Jari Aalto
2005-Aug-08 22:04 UTC
[Logcheck-devel] Bug#322038: logcheck: [manaul] logcheck should not be run as root => write it to manual
Package: logcheck Version: 1.2.35 Severity: minor It appears that logcheck(1) cannot be run as is. It dislays: # logcheck -l /var/log/syslog logcheck should not be run as root. Use su to invoke logcheck: su -s /bin/bash -c "/usr/sbin/logcheck [options]" logcheck Please add this to the manual page in new section "EXAMPLES" since the manual page would otherwise suggest that logcheck can be used directly as root. -- System Information: Debian Release: testing/unstable APT prefers unstable APT policy: (500, 'unstable'), (500, 'stable'), (1, 'experimental') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.11-1-686 Locale: LANG=C, LC_CTYPE=C (charmap=ISO-8859-1) (ignored: LC_ALL set to en_US) Versions of packages logcheck depends on: ii adduser 3.66 Add and remove users and groups ii cron 3.0pl1-87 management of regular background p ii debconf [debconf 1.4.56 Debian configuration management sy ii debianutils 2.14.1 Miscellaneous utilities specific t ii exim4-daemon-hea 4.52-1 exim MTA (v4) daemon with extended ii lockfile-progs 0.1.10 Programs for locking and unlocking ii logcheck-databas 1.2.40 A database of system log rules for ii logtail 1.2.40 Print log file lines that have not ii mailx 1:8.1.2-0.20050715cvs-1 A simple mail user agent ii sysklogd [system 1.4.1-17 System Logging Daemon logcheck recommends no packages.
maximilian attems
2005-Aug-10 00:26 UTC
Bug#322038: [Logcheck-devel] Bug#322038: logcheck: [manaul] logcheck should not be run as root => write it to manual
On Tue, 09 Aug 2005, Jari Aalto wrote:> It appears that logcheck(1) cannot be run as is. It dislays: > > # logcheck -l /var/log/syslog > logcheck should not be run as root. Use su to invoke logcheck: > su -s /bin/bash -c "/usr/sbin/logcheck [options]" logcheckyour assumption is highly questionable. it can be run, but need to be invoked with it's own user right. the logcheck manpage is not the place to explain sudo/su handling.> Please add this to the manual page in new section "EXAMPLES" since the > manual page would otherwise suggest that logcheck can be used > directly as root.ok we will indicate this fact. -- maks
Debian Bug Tracking System
2005-Oct-27 04:18 UTC
[Logcheck-devel] Bug#322038: marked as done (logcheck: [manaul] logcheck should not be run as root => write it to manual)
Your message dated Thu, 27 Oct 2005 00:12:11 -0400 with message-id <20051027041211.GA26417 at rapidpacket.com> and subject line fixed in .42 has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) -------------------------------------- Received: (at submit) by bugs.debian.org; 8 Aug 2005 22:04:48 +0000>From jari.aalto at cante.net Mon Aug 08 15:04:48 2005Return-path: <jari.aalto at cante.net> Received: from fep02-0.kolumbus.fi (fep02-app.kolumbus.fi) [193.229.0.44] by spohr.debian.org with esmtp (Exim 3.36 1 (Debian)) id 1E2Fjj-0003YO-00; Mon, 08 Aug 2005 15:04:48 -0700 Received: from bongo.cante.net ([81.197.3.110]) by fep02-app.kolumbus.fi with ESMTP id <20050808220446.YNQS8199.fep02-app.kolumbus.fi at bongo.cante.net> for <submit at bugs.debian.org>; Tue, 9 Aug 2005 01:04:46 +0300 Received: from ns2.cante.net ([192.168.1.3] helo=cante.cante.net) by bongo.cante.net with esmtp (Exim 4.52) id 1E2Fji-00056C-5h; Tue, 09 Aug 2005 01:04:46 +0300 Received: from jaalto by cante.cante.net with local (Exim 4.52) id 1E2Fji-00086F-07; Tue, 09 Aug 2005 01:04:46 +0300 Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit From: Jari Aalto <jari.aalto at cante.net> To: Debian Bug Tracking System <submit at bugs.debian.org> Subject: logcheck: [manaul] logcheck should not be run as root => write it to manual X-Mailer: reportbug 3.15 Date: Tue, 09 Aug 2005 01:04:45 +0300 Message-Id: <E1E2Fji-00086F-07 at cante.cante.net> Delivered-To: submit at bugs.debian.org X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Level: X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE autolearn=no version=2.60-bugs.debian.org_2005_01_02 Package: logcheck Version: 1.2.35 Severity: minor It appears that logcheck(1) cannot be run as is. It dislays: # logcheck -l /var/log/syslog logcheck should not be run as root. Use su to invoke logcheck: su -s /bin/bash -c "/usr/sbin/logcheck [options]" logcheck Please add this to the manual page in new section "EXAMPLES" since the manual page would otherwise suggest that logcheck can be used directly as root. -- System Information: Debian Release: testing/unstable APT prefers unstable APT policy: (500, 'unstable'), (500, 'stable'), (1, 'experimental') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.11-1-686 Locale: LANG=C, LC_CTYPE=C (charmap=ISO-8859-1) (ignored: LC_ALL set to en_US) Versions of packages logcheck depends on: ii adduser 3.66 Add and remove users and groups ii cron 3.0pl1-87 management of regular background p ii debconf [debconf 1.4.56 Debian configuration management sy ii debianutils 2.14.1 Miscellaneous utilities specific t ii exim4-daemon-hea 4.52-1 exim MTA (v4) daemon with extended ii lockfile-progs 0.1.10 Programs for locking and unlocking ii logcheck-databas 1.2.40 A database of system log rules for ii logtail 1.2.40 Print log file lines that have not ii mailx 1:8.1.2-0.20050715cvs-1 A simple mail user agent ii sysklogd [system 1.4.1-17 System Logging Daemon logcheck recommends no packages. --------------------------------------- Received: (at 322038-done) by bugs.debian.org; 27 Oct 2005 04:16:06 +0000>From xtat at rapidpacket.com Wed Oct 26 21:16:06 2005Return-path: <xtat at rapidpacket.com> Received: from gaius.rapidpacket.com (foo.rapidpacket.com) [69.30.200.114] by spohr.debian.org with esmtp (Exim 3.36 1 (Debian)) id 1EUzBO-0006Ct-00; Wed, 26 Oct 2005 21:16:06 -0700 Received: from xtat by foo.rapidpacket.com with local (Exim 4.50) id 1EUz7b-0006sJ-4u for 322038-done at bugs.debian.org; Thu, 27 Oct 2005 00:12:11 -0400 Date: Thu, 27 Oct 2005 00:12:11 -0400 From: Todd Troxell <ttroxell at debian.org> To: 322038-done at bugs.debian.org Subject: fixed in .42 Message-ID: <20051027041211.GA26417 at rapidpacket.com> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline X-OS: Linux of course :> User-Agent: Mutt/1.5.9i Delivered-To: 322038-done at bugs.debian.org X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Level: X-Spam-Status: No, hits=-3.0 required=4.0 tests=BAYES_00 autolearn=no version=2.60-bugs.debian.org_2005_01_02 A note was added to the manpage in 1.2.42 which has entered unstable. -- Todd Troxell http://rapidpacket.com/~xtat