Package: spampd
Version: 2.30-22
Severity: wishlist
Tags: patch

Dear Maintainer,

Please consider including logcheck rules for spampd.  In its default
configuration spampd logs messages to syslog for each piece of mail that
is processed, which is a lot of additional messages for logcheck users
to dig through.  It would be nice if these were filtered, to exclude
messages about normal functioning of the program.

I have attached 2 logcheck files that do exactly that.  During
installation, the following files can be installed:

spampd.paranoid.logcheck    =>  /etc/logcheck/ignore.d.paranoid/spampd
spampd.server.logcheck      =>  /etc/logcheck/ignore.d.server/spampd

For more information, see README.Maintainer and README.logcheck-database
in the logcheck documentation.[1]  Of course, feel free to move the
rules around or adjust as you see fit.

Also, the attached rules include matching for the ORCPT command fragment
that appears in the "for ___" statements.  I'm not sure if this is a bug
or intended behavior.  If it's a bug, feel free to remove the ORCPT part
of the regexes and fix spampd to not print it.

Cheers,
Kevin

1.  http://logcheck.org/docs/


-- System Information:
Debian Release: wheezy/sid
  APT prefers testing
  APT policy: (990, 'testing'), (500, 'unstable'), (101, 'experimental')
Architecture: i386 (i686)

Kernel: Linux 3.0.4-kevinoid1 (SMP w/2 CPU cores; PREEMPT)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages spampd depends on:
ii  adduser             3.113   
ii  dpkg                1.16.0.3
ii  libnet-server-perl  0.99-2  
ii  lsb-base            3.2-28  
ii  perl                5.12.4-4
ii  spamassassin        3.3.2-2 

spampd recommends no packages.

spampd suggests no packages.

-- Configuration Files:
/etc/spampd.conf [Errno 13] Permission denied: u'/etc/spampd.conf'

-- no debconf information
# Operational messages
^\w{3} [ :[:digit:]]{11} [._[:alnum:]-]+ spampd\[[[:digit:]]+\]: (clean 
message|identified spam) (<[^[:space:]]*>|\(unknown\)) 
\(-?[[:digit:].]+/-?[[:digit:].]+\) from (<[^[:space:]]*>|\(unknown\)) for 
(<[^[:space:]]*>([[:space:]]+ORCPT=[^[:space:]]+)?|\(unknown\)) in 
[[:digit:].]+s, [[:digit:]]+ bytes\.$
^\w{3} [ :[:digit:]]{11} [._[:alnum:]-]+ spampd\[[[:digit:]]+\]: rules hit for 
(<[^[:space:]]*>|\(unknown\)): 
^\w{3} [ :[:digit:]]{11} [._[:alnum:]-]+ spampd\[[[:digit:]]+\]: skipped large 
message \([[:digit:].]+KB\)$

# Startup messages
^\w{3} [ :[:digit:]]{11} [._[:alnum:]-]+ spampd\[[[:digit:]]+\]: Binding to TCP 
port [[:digit:]]+ on host [._[:alnum:]-]+$
^\w{3} [ :[:digit:]]{11} [._[:alnum:]-]+ spampd\[[[:digit:]]+\]: Process 
Backgrounded$
^\w{3} [ :[:digit:]]{11} [._[:alnum:]-]+ spampd\[[[:digit:]]+\]: Setting gid to 
"[[:digit:]]+"$
^\w{3} [ :[:digit:]]{11} [._[:alnum:]-]+ spampd\[[[:digit:]]+\]: Setting uid to 
"[[:digit:]]+"$
^\w{3} [ :[:digit:]]{11} [._[:alnum:]-]+ spampd\[[[:digit:]]+\]: 
[[:digit:]/:-]{19} Server closing!$
^\w{3} [ :[:digit:]]{11} [._[:alnum:]-]+ spampd\[[[:digit:]]+\]: 
[[:digit:]/:-]{19} SpamPD \(type Net::Server::PreForkSimple\) starting! 
pid\([[:digit:]]+\)$
# Operational messages
^\w{3} [ :[:digit:]]{11} [._[:alnum:]-]+ spampd\[[[:digit:]]+\]: clean message 
(<[^[:space:]]*>|\(unknown\)) \(-?[[:digit:].]+/-?[[:digit:].]+\) from 
(<[^[:space:]]*>|\(unknown\)) for 
(<[^[:space:]]*>([[:space:]]+ORCPT=[^[:space:]]+)?|\(unknown\)) in 
[[:digit:].]+s, [[:digit:]]+ bytes\.$
^\w{3} [ :[:digit:]]{11} [._[:alnum:]-]+ spampd\[[[:digit:]]+\]: processing 
message (<[^[:space:]]*>|\(unknown\)) for 
(<[^[:space:]]*>([[:space:]]+ORCPT=[^[:space:]]+)?|\(unknown\))$

Reply via email to