Displaying 20 results from an estimated 30000 matches similar to: "Strange kernel messages"
2015 Sep 21
0
CentOS-6 Logwatch 7.3.6 behaviour
On Sat, September 19, 2015 06:51, Tony Mountifield wrote:
> In article
> <d0000782c236fbee71045dad24a43def.squirrel at webmail.harte-lyne.ca>,
James B. Byrne <byrnejb at harte-lyne.ca> wrote:
>> After some experimenting I have observed that overriding settings from
>> /usr/share/logwatch/default.conf/logwatch.conf in
>> /etc/logwatch/conf/logwatch.conf does not
2009 Oct 23
3
Need some help with logwatch.
I am trying to get a logwatch summary emailed to a central address
from a cron job. The tasd was copied verbatim from a system which
does this already. Both are shown below.
host1 crontab -l as root
45 7 * * * /usr/sbin/logwatch --service http --service imapd
--service pop3 --service sshd --service vsftpd --service
zz-disk_space --service zz-network --service zz-sys --mailto
support at
2015 Sep 18
1
CentOS-6 Logwatch 7.3.6 behaviour
After some experimenting I have observed that overriding settings from
/usr/share/logwatch/default.conf/logwatch.conf in
/etc/logwatch/conf/logwatch.conf does not produce consistent results.
For example, if I replace the default detail configuration in
etc/logwatch/conf/logwatch.conf with:
Detail = High
It does indeed change the level of detail from the default Low set in
2015 Sep 17
0
CentOS-6 - LogWatch Cyrus-IMAPD script was CentOS-6 - LogWatch
On Mon, September 14, 2015 14:51, James B. Byrne wrote:
> The Logwatch imapd service script distributed with CentOS-6 does not
> generate anything when I run logwatch --service all on a cyrus-imapd
> host. Is this expected behaviour? Is there a separate script for
> cyrus-imapd or are their configuration options required to get the
> existing script to work.
>
> I have found
2015 Sep 14
1
CentOS-6 - LogWatch
The Logwatch imapd service script distributed with CentOS-6 does not
generate anything when I run logwatch --service all on a cyrus-imapd
host. Is this expected behaviour? Is there a separate script for
cyrus-imapd or are their configuration options required to get the
existing script to work.
I have found an ancient (2004) logwatch service script for cyrus-imapd
but I was sort of hoping that
2015 Jun 15
3
Logwatch and System uptime
CentOS-6.6
Can logwatch be configured to display the system uptime as part of the
reporting prologue? If not then what would be the recommended way of
including this information in a daily logwatch report?
--
*** e-Mail is NOT a SECURE channel ***
Do NOT transmit sensitive data via e-Mail
James B. Byrne mailto:ByrneJB at Harte-Lyne.ca
Harte & Lyne
2015 Sep 15
1
CentOS-6 - LogWatch
On Mon, September 14, 2015 21:28, Always Learning wrote:
>
> On Mon, 2015-09-14 at 14:51 -0400, James B. Byrne wrote:
>
>> The Logwatch imapd service script distributed with CentOS-6 does not
>> generate anything when I run logwatch --service all on a cyrus-imapd
>> host. Is this expected behaviour? Is there a separate script for
>> cyrus-imapd or are their
2015 Sep 22
0
CentOS6 - Break in attempt? What is the Exploit?
On Mon, September 21, 2015 15:37, m.roth at 5-cent.us wrote:
> Gordon Messmer wrote:
>>
>>> > In other words, the
>>> >hostkeys would be identical.
>>
>> I think what the error indicates is that a client tried to connect
>> to SSH, and the host key there did not match the fingerprint in the
>> client's "known_hosts" database.
2016 Jan 26
0
What to do when you've been hacked?
On Mon, January 25, 2016 19:12, Benjamin Smith wrote:
>
> Which I'd consider "best practices" and we do them.
> They are specifically asking about what to do *after* a
> breach. Despite all the best practices in
> place, there's *still* some risk.
>
If someone wants in to your network then they will get in. There is
no point in deluding yourself or your
2012 Sep 20
3
Sendmail log entries
Recently we began seeing lots of these log entries on our off-site mx
smtp host. I have googled this but I am not clear from what I have
read if this is something we can stop altogether or should even worry
about.
Comments?
Logwatch. . .
--------------------- sendmail Begin ------------------------
SMTP SESSION, MESSAGE, OR RECIPIENT ERRORS
------------------------------------------
2014 Nov 25
2
CentOS-5.10 Sendmail STARTTLS error
This morning I discovered this in the logwatch report for our external MX
backup host.
STARTTLS: write error=syscall error (-1), errno=32,
get_error=error:00000000:lib(0):func(0):reason(0), retry=99, ssl_err=5: 206
Time(s)
I also see many entries similar to this:
8: fl=0x802, mode=140777: SOCK
inet04.mississauga.harte-lyne.ca/34091->(Transport endpoint is not connected):
1 Time(s)
2012 Mar 28
0
[SOLVED] Re: Postfix problems with maximum messages size
On Wed, March 28, 2012 09:44, James B. Byrne wrote:
> CentOS-6.2
>
> I am confused.
Yes, yes I am. I was looking at the wrong server.
--
*** E-Mail is NOT a SECURE channel ***
James B. Byrne mailto:ByrneJB at Harte-Lyne.ca
Harte & Lyne Limited http://www.harte-lyne.ca
9 Brockley Drive vox: +1 905 561 1241
Hamilton, Ontario
2010 Jan 28
2
Starting a java applet from the desktop
CentOS-5.4 i86_64
I have a calculator applet on my desktop (superbcalc.jar). When I
double click on it I get no response. If I right click and select
open with java I get no response. If I open a terminal window and
cd to Desktop and type java -jar superbcalc.jar then the applet
opens.
Does anyone have any idea why I am seeing this behaviour? There are
no messages in the syslog file relating
2015 Feb 05
0
Another Fedora decision
On Wed, February 4, 2015 17:16, Lamar Owen wrote:.
>
> Now, I have seen this happen, on a system in the wild, where the very
> first thing the attacker did was grab a copy of /etc/shadow, even with
> an interactive reverse shell and root access being had. So even when
> you recover your system from the compromise you have the risk of all
> those passwords being known, and
2016 Jun 17
1
https and self signed
On Thu, June 16, 2016 14:23, Valeri Galtsev wrote:
>
> On Thu, June 16, 2016 1:09 pm, Gordon Messmer wrote:
>>
>> I doubt that most users check the dates on SSL certificates,
>> unless they are familiar enough with TLS to understand that
>> a shorter validity period is better for security.
>
> Oh, this is what he meant: Cert validity period. Though I agree
>
2014 Aug 20
2
Port scanning from MicroSoft?
This mornings activity log shows this:
. . .
From 23.102.132.99 - 2 packets to tcp(3389)
From 23.102.133.164 - 1 packet to tcp(3389)
From 23.102.134.239 - 2 packets to tcp(3389)
From 23.102.136.210 - 3 packets to tcp(3389)
From 23.102.136.222 - 2 packets to tcp(3389)
From 23.102.137.62 - 3 packets to tcp(3389)
From 23.102.137.101 - 2 packets to tcp(3389)
From
2010 Dec 06
1
pam_time.so and /etc/security/time.conf
I am investigating how to limit user logins via sshd to specific
times of day. I have the basic syntax but what I want to know is how
does pam_time.so process time.conf.
Say I have a clutch of users that should login between 07:00 and
18:00 Monday to Friday. I infer that the following will handle
that:
sshd;*;*,Wk0700-1800
However, what is not clear to me is how does one permit certain
2020 Jun 30
0
samab-4.10 nsupdate
> Could be because you added the wrong line to your smb4.conf (why does
> freebsd call it smb4.conf ?),
Why does freebsd put these things in /usr/local/etc/? Some questions have
answers that are not worth the effort to know.
> try:
> nsupdate command = /usr/local/sbin/nsupdate -g
I did catch that error earlier. But it makes no difference. samba_dnsupdate
does not give any
2016 Jun 17
0
https and self signed
On Fri, June 17, 2016 10:19 am, James B. Byrne wrote:
>
> On Thu, June 16, 2016 14:23, Valeri Galtsev wrote:
>>
>> On Thu, June 16, 2016 1:09 pm, Gordon Messmer wrote:
>>>
>>> I doubt that most users check the dates on SSL certificates,
>>> unless they are familiar enough with TLS to understand that
>>> a shorter validity period is better for
2009 Mar 31
1
[Fwd: Re: Another rpm question re %make]
On Tue, March 31, 2009 13:03, James B. Byrne wrote:
> Found it. No etc/at.allow and no etc/at.deny means only root can
> submit jobs.
>
Well, that was not it. I still get the same errors after adding my
user id to /etc/at.allow. I tested whether job control was enabled
by moving top into the background using ctrl-z and fg to return and
that worked. Any suggestions as to what I am