Package: initscripts
Version: 2.96-5
Severity: wishlist

Dear Maintainer,

If TMPTIME is set to 0 (remove all files are removed regardless of age)
and /tmp is mounted as a separate filesystem on disk, why not simply
run mkfs on the filesystem before mounting it?  As well as clearing out
fluff more quickly, it'll also put the filesystem into a pristeen state.


-- System Information:
Debian Release: bullseye/sid
  APT prefers testing
  APT policy: (500, 'testing'), (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 5.8.0-1-amd64 (SMP w/8 CPU threads)
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_GB:en
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages initscripts depends on:
ii  lsb-base  11.1.0
ii  sysv-rc   2.96-5

Versions of packages initscripts recommends:
ii  e2fsprogs  1.45.6-1
ii  psmisc     23.3-1

initscripts suggests no packages.

-- Configuration Files:
/etc/default/rcS changed:
TMPTIME=14
FSCKFIX=yes

/etc/init.d/rc.local changed:
PATH=/sbin:/usr/sbin:/bin:/usr/bin
. /lib/init/vars.sh
. /lib/lsb/init-functions
do_start() {
        if [ -x /etc/rc.local ]; then
                [ "$VERBOSE" != no ] && log_begin_msg "Running local boot 
scripts (/etc/rc.local)"
                /etc/rc.local start
                ES=$?
                [ "$VERBOSE" != no ] && log_end_msg $ES
                return $ES
        fi
}
do_stop() {
        if [ -x /etc/rc.local ]; then
                [ "$VERBOSE" != no ] && log_begin_msg "Stopping local boot 
scripts (/etc/rc.local)"
                /etc/rc.local stop
                ES=$?
                [ "$VERBOSE" != no ] && log_end_msg $ES
                return $ES
        fi
}
case "$1" in
    start)
        do_start
        ;;
    restart|reload|force-reload)
        echo "Error: argument '$1' not supported" >&2
        exit 3
        ;;
    stop)
        do_stop
        ;;
    *)
        echo "Usage: $0 start|stop" >&2
        exit 3
        ;;
esac

/etc/rc.local changed:
if [ $# -eq 0 ]
then
        arg=start
else
        arg="$1"
fi
export http_proxy=http://127.0.0.1:3128
export no_proxy=localhost
export ftp_proxy=http://127.0.0.1:3128
case "$arg" in
  start|"")
        echo "Starting local services..."
        
        mount -o remount,rw,hidepid=2 /proc
        if [ ! -d /var/run/clamav ]; then
                mkdir /var/run/clamav
                chown -R clamav:clamav /var/run/clamav
        fi
        # LD_LIBRARY_PATH=/usr/local/lib /usr/local/sbin/clamd&
        # LD_LIBRARY_PATH=/usr/local/lib /usr/local/bin/freshclam --quiet&
        echo 1 >/proc/sys/net/ipv4/ip_forward
        iptables -t nat -A POSTROUTING -o eth1 -j MASQUERADE
        # http://lists.netfilter.org/pipermail/netfilter/2002-May/034048.html
        # eth1 is connected to the modem, eth0 to the internal network
        ## SYN-FLOODING PROTECTION
        iptables -N syn-flood
        iptables -A INPUT -i eth1 -p tcp --syn -j syn-flood
        iptables -A syn-flood -m limit --limit 1/s --limit-burst 4 -j RETURN
        iptables -A syn-flood -j DROP
        ## Make sure NEW tcp connections are SYN packets
        iptables -A INPUT -i eth1 -p tcp ! --syn -m state --state NEW -j DROP
        # Limit max connections per IP address
        iptables -A INPUT -i eth1 -p tcp --syn -m connlimit --connlimit-above 
15 --connlimit-mask 32 -j REJECT --reject-with tcp-reset
        # Allow 160 new connections per second before limit of 150 new
        # connects per second is applied
        iptables -A INPUT -i eth1 -m state --state RELATED,ESTABLISHED -m limit 
--limit 150/second --limit-burst 160 -j ACCEPT
        ## FRAGMENTS
        # Log fragments just to see if we get any, and deny them too.
        # iptables -A INPUT -i eth1 -f -j LOG --log-prefix "IPTABLES FRAGMENTS: 
"
        # iptables -A INPUT -i eth1 -f -j DROP
        ## SPOOFING
        # Refuse spoofed packets pretending to be from your IP address.
        iptables -A INPUT -i eth1 -s 192.168.1.0/24 -j DROP
        # Refuse packets claiming to be from a Class A private network.
        iptables -A INPUT -i eth1 -s 10.0.0.0/8 -j DROP
        # Refuse packets claiming to be from a Class B private network.
        iptables -A INPUT -i eth1 -s 172.16.0.0/12 -j DROP
        # Refuse packets claiming to be from a Class C private network.
        # iptables -A INPUT -i eth1 -s 192.168.0.0/16 -j DROP
        # Refuse Class D multicast addresses. Multicast is illegal as a source
        # address.
        # iptables -A INPUT -i eth1 -s 224.0.0.0/4 -j DROP
        # Refuse Class E reserved IP addresses.
        iptables -A INPUT -i eth1 -s 240.0.0.0/4 -j DROP
        # Refuse packets claiming to be to the loopback interface.
        iptables -A INPUT -i eth1 -d 127.0.0.1/27 -j DROP
        # Refuse broadcast address packets.
        # iptables -A INPUT -i eth1 -d 192.168.1.31 -j DROP
        # Block spoofed traffic on LAN
        iptables -A INPUT -i eth0 ! -s 192.168.1.0/24 -j LOG --log-prefix 
"SPOOFED PKT "
        iptables -A INPUT -i eth0 ! -s 192.168.1.0/24 -j DROP
        # Allow LAN traffic
        # iptables -A INPUT -s 192.168.0.0/255.255.255.0 -j ACCEPT
        iptables -A INPUT -i eth0 -j ACCEPT
        # Allow all loopback traffic
        iptables -A INPUT -i lo -j ACCEPT
        # Known attackers
        iptables -A INPUT -s 115.239.228.14 -j DROP
        iptables -A INPUT -s 62.210.113.184 -j DROP
        iptables -A INPUT -s 60.173.14.210 -j DROP
        iptables -A INPUT -p icmp --icmp-type echo-request -j ACCEPT
        iptables -A INPUT -i eth1 -s 130.14.0.0/16 -j ACCEPT
        iptables -A INPUT -i eth1 -s 108.28.231.36 -j ACCEPT
        iptables -A INPUT -i eth1 -s 72.83.250.144 -j ACCEPT
        iptables -A -i eth1 -p tcp --dport 25 --syn -m state --state NEW -j 
ACCEPT
        # Log dropped packets
        # iptables -N LOGGING
        # iptables -A INPUT -j LOGGING
        # iptables -A LOGGING -m limit --limit 2/min -j LOG --log-prefix 
'IPTables packet dropped: ' --log-level 7
        # iptables -A LOGGING -j DROP
        # iptables -I INPUT 5 -m limit --limit 5/min -j LOG --log-prefix 
'iptables denied: ' --log-level 6 -i eth1
        # ip6tables -A INPUT -j LOG --log-prefix "IPv6 "
        # ip6tables -A FORWARD -j LOG --log-prefix "IPv6 "
        # ip6tables -A FORWARD -j LOG ! -i lo
        rm -rf ~root/.cpan/build/* ~root/.cpan/sources/authors/id/?&
        rm -rf ~njh/.cpan/build/* ~njh/.cpan/sources/authors/id/?&
        rm /usr/local/test-smoke/*.lck
        # /etc/init.d/spf-milter-python stop
        # killall /usr/bin/spfmilter.py
        mkdir /tmp/unofficial-dbs
        # LD_LIBRARY_PATH=/usr/local/lib 
/usr/local/sbin/update_sanesecurity</dev/null>/dev/null 2>&1&
        rm /usr/unofficial-dbs/configs/last*
        # /usr/local/sbin/clamav-unofficial-sigs.sh -c 
/usr/local/etc/clamav-unofficial-sigs.conf</dev/null>/dev/null 2>&1 &
        sa-update&
        nikto -update&
        # /usr/sbin/fwsnort --update-rules
        # /usr/sbin/fwsnort
        # /var/lib/fwsnort/fwsnort.sh&
        # These are needed for psad
        /sbin/iptables -A INPUT -j LOG -i eth1 \! -s 173.79.63.100
        /sbin/iptables -A FORWARD -j LOG -i eth1 \! -s 173.79.63.100
        # Drop incoming traffic from AWS
        /sbin/iptables -I INPUT -s 54.184.0.0/14 -j DROP
        /sbin/iptables -I INPUT -s 54.216.0.0/14 -j DROP
        /sbin/iptables -I INPUT -s 54.220.0.0/15 -j DROP
        /sbin/iptables -I INPUT -s 54.208.0.0/13 -j DROP
        /sbin/iptables -I INPUT -s 54.176.0.0/12 -j DROP
        (psad -sig-update && psad -H)>/dev/null 2>&1 &
        # [ -d /tmp/cpan ] || (mkdir /tmp/cpan && chmod 777 /tmp/cpan)
        [ -d /tmp/viruses ] || (mkdir /tmp/viruses && chmod 777 /tmp/viruses)
        [ -d /tmp/descriptions-cache ] || (mkdir /tmp/descriptions-cache && 
chmod 777 /tmp/descriptions-cache)
        [ -d /var/tmp/descriptions-cache ] || (mkdir 
/var/tmp/descriptions-cache && chmod 777 /var/tmp/descriptions-cache)
        >/tmp/phishes && chmod 666 /tmp/phishes
        rm -f /var/run/tomek /var/run/cpan /var/run/blacklist 
/var/run/spf-milter-python/spfmilter.pid /var/run/mailermailer.sock
        rm -f /var/cache/http-cache-transparent/*.tmp*&
        # /usr/local/etc/cpan /tmp/cpan local:/var/run/cpan&
        /usr/local/etc/tomek local:/var/run/tomek&
        # /usr/local/etc/mailermailermilter&
        # /usr/local/etc/blacklist -f /var/log/syslog/local/mail/mail.info 
local:/var/run/blacklist&
        # /usr/local/etc/usermilter local:/var/run/usermilter&
        # /usr/local/etc/cmilter local:/var/run/cmilter&
        # /usr/local/etc/dupmilter local:/var/run/dupmilter&
        # /usr/local/sbin/sshmonitor>>/var/log/auth.log 2>&1&
        # /etc/init.d/breakinguard start 2>&1&
        # ~njh/bin/pop3-clear>/dev/null 2>&1&
        pyzord&
        # ~njh/bin/phpbb_albanian 2>&1>/dev/null&
        ~njh/bin/travellite&
        # ~njh/bin/spamcop_remove_unreported 2>&1 | mail -s remove_unreported 
njh 2> /dev/null&
        # Spamassassin load balance
        if [ ! -d /var/run/pen ]; then
                mkdir /var/run/pen
        fi
        pen 10782 -r -p /var/run/pen/spamass-milter localhost:10783 
packard:10783&
        # curl -o /usr/local/share/clamav/mbl.ndb 
http://www.malware.com.br/cgi/submit?action=list_clamav_ext&;
        # chown -R clamav:clamav /tmp/unofficial-dbs /usr/unofficial-dbs&
        > /tmp/spambot.db
        chown www-data:www-data /tmp/spambot*
        chmod 666 /tmp/spambot*
        # mkdir -p /var/run/clamav /var/run/spf-milter-python
        mkdir -p /var/run/clamav /var/run/spf-milter-python
        chown -R clamav:clamav /var/run/clamav
        # chown -R spf-milter-python /var/run/spf-milter-python
        # /etc/init.d/spf-milter-python start&
        sync
        sleep 5
        # LD_LIBRARY_PATH=/usr/local/lib /usr/local/sbin/clamav-milter 
--max-children=2 --broadcast=eth1 -eq --server=packard:localhost -P 
--pidfile=/var/run/clamav/clamav-milter.pid --blacklist-time=60 
--dont-blacklist=212.159.0.0/19,84.92.0.0/15,217.154.105.2,212.159.7.187,217.157.23.243,212.159.7.186,212.159.14.131
 --black-hole-mode local:/var/run/clamav/clamav.sock -W 
/usr/local/share/clamav/milter-whitelist 
--report-phish-false-positive=nigel_ho...@hotmail.com&
        # LD_LIBRARY_PATH=/usr/local/lib /usr/local/sbin/Oclamav-milter 
--max-children=2 --broadcast=eth1 -eq --server=packard:localhost -P 
--pidfile=/var/run/clamav/clamav-milter.pid --blacklist-time=60 
--dont-blacklist=212.159.0.0/19,84.92.0.0/15,217.154.105.2,212.159.7.187,217.157.23.243,212.159.7.186,212.159.14.131
 local:/var/run/clamav/clamav.sock -W /usr/local/share/clamav/milter-whitelist 
--report-phish-false-positive=nigel_ho...@hotmail.com&
        # LD_LIBRARY_PATH=/usr/local/lib /usr/local/sbin/clamav-milter&
        # finger postmas...@autoturn.force9.net 2>&1>>/var/log/ppp/autoturn&
        # nice ionice -c 3 /usr/local/bin/usbbackup&
        nice /usr/local/sbin/fetchyahoo --username=nigel_horne 
--password=handsoff --spool=/var/mail/spam --folder=Spam --allmsgs --delete&
        puppet agent --server gateway.bandsman.co.uk --no-daemonize --verbose 
--onetime&
        # watchdog -s does this
        # /usr/local/etc/update&
        service dovecot stop
        service puppetmaster stop
        service apache2 stop
        service portsentry stop
        sync
        service dovecot start&
        service apache2 start&
        service portsentry start&
        service dupmilter restart&
        service blacklist-milter restart&
        export HARNESS_OPTIONS=j3:c
        export TEST_JOBS=3
        # nice su - njh -c /usr/local/bin/minismokeboxd&
        # su - njh -c /usr/local/bin/smokeboxd&
        # See /etc/init.d/metabase-relayd
        # http_proxy= nice /usr/local/bin/metabase-relayd 
>>/var/log/metabase-relay.log 2>&1 &
        ;;
  stop)
        echo "Stopping local services..."
        ~spam/bin/spam-bounce&
        /usr/local/bin/li -r0l /var/spool/mqueue>/dev/null&
        find /var/spool/mqueue -mtime +3|xargs rm -f&
        # ~njh/bin/sendcpan&
        /usr/local/bin/freshclam --submit-stats --quiet -l 
/var/log/clamav/freshclam.log>/dev/null 2>&1&
        pkill sendmail && /etc/init.d/sendmail restart
        # ~njh/bin/pop3-bounce>>/tmp/pop3log 2>&1 &
        # killall finger 2>&1>/dev/null
        # finger postmas...@autoturn.force9.net 2>&1>>/var/log/ppp/autoturn&
        # njh/bin/spamcop>/dev/null 2>&1 &
        # ~njh/bin/phpbb_albanian 2>&1>/dev/null&
        # /usr/local/sbin/sortoutrc>/dev/null 2>&1&
        sync
        sleep 5
        killall clsniffer&
        # ~njh/bin/pop3-clear>/dev/null 2>&1&
        # perl /usr/local/sbin/sendmail-milter-spf.pl -k
        ;;
  restart)
        $0 stop
        $0 start
        ;;
  reload)
        $0 start
        ;;
  *)
        echo "Usage: $0 {start|stop|restart|reload|status}" 1>&2
        logger "$0: bad args $1"
        exit 1
esac
exit 0


-- no debconf information

Reply via email to