Apologies, but I have to correct/improve myself on the previous comment.
I have a feeling I was running an older version of logcheck.

If I run logcheck from cron with full path (certainly the ubuntu
version) like this:

        sudo -u logcheck /usr/sbin/logcheck -op
        (given that I add /usr/bin/logcheck to /etc/sudoers with NOPASSWD)

or alernatively:
        Add a setuid logcheck to /usr/sbin/logcheck:
               sudo chown logcheck /usr/sbin/logcheck
               chmod u+s /usr/sbin/logcheck

Then, the offset files get created/updated under:
        /var/lib/logcheck/offset.var.log.<filename>

and the 'touch/chown' fix (step 2 above) is not necessary.

It is all hairy, but overall, the setuid checklog, setgid adm looks like the 
cleanest solution.
What is required is for all of the 3 conditions to be true:

     - /usr/sbin/logcheck can read all its configs under /etc/logcheck/*/*
     - /usr/sbin/logtail can write offset files under /var/lib/logcheck/*
     - /usr/sbin/logtail can read files under /var/log (some of which are 
user:group root:adm and not world readable)

Sorry.

-- 
logcheck fails when auth.log.1.gz missing
https://bugs.launchpad.net/bugs/149641
You received this bug notification because you are a member of Ubuntu
Bugs, which is the bug contact for Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to