[Logcheck-commits] r1209 - in logcheck/trunk: debian docs
madduck at users.alioth.debian.org
madduck at users.alioth.debian.org
Sat Jul 29 15:59:57 UTC 2006
Author: madduck
Date: 2006-07-29 15:59:56 +0000 (Sat, 29 Jul 2006)
New Revision: 1209
Modified:
logcheck/trunk/debian/changelog
logcheck/trunk/docs/README.logcheck-database
Log:
documentation update by micah anderrson
Modified: logcheck/trunk/debian/changelog
===================================================================
--- logcheck/trunk/debian/changelog 2006-07-29 09:22:54 UTC (rev 1208)
+++ logcheck/trunk/debian/changelog 2006-07-29 15:59:56 UTC (rev 1209)
@@ -1,3 +1,9 @@
+logcheck (1.2.47a~madduck.2) sarge-backports; urgency=low
+
+ * Test release.
+
+ -- martin f. krafft <madduck at debian.org> Sat, 29 Jul 2006 10:19:08 +0100
+
logcheck (1.2.48) UNRELEASED; urgency=low
[ maximilian attems ]
Modified: logcheck/trunk/docs/README.logcheck-database
===================================================================
--- logcheck/trunk/docs/README.logcheck-database 2006-07-29 09:22:54 UTC (rev 1208)
+++ logcheck/trunk/docs/README.logcheck-database 2006-07-29 15:59:56 UTC (rev 1209)
@@ -12,12 +12,12 @@
There are three layers of sets of filtering rules, all of which are
normal egrep pattern-matches, applied in turn.
-1. the "ATTACK ALERTS" layer, designed to detect the traces of active
+1. the "SECURITY ALERTS" layer, designed to detect the traces of active
intrusion attempts.
Patterns raising the alarm go in "/etc/logcheck/cracking.d"; any
event that matches one of these patterns turns the report
- into an urgent "Attack Alerts" report, with the relevant
+ into an urgent "Security Alerts" report, with the relevant
event moved to a special section. The cracking.d standard
keywords file is seeded with known symptoms of hostile
activity (see logcheck's README.keywords file).
@@ -108,7 +108,7 @@
Standard "generic" rules go in each directory's "./logcheck" file;
thus for instance any log message at all matching "ATTACK"
(listed in "/etc/logcheck/cracking.d/logcheck") _always_ triggers
-an "Attack Alert", unless you deliberately tamper with
+a "Security Alert", unless you deliberately tamper with
"cracking.ignore.d" rules.
Remember that package-specific "ignore" filters will _not_ override
More information about the Logcheck-commits
mailing list