_all.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAki67iAACgkQIgvIgzMMSnVGJgCePdMt/SfIWGEMzIob8EBTHHM0
8XUAoNVwR76urnz/CYHHlefrXrVLosjl
=WW+Q
-----END PGP SIGNATURE-----



--- End Message ---
_______________________________________________
Logcheck-devel mailing list
[email protected]
http://lists.alioth.debian.org/mailman/listinfo/logcheck-devel

Reply via email to