okay, that was a little hasty.  I now think I understand a little
better.  The above filters are present to ensure that every sudo event
is handled at the violations layer and not below that.

So, instead of changing these lines, can I suggest we add an extra entry
to  /etc/logcheck/violations.ignore.d/logcheck-sudo to match these

Jun 27 16:02:18 cuimhne sudo: pam_unix(sudo:session): session opened for user 
root by gavinmc(uid=0)                                                          
            
Jun 27 16:02:18 cuimhne sudo: pam_unix(sudo:session): session closed for user 
root                                                                            
            
Jun 27 16:03:41 cuimhne sudo: pam_unix(sudo:session): session opened for user 
root by gavinmc(uid=0)                                                          
            
Jun 27 16:03:41 cuimhne sudo: pam_unix(sudo:session): session closed for user 
root 

possibly these?

^\w{3} [ :0-9]{11} [._[:alnum:]-]+ sudo: pam_unix\(sudo:session\): session 
opened for user root by [[:alnum:]]+\(uid=0\)
^\w{3} [ :0-9]{11} [._[:alnum:]-]+ sudo: pam_unix\(sudo:session\): session 
closed for user root

-- 
every sudo log is a violation
https://bugs.launchpad.net/bugs/243693
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to