Package: logcheck-database Version: 1.2.68 Severity: normal I'm using ldap to authenticate users. And thus pam_unix is sufficient, but allowed to fail. It has now started to spam the logs with lots of Jan 2 09:22:57 sisko sshd[28511]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=host92-22-static.38-79-b.business.telecomitalia.it user=root And on another system the same is happening for imapd.
For a few weeks now I've added the below to the logcheck database to filter all those extra messages. It appears to have changed from a previous one, although I haven't bothered to look at the differences. ^\w{3} [ :0-9]{11} [._[:alnum:]-]+ [[:alnum:]]+\[[0-9]+\]: pam_unix\([[:alnum:]]+:auth\): authentication failure; logname= uid=0 euid=0 tty= ruser= rhost=[\.0-9]+ user=[^[:space:]]+$ -- System Information: Debian Release: 5.0 APT prefers testing APT policy: (500, 'testing') Architecture: amd64 (x86_64) Kernel: Linux 2.6.27-7-server (SMP w/1 CPU core) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/bash -- debconf information: logcheck-database/standard-rename-note: logcheck-database/conffile-cleanup: false -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org