From owner-freebsd-questions@freebsd.org Fri Nov 8 16:23:40 2019 Return-Path: Delivered-To: freebsd-questions@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 055561B6D68 for ; Fri, 8 Nov 2019 16:23:40 +0000 (UTC) (envelope-from byrnejb@harte-lyne.ca) Received: from mailman.nyi.freebsd.org (unknown [127.0.1.3]) by mx1.freebsd.org (Postfix) with ESMTP id 478lvH5TLlz4YpX for ; Fri, 8 Nov 2019 16:23:39 +0000 (UTC) (envelope-from byrnejb@harte-lyne.ca) Received: by mailman.nyi.freebsd.org (Postfix) id B9F841B6D67; Fri, 8 Nov 2019 16:23:39 +0000 (UTC) Delivered-To: questions@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id B9BBE1B6D66 for ; Fri, 8 Nov 2019 16:23:39 +0000 (UTC) (envelope-from byrnejb@harte-lyne.ca) Received: from mx32.harte-lyne.ca (mx32.harte-lyne.ca [216.185.71.32]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mx32.harte-lyne.ca", Issuer "CA_HLL_ISSUER_2016" (not verified)) by mx1.freebsd.org (Postfix) with ESMTPS id 478lvG4W3Zz4YpV for ; Fri, 8 Nov 2019 16:23:38 +0000 (UTC) (envelope-from byrnejb@harte-lyne.ca) Received: from mx32.harte-lyne.ca (localhost [127.0.32.1]) by mx32.harte-lyne.ca (Postfix) with ESMTP id C12734904 for ; Fri, 8 Nov 2019 11:23:35 -0500 (EST) X-Virus-Scanned: amavisd-new at harte-lyne.ca Received: from mx32.harte-lyne.ca ([127.0.32.1]) by mx32.harte-lyne.ca (mx32.harte-lyne.ca [127.0.32.1]) (amavisd-new, port 10024) with ESMTP id IdYX5z9MdNVx for ; Fri, 8 Nov 2019 11:23:34 -0500 (EST) Received: from webmail.harte-lyne.ca (webmail.hamilton.harte-lyne.ca [216.185.71.106]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mx32.harte-lyne.ca (Postfix) with ESMTPSA id 144F148FB for ; Fri, 8 Nov 2019 11:23:34 -0500 (EST) Received: from 216.185.71.44 (SquirrelMail authenticated user byrnejb_hll) by webmail.harte-lyne.ca with HTTP; Fri, 8 Nov 2019 11:23:34 -0500 Message-ID: <14e202ded3bf1da9d1fddbc163f74e50.squirrel@webmail.harte-lyne.ca> Date: Fri, 8 Nov 2019 11:23:34 -0500 Subject: logcheck on FreeBSD-12 From: "James B. Byrne" To: questions@freebsd.org Reply-To: byrnejb@harte-lyne.ca User-Agent: SquirrelMail/1.4.23 [SVN] MIME-Version: 1.0 Content-Type: text/plain;charset=iso-8859-1 Content-Transfer-Encoding: 8bit X-Priority: 3 (Normal) Importance: Normal X-Rspamd-Queue-Id: 478lvG4W3Zz4YpV X-Spamd-Bar: -------- X-Spamd-Result: default: False [-8.47 / 15.00]; RCVD_VIA_SMTP_AUTH(0.00)[]; HAS_REPLYTO(0.00)[byrnejb@harte-lyne.ca]; R_SPF_ALLOW(-0.20)[+ip4:216.185.71.0/26]; TO_DN_NONE(0.00)[]; RCVD_DKIM_ARC_DNSWL_MED(-0.50)[]; REPLYTO_ADDR_EQ_FROM(0.00)[]; RCVD_IN_DNSWL_MED(-0.20)[32.71.185.216.list.dnswl.org : 127.0.4.2]; DKIM_TRACE(0.00)[harte-lyne.ca:+]; HAS_X_PRIO_THREE(0.00)[3]; DMARC_POLICY_ALLOW(-0.50)[harte-lyne.ca,quarantine]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+]; RCVD_TLS_LAST(0.00)[]; ASN(0.00)[asn:12021, ipnet:216.185.64.0/20, country:CA]; IP_SCORE(-3.77)[ip: (-9.90), ipnet: 216.185.64.0/20(-4.93), asn: 12021(-3.95), country: CA(-0.09)]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; R_DKIM_ALLOW(-0.20)[harte-lyne.ca:s=dkim_hll]; RCVD_COUNT_FIVE(0.00)[5]; FROM_HAS_DN(0.00)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; MIME_GOOD(-0.10)[text/plain]; PREVIOUSLY_DELIVERED(0.00)[questions@freebsd.org]; RCPT_COUNT_ONE(0.00)[1]; DWL_DNSWL_LOW(-1.00)[harte-lyne.ca.dwl.dnswl.org : 127.0.4.1] X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 08 Nov 2019 16:23:40 -0000 I am attempting to get the following message unreported in locgcheck: Nov 8 07:01:40 vhost04 sshd[63602]: Bad protocol version identification 'GET /requested.html HTTP/1.1' from 157.230.216.203 port 37044 I have this rule in /usr/local/etc/logcheck/violations.ignore.d/local-sshd: ^\w{3} [ :[:digit:]]{11} .*sshd\[.*\]: Bad protocol version identification.* I have confirmed that this rule matches the log entry given above: Nov 8 11:07:46 vhost04 sshd[99149]: Bad protocol version identification 'GET / HTTP/1.1' from 47.99.215.199 port 42304 ================================================================================ parsed file: /var/log/auth.log used rule: '^\w{3} [ :[:digit:]]{11} .*sshd\[.*\]: Bad protocol version identification.*' I have confirmed that the local-sshd file is readable by logcheck: ll /usr/local/etc/logcheck/violations.ignore.d/local-sshd -rw-r--r-- 1 root logcheck 866 Nov 6 11:17 /usr/local/etc/logcheck/violations.ignore.d/local-sshd Why are these things still being reported? -- *** e-Mail is NOT a SECURE channel *** Do NOT transmit sensitive data via e-Mail Do NOT open attachments nor follow links sent by e-Mail James B. Byrne mailto:ByrneJB@Harte-Lyne.ca Harte & Lyne Limited http://www.harte-lyne.ca 9 Brockley Drive vox: +1 905 561 1241 Hamilton, Ontario fax: +1 905 561 0757 Canada L8E 3C3