Package: psad
Version: 2.1.3-1.1
Severity: wishlist

I took a look at psad following a rant at debian-users.

README.Debian states that the package won't edit /etc/syslog.conf , and
goes on to instruct how to configure sysklogd and syslog-ng .

In Lenny the default syslog is now rsyslog . rsyslog has /etc/rsyslog.d 
and thus there is no longer a need to edit configuration files. The 
package could provide /etc/rsyslog.d/psad.conf .

Sadly I'm not familiar enough with rsyslog to offer a patch.

-- System Information:
Debian Release: lenny/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.26-1-amd64 (SMP w/2 CPU cores)
Locale: LANG=he_IL.UTF-8, LC_CTYPE=he_IL.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash

Versions of packages psad depends on:
ii  iptables                      1.4.1.1-3  administration tools for packet fi
ii  libc6                         2.7-15     GNU C Library: Shared libraries
ii  libcarp-clan-perl             6.00-1     Perl enhancement to Carp error log
ii  libdate-calc-perl             5.4-5+b1   Perl library for accessing dates
ii  libiptables-chainmgr-perl     0.7-1      Perl extension for manipulating ip
ii  libiptables-parse-perl        0.6-1      Perl extension for parsing iptable
ii  libnetwork-ipv4addr-perl      0.10.ds-1  Perl extension for manipulating IP
ii  libunix-syslog-perl           1.1-2      Perl interface to the UNIX syslog(
ii  perl                          5.10.0-16  Larry Wall's Practical Extraction 
ii  psmisc                        22.6-1     Utilities that use the proc filesy
ii  rsyslog [system-log-daemon]   3.18.2-1   enhanced multi-threaded syslogd
ii  whois                         4.7.28     an intelligent whois client

Versions of packages psad recommends:
ii  bastille                      1:2.1.1-19 Security hardening tool

psad suggests no packages.

-- no debconf information



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to