Public bug reported:

Binary package hint: logcheck

Since hardy (apparently), these are the entries in
/etc/logcheck/violations.d.server/sudo

^\w{3} [ :0-9]{11} [._[:alnum:]-]+ sudo\[[0-9]+\]: \(pam_[[:alnum:]]+\) .*$ 
^\w{3} [ :0-9]{11} [._[:alnum:]-]+ sudo\[[0-9]+\]: 
pam_[[:alnum:]]+\(sudo:[[:alnum:]]+\): .*$ 
^\w{3} [ :0-9]{11} [._[:alnum:]-]+ sudo: .*$

This means that we get an email from logcheck any time someone used
sudo.  This may be suitable on debian I guess, but it's not suitable on
an ubuntu server where sudo is the primary mode of administration.

I have no problem with failed authentication logs, but an entry for
every single use of sudo is pretty inconvenient on an Ubuntu server as
that is normal behaviour.

** Affects: logcheck (Ubuntu)
     Importance: Undecided
         Status: New

-- 
every sudo log is a violation
https://bugs.launchpad.net/bugs/243693
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to