[Logcheck-devel] Bug#588285: Bug#588285: logcheck: Additional rules to ignore successful kerberos authentication

2010-07-08 Thread Michel Messerschmidt
On Tue, Jul 06, 2010 at 06:26:10PM -0700, Russ Allbery wrote:
 I wonder if the right way of handling this would be to instead install a
 logcheck rule as part of the libpam-krb5 package that looks something
 like:
 
 ^\w{3} [ :[:digit:]]{11} [._[:alnum:]-]+ [[:alnum:]]+(\[[0-9]+\])?: 
 pam_krb5\([[:alnum:]]+:auth\): user [[:alnum:]-]+ authenticated as 
 [[:alnum:]...@-]+$

Ok works fine for me now.

Your rule matches all pam_krb5 success messages on my systems besides 
dovecot, because it uses dovecot-auth as the process name.
I propose to enhance the rule to:
  ^\w{3} [ :[:digit:]]{11} [._[:alnum:]-]+ [[:alnum:]-]+(\[[0-9]+\])?: 
pam_krb5\([[:alnum:]]+:auth\): user [[:alnum:]-]+ authenticated as 
[[:alnum:]...@-]+$




___
Logcheck-devel mailing list
Logcheck-devel@lists.alioth.debian.org
http://lists.alioth.debian.org/mailman/listinfo/logcheck-devel


[Logcheck-devel] Bug#588285: Bug#588285: logcheck: Additional rules to ignore successful kerberos authentication

2010-07-08 Thread Hannes von Haugwitz

Michel Messerschmidt wrote:

On Tue, Jul 06, 2010 at 06:26:10PM -0700, Russ Allbery wrote:

I wonder if the right way of handling this would be to instead install a
logcheck rule as part of the libpam-krb5 package that looks something
like:

^\w{3} [ :[:digit:]]{11} [._[:alnum:]-]+ [[:alnum:]]+(\[[0-9]+\])?: 
pam_krb5\([[:alnum:]]+:auth\): user [[:alnum:]-]+ authenticated as 
[[:alnum:]...@-]+$


Ok works fine for me now.

Your rule matches all pam_krb5 success messages on my systems besides 
dovecot, because it uses dovecot-auth as the process name.

I propose to enhance the rule to:
  ^\w{3} [ :[:digit:]]{11} [._[:alnum:]-]+ [[:alnum:]-]+(\[[0-9]+\])?: 
pam_krb5\([[:alnum:]]+:auth\): user [[:alnum:]-]+ authenticated as 
[[:alnum:]...@-]+$




Valid point. Fixed in e786dd9.

Greetings

Hannes



___
Logcheck-devel mailing list
Logcheck-devel@lists.alioth.debian.org
http://lists.alioth.debian.org/mailman/listinfo/logcheck-devel


[Logcheck-devel] Bug#588285: Bug#588285: logcheck: Additional rules to ignore successful kerberos authentication

2010-07-07 Thread Michel Messerschmidt
On Tue, Jul 06, 2010 at 06:26:10PM -0700, Russ Allbery wrote:
 I wonder if the right way of handling this would be to instead install a
 logcheck rule as part of the libpam-krb5 package that looks something

This would be the preferred solution for me.
I just haven't found a way to configure logcheck to match log messages
from one daemon against arbitrary rule files. For example, log messages
from sudo will be matched against /etc/logcheck/ignore.d.server/sudo 
but not against /etc/logcheck/ignore.d.server/libpam.





___
Logcheck-devel mailing list
Logcheck-devel@lists.alioth.debian.org
http://lists.alioth.debian.org/mailman/listinfo/logcheck-devel


[Logcheck-devel] Bug#588285: Bug#588285: logcheck: Additional rules to ignore successful kerberos authentication

2010-07-07 Thread Russ Allbery
Michel Messerschmidt li...@michel-messerschmidt.de writes:
 On Tue, Jul 06, 2010 at 06:26:10PM -0700, Russ Allbery wrote:

 I wonder if the right way of handling this would be to instead install a
 logcheck rule as part of the libpam-krb5 package that looks something

 This would be the preferred solution for me.
 I just haven't found a way to configure logcheck to match log messages
 from one daemon against arbitrary rule files. For example, log messages
 from sudo will be matched against /etc/logcheck/ignore.d.server/sudo 
 but not against /etc/logcheck/ignore.d.server/libpam.

Hm, that doesn't sound right to me; I've dropped additional files into
that directory before and have had them match a variety of daemon names.
Also, note the Postfix rules and how they match all sorts of different
daemon names.  I think something else might have been broken.

-- 
Russ Allbery (r...@debian.org)   http://www.eyrie.org/~eagle/



___
Logcheck-devel mailing list
Logcheck-devel@lists.alioth.debian.org
http://lists.alioth.debian.org/mailman/listinfo/logcheck-devel


[Logcheck-devel] Bug#588285: Bug#588285: logcheck: Additional rules to ignore successful kerberos authentication

2010-07-06 Thread Russ Allbery
Michel Messerschmidt li...@michel-messerschmidt.de writes:

 Many of my logcheck reports are triggered by regular user authentication
 against kerberos enabled services.
 Here are rules to ignore authentication success messages for some common
 daemons.

 violations.ignore.d/logcheck-sudo:
 ^\w{3} [ :[:digit:]]{11} [._[:alnum:]-]+ sudo: pam_krb5+\(sudo:auth\): user 
 [[:alnum:]-]+ authenticated as [[:alnum:]...@-]+$

 ignore.d.server/cups-lpd:
 ^\w{3} [ :[:digit:]]{11} [._[:alnum:]-]+ cupsd: pam_krb5\(cups:auth\): user 
 [[:alnum:]-]+ authenticated as [[:alnum:]...@-]+$

 ignore.d.server/ssh:
 ^\w{3} [ :[:digit:]]{11} [._[:alnum:]-]+ sshd\[[[:digit:]]+\]: 
 pam_krb5\(sshd:auth\): user [[:alnum:]-]+ authenticated as [[:alnum:]...@-]+$

 ignore.d.workstation/gdm:
 ^\w{3} [ :[:digit:]]{11} [._[:alnum:]-]+ gdm\[[0-9]+\]: pam_krb5\(gdm:auth\): 
 user [[:alnum:]-]+ authenticated as [[:alnum:]...@-]+$

I wonder if the right way of handling this would be to instead install a
logcheck rule as part of the libpam-krb5 package that looks something
like:

^\w{3} [ :[:digit:]]{11} [._[:alnum:]-]+ [[:alnum:]]+(\[[0-9]+\])?: 
pam_krb5\([[:alnum:]]+:auth\): user [[:alnum:]-]+ authenticated as 
[[:alnum:]...@-]+$

or if that would be too general.

-- 
Russ Allbery (r...@debian.org)   http://www.eyrie.org/~eagle/



___
Logcheck-devel mailing list
Logcheck-devel@lists.alioth.debian.org
http://lists.alioth.debian.org/mailman/listinfo/logcheck-devel