| Summary: | /etc/periodic/daily/450.status-security ignores daily_output | ||
|---|---|---|---|
| Product: | Base System | Reporter: | Eric Cronin <ecronin> |
| Component: | bin | Assignee: | Brian Somers <brian> |
| Status: | Closed FIXED | ||
| Severity: | Affects Only Me | ||
| Priority: | Normal | ||
| Version: | 4.2-STABLE | ||
| Hardware: | Any | ||
| OS: | Any | ||
State Changed From-To: open->closed State Changed From-To: closed->open Re-open (closing this was an accident) Responsible Changed From-To: freebsd-bugs->brian I'll do this. If anyone's interested in the patch I'm testing they can find it at http://people.freebsd.org/~brian/periodic.patch State Changed From-To: open->closed A fix has been applied to current (see periodic.conf.5). I'll MFC in two weeks if there are no problems. |
The $daily_output variable in periodic.conf lets a user other than root or a file be selected for the output of periodic daily. The security check however has root hard coded in. Yes, I know enabling inline security gets around this but I like having the two messages so I can check security ones quickly. The part in question is: case "$daily_status_security_inline" in [Yy][Ee][Ss]) sh /etc/security -s $args rc=$?;; *) echo " (output mailed separately)" sh /etc/security $args 2>&1 | sendmail root && rc=0 || rc=3;; esac;; I don't know enough about the periodic scripts working to offer a patch since daily_output could be a file or e-mail... Fix: Modify above case to recognize daily_output How-To-Repeat: Set daily_output != root, watch security mailings still go to root