[Eisfair] journalctl liefert Fehler, die in /var/log/messages nicht sichtbar sind.

Rolf Bensch azubi at bensch-net.de
Mi Mai 1 19:53:13 CEST 2024


Hallo Holger,

Am 01.05.24 um 18:07 schrieb Holger Bruenjes:
> ...
>> Das soll vermutlich ein Wink mit dem Zaunpfahl sein. Ich finde den Zaunpfahl aber nicht :-()
> 
> noee, ich wollte nur wissen, ob an der Installation was faul ist, ist es aber nicht.
> 
> was vielleicht zu Erkenntnissen fuehren koennte 
> 
> grep -R 'grep ' /etc/init.d/*

das erzeugt ziemlich viel Output. Auffallend hierbei, dass in /etc/init.d 3 Dateien liegen, die auf "~" enden und recht alt sind. Dabei machen "brute_force_blocking~" und "mail~" regen Gebrauch von grep. Sind das Altlasten? Können die weg?

Grüße

Rolf

# grep -R 'grep ' /etc/init.d/*
/etc/init.d/block_complete_networks:         if grep -q "AccountID 999999" /etc/GeoIP/GeoIP.conf
/etc/init.d/block_complete_networks:        POSITION=`$IPTABLES -nL INPUT |grep -n BFBBLOCK | awk -F":" '{print $1}'|tail -1`
/etc/init.d/block_complete_networks:            POSITION=`$IP6TABLES -nL INPUT |grep -n BFBBLOCK | awk -F":" '{print $1}'|tail -1`
/etc/init.d/block_complete_networks:        if iptables-save | grep -q geoip
/etc/init.d/brute_force_blocking~:            echo 'if ! $NFT list ruleset ip | grep -q "chain BFBBLOCK"'
/etc/init.d/brute_force_blocking~:                echo 'if ! $NFT list ruleset ip | grep -q "chain BFBSCAN"'
/etc/init.d/brute_force_blocking~:                echo 'if ! $NFT list ruleset ip | grep -q "chain BOTBLOCK" >/dev/null'
/etc/init.d/brute_force_blocking~:    mount | grep -qs "^ *$ramdev *on */${bfbhome##*/} *type *$fs" && umount /${bfbhome##*/} >/dev/null 2>&1
/etc/init.d/brute_force_blocking~:    oldspace=`df | grep $bfbhome | awk {'print $2'} | tail -1`
/etc/init.d/brute_force_blocking~:DYNDNSUPDATE=`ps ax | grep [b]rute_force_blocking | grep /bin/bash | grep -Ev "/etc/rc|init|edit|eisman|deinstall|config|checkchecker|menu" | grep dyndnsupdate.sh`
/etc/init.d/brute_force_blocking~:echo `ps ax | grep [b]rute_force_blocking | grep /bin/bash | grep -Ev "/etc/rc|init|edit|eisman|deinstall|config|checkchecker|menu" | awk '{print $1}' | head -1`
/etc/init.d/brute_force_blocking~:            for handle in `$NFT -a list chain ip filter INPUT 2>/dev/null | grep -E "BFB|BOTBLOCK" | awk -F"handle " {'print $2'}`
/etc/init.d/brute_force_blocking~:                for handle in `$NFT -a list chain ip6 filter INPUT 2>/dev/null | grep -E "BFB|BOTBLOCK" | awk -F"handle " {'print $2'}`
/etc/init.d/brute_force_blocking~:        rn=(`$IPTABLES -w -nL INPUT 2>/dev/null --line-numbers|grep -E "(BFB|BOTBLOCK)"|awk '{print $1}'`)
/etc/init.d/brute_force_blocking~:            if $IPTABLES -nL FORWARD | grep -qs recent
/etc/init.d/brute_force_blocking~:        if $IPTABLES -nL INPUT 2>/dev/null | grep -s BFBBLOCK >/dev/null
/etc/init.d/brute_force_blocking~:        if $IPTABLES -nL 2>/dev/null | grep -ws BFBBLOCK >/dev/null
/etc/init.d/brute_force_blocking~:        if $IPTABLES -nL 2>/dev/null | grep -ws BFBSCAN >/dev/null
/etc/init.d/brute_force_blocking~:        if $IPTABLES -nL 2>/dev/null | grep -ws BOTBLOCK >/dev/null
/etc/init.d/brute_force_blocking~:        if $IPTABLES -nL 2>/dev/null | grep -ws BFBATMA >/dev/null
/etc/init.d/brute_force_blocking~:            rn=(`ip6tables -w -nL INPUT 2>/dev/null --line-numbers|grep -E "(BFB|BOTBLOCK)"|awk '{print $1}'`)
/etc/init.d/brute_force_blocking~:                if $IP6TABLES -nL FORWARD | grep -qs recent
/etc/init.d/brute_force_blocking~:            if $IP6TABLES -nL INPUT 2>/dev/null | grep -s BFBBLOCK >/dev/null
/etc/init.d/brute_force_blocking~:            if $IP6TABLES -nL 2>/dev/null | grep -ws BFBBLOCK>/dev/null
/etc/init.d/brute_force_blocking~:            if $IP6TABLES -nL 2>/dev/null | grep -ws BFBSCAN >/dev/null
/etc/init.d/brute_force_blocking~:            if $IP6TABLES -nL 2>/dev/null | grep -ws BOTBLOCK >/dev/null
/etc/init.d/brute_force_blocking~:            if $IP6TABLES -nL 2>/dev/null | grep -ws BFBATMA >/dev/null
/etc/init.d/brute_force_blocking~:        if $NFT list ruleset ip | grep -q "ip filter"
/etc/init.d/brute_force_blocking~:            VORHANDEN=`$NFT list chain ip filter INPUT 2>/dev/null| grep BFB | wc -l`
/etc/init.d/brute_force_blocking~:        if ! $NFT list ruleset ip | grep -q "ip filter"
/etc/init.d/brute_force_blocking~:            if ! $NFT list ruleset ip | grep -q "chain BFBSCAN"
/etc/init.d/brute_force_blocking~:            if ! $NFT list ruleset ip | grep -q "chain BFBATMA"
/etc/init.d/brute_force_blocking~:            if ! $NFT list ruleset ip| grep -q "chain BFBBLOCK"
/etc/init.d/brute_force_blocking~:            if ! $NFT list ruleset ip | grep -q "set BFBTIMELISTGREEN"
/etc/init.d/brute_force_blocking~:                if ! $NFT list chain ip filter BFBBLOCK | grep -q "@BFBTIMELISTGREEN accept"
/etc/init.d/brute_force_blocking~:            if ! $NFT list ruleset ip | grep -wq "set BFBTIMELIST"
/etc/init.d/brute_force_blocking~:                if ! $NFT list chain ip filter BFBBLOCK | grep -q "@BFBTIMELIST drop"
/etc/init.d/brute_force_blocking~:            if ! $NFT list ruleset ip | grep -q "chain BFBBLOCK"
/etc/init.d/brute_force_blocking~:        if ! $NFT list ruleset ip | grep -q "chain BOTBLOCK"
/etc/init.d/brute_force_blocking~:            if ! $NFT list ruleset ip | grep -q "chain BFBRECENT"
/etc/init.d/brute_force_blocking~:            if ! nft list chain ip filter BFBBLOCK | grep -q BFBRECENT
/etc/init.d/brute_force_blocking~:            if ! $NFT list chain ip filter BFBBLOCK | grep -q BFBAGGRS
/etc/init.d/brute_force_blocking~:            if ! $NFT list chain ip filter BFBBLOCK | grep -q BFBLONG
/etc/init.d/brute_force_blocking~:        VORHANDEN=`$IPTABLES -nL INPUT 2>/dev/null | grep -s BFB | wc -l` >/dev/null 2>&1
/etc/init.d/brute_force_blocking~:            if ! $IPTABLES -nL BFBBLOCK |grep -q BFBAGGRS >/dev/null 2>&1
/etc/init.d/brute_force_blocking~:                if ! [[ `$IPTABLES -nL BFBBLOCK  2>/dev/null | grep BFBLONG` ]]
/etc/init.d/brute_force_blocking~:            if ! $NFT list ruleset ip6 | grep -q "ip6 filter"
/etc/init.d/brute_force_blocking~:                if ! $NFT list ruleset ip6 | grep -q "chain BFBSCAN"
/etc/init.d/brute_force_blocking~:                if ! $NFT list ruleset ip6 | grep -q "chain BFBATMAN"
/etc/init.d/brute_force_blocking~:                if ! $NFT list ruleset ip6 | grep -q "chain BFBBLOCK"
/etc/init.d/brute_force_blocking~:                if ! $NFT list ruleset ip6 | grep -q "set BFBTIMELISTGREEN"
/etc/init.d/brute_force_blocking~:                    if ! $NFT  list chain ip6 filter BFBBLOCK | grep -q "@BFBTIMELISTGREEN accept"
/etc/init.d/brute_force_blocking~:                if ! $NFT list ruleset ip6 | grep -wq "set BFBTIMELIST"
/etc/init.d/brute_force_blocking~:                    if ! $NFT  list chain ip6 filter BFBBLOCK | grep -q "@BFBTIMELIST drop"
/etc/init.d/brute_force_blocking~:                if ! $NFT list ruleset ip6 | grep -q "chain BFBBLOCK"
/etc/init.d/brute_force_blocking~:            if ! $NFT list ruleset ip6 | grep -q "chain BOTBLOCK"
/etc/init.d/brute_force_blocking~:                if ! $NFT list ruleset ip6 | grep -q "chain BFBRECENT"
/etc/init.d/brute_force_blocking~:                if ! $NFT list chain ip6 filter BFBBLOCK | grep -q BFBRECENT
/etc/init.d/brute_force_blocking~:                if ! $NFT list chain ip6 filter BFBBLOCK | grep -q BFBAGGRS
/etc/init.d/brute_force_blocking~:                if ! $NFT list chain ip6 filter BFBBLOCK | grep -q BFBLONG
/etc/init.d/brute_force_blocking~:            VORHANDEN=`$IP6TABLES -nL INPUT 2>/dev/null | grep -s BFB | wc -l` >/dev/null 2>&1
/etc/init.d/brute_force_blocking~:                if ! $IP6TABLES -nL BFBBLOCK |grep -q BFBAGGRS >/dev/null 2>&1
/etc/init.d/brute_force_blocking~:                    if ! [[ `$IP6TABLES -nL BFBBLOCK  2>/dev/null | grep BFBLONG6` ]]
/etc/init.d/brute_force_blocking~:                $bfbhome/bfb-db.sh display anzahllong |grep -Eo '([0-9\.]+\.+)+[0-9]+' |while read IP
/etc/init.d/brute_force_blocking~:                    $bfbhome/bfb-db.sh display anzahllong |grep -Eo '([a-f0-9:]+:+)+[a-f0-9]+' |while read IP6
/etc/init.d/brute_force_blocking~:                $bfbhome/bfb-db.sh display anzahllong |grep -Eo '([0-9\.]+\.+)+[0-9]+' |while read IP
/etc/init.d/brute_force_blocking~:                if ! [[ `$IP6TABLES -nL BFBBLOCK  2>/dev/null | grep BFBLONG6` ]]
/etc/init.d/brute_force_blocking~:                    $bfbhome/bfb-db.sh display anzahllong |grep -Eo '([a-f0-9:]+:+)+[a-f0-9]+' |while read IP6
/etc/init.d/brute_force_blocking~:        grep FREE /etc/config.d/brute_force_blocking >/usr/local/brute_force_blocking/freeoldstat
/etc/init.d/brute_force_blocking~:     apache_packetversion=`grep "<version>" /var/install/packages/apache2 | sed 's#</*version>##g' | sed s"/\.//"g`
/etc/init.d/brute_force_blocking~:        PID=`ps -ef | grep brute_force_blocking | grep bash | grep -Ev "install|menu|grep|init" | head -1 |awk '{print $2}'`
/etc/init.d/brute_force_blocking~:            PID=`ps -ef | grep brute_force_blocking | grep bash | grep -Ev "install|menu|grep" | head -1|awk '{print $2}'`
/etc/init.d/brute_force_blocking~:        grep FREE /etc/config.d/brute_force_blocking >/usr/local/brute_force_blocking/freestat
/etc/init.d/brute_force_blocking~:            if [ ! `$bfbhome/bfb-db.sh print | grep free | tail -1` ]
/etc/init.d/brute_force_blocking~:            #grep FREE /etc/config.d/brute_force_blocking >/usr/local/brute_force_blocking/freeoldstat
/etc/init.d/brute_force_blocking~:            if [ ! `$bfbhome/bfb-db.sh print | grep free | tail -1` ]
/etc/init.d/brute_force_blocking~:                echo 'for handle in `$NFT -a list chain filter BFBBLOCK | grep -E "$ip" | awk -F"handle" {'"'print \$2'"'}`'
/etc/init.d/brute_force_blocking~:                echo 'for handle in `$NFT -a list chain filter BFBATMA | grep -E "$ip" | awk -F"handle" {'"'print \$2'"
/etc/init.d/brute_force_blocking~:                    for handle in `$NFT -a list chain filter BFBBLOCK | grep -E "$ip" | awk -F"handle" {'print $2'}`
/etc/init.d/brute_force_blocking~:                        for handle in `$NFT -a list chain ip6 filter BFBBLOCK | grep -E "$ip" | awk -F"handle" {'print $2'}`
/etc/init.d/brute_force_blocking~:                    for handle in `$NFT -a list chain filter BFBATMA | grep -E "$ip" | awk -F"handle" {'print $2'}`
/etc/init.d/brute_force_blocking~:                        for handle in `$NFT -a list chain ip6 filter BFBATMA | grep -E "$ip" | awk -F"handle" {'print $2'}`
/etc/init.d/brute_force_blocking~:                    if $NFT list set ip filter BFBLONG |grep -w "${ip}" >/dev/null
/etc/init.d/brute_force_blocking~:                        if $NFT list set ip6 filter BFBLONG |grep -w "${ip}" >/dev/null
/etc/init.d/brute_force_blocking~:                    if ! grep -q "[a-zA-Z]" <<< $ip
/etc/init.d/brute_force_blocking~:                        if $IPTABLES -nL BFBATMA | grep -qF $ip
/etc/init.d/brute_force_blocking~:                                if $IPTABLES -nL BFBATMA | grep -qF $ip
/etc/init.d/brute_force_blocking~:                                if $IPTABLES -nL BFBATMA | grep -qF $ip
/etc/init.d/brute_force_blocking~:                    if ! grep -q "[a-zA-Z]" <<< $ip
/etc/init.d/brute_force_blocking~:                        if ipset list BFBLONG | grep -w "${ip}" >/dev/null
/etc/init.d/brute_force_blocking~:                        if grep -q "[a-zA-Z]" <<< $ip
/etc/init.d/brute_force_blocking~:                        if grep -q "[a-zA-Z]" <<< $ip
/etc/init.d/brute_force_blocking~:                            if ipset list BFBLONG6 | grep -w "${ip}" >/dev/null
/etc/init.d/eisgraph:    ramfs=`findmnt | grep eisgraph`
/etc/init.d/eisgraph_traffic_port:        check=`cat /srv/eisgraph/sic/iptables.save | grep EISGRAPH_PORT`
/etc/init.d/eisgraph_traffic_port:        cat /srv/eisgraph/sic/iptables0.save | grep "EISGRAPH_PORT"
/etc/init.d/functions:#               - grep for counting string length.
/etc/init.d/ip-eth:    if echo "${net_devices}" | /usr/bin/grep -q -Ew "${eth_name}"
/etc/init.d/ip-eth:        name=$(echo "${net_devices}" | /usr/bin/grep -Ew '(enp[1-9]?[0-9]s[1-9]?[0-9][fu]?[1-9]?[0-9]?u?[1-9]?[0-9]?)|(en[os][1-9]?[0-9])|(enx[[:alnum:]]{12})')
/etc/init.d/ip-eth:            if echo "${name}" | /usr/bin/grep -q ':'
/etc/init.d/ip-eth:            while /usr/sbin/ip link show ${name} | /usr/bin/grep -i -q 'state DOWN'
/etc/init.d/mail~:        PIDLIST=`ps -Ae -o cmd,pid | grep "^[a-z/]*${PROCNAME}" | rev | cut -d' ' -f1 | rev`
/etc/init.d/mail~:        echo ":${_cp_listen_port}:" | grep -E -q "${_cp_port_list}"
/etc/init.d/mail~:            grep -q 'disable[ \t]*=[ \t]yes' ${xinet_pop3file}
/etc/init.d/mail~:        grep -q 'disable[ \t]*=[ \t]no' ${xinet_pop3file}
/etc/init.d/mail~:            grep 'disable[ \t]*=[ \t]no' /etc/xinetd.d/pop3 >/dev/null 2>&1
/etc/init.d/mail~:            grep -q 'disable[ \t]*=[ \t]yes' ${xinet_imapfile}
/etc/init.d/mail~:        grep -q 'disable[ \t]*=[ \t]no' ${xinet_imapfile}
/etc/init.d/mail~:            grep 'disable[ \t]*=[ \t]no' /etc/xinetd.d/imap >/dev/null 2>&1
/etc/init.d/ntp:        grep -i -q "File expires on:" ${ntp_leapfile}
/etc/init.d/ntp:            expiry_date=`grep -i "File expires on:"  ${ntp_leapfile} | sed 's/^.*File expires on: *//i'`
/etc/init.d/ntp:                NTP_SERVER_OPTIONS=`echo "${NTP_SERVER_OPTIONS}" |  sed 's/ *-/\n-/g' | grep -E -v "^ *$|^\-[uclp]" | tr '\n' ' '`
/etc/init.d/ntp:ntp_leapfile=`grep "^leapfile" ${ntp_conffile} | sed 's/^[^ ]* *//'`
/etc/init.d/redis:            pid=`ps -fC "redis-server" | tr -s ' ' ':' | cut -d: -f2 | grep -v 'PID' 2>/dev/null`
/etc/init.d/smartmon:            smartd_ps=`ps -A | grep 'smartd'`
/etc/init.d/xinetd:    if grep -q -s "${b_line}" ${service}

(init.d)# ls -l
total 240
-rwxr-xr-x 1 root root  2667 Aug 19  2022 addhost
-rwxr-xr-x 1 root root 12259 Aug 31  2021 block_complete_networks
drwxr-xr-x 2 root root  4096 Mar 14 15:57 boot.d
-rwxr-xr-x 1 root root   861 Apr  1  2020 boot.local
-rwxr-xr-x 1 root root 75982 May  9  2022 brute_force_blocking~
-rwxr-x--- 1 root root  6721 Jan 15 12:00 certs_dehydrated
-rwxr-x--- 1 root root  1695 Jun 30  2020 eisgraph
-rwx------ 1 root root  3092 Jun  2  2022 eisgraph_traffic_port
-rw-r--r-- 1 root root 20718 Mar 20 16:00 functions
-rwxr-xr-x 1 root root  4054 Mar 20 16:00 ip-eth
-rwxr-xr-x 1 root root  1238 Mar 20 16:00 lo
-rwxr-xr-x 1 root root   632 Jul 20  2003 local~
-rwxr-xr-x 1 root root 28845 Apr  2  2020 mail~
-rwxr-xr-x 1 root root  2499 Apr 17 21:24 minidlna
-rwxr-xr-x 1 root root  2355 Jun 22  2021 netdate
-rwxr-xr-x 1 root root  6711 Jun 22  2021 ntp
-rwxr-xr-x 1 root root  3350 Jun  3  2021 power_button
-rwxr-xr-x 1 root root  9573 Mar 31  2022 redis
-rwxr-xr-x 1 root root  1245 Mar 20 16:00 resolv
-rwxr-xr-x 1 root root  2272 Mar 20 16:00 route
-rwxr-xr-x 1 root root  3634 Oct 19  2017 smartmon
-rw-r--r-- 1 root root  3629 Mar 20 16:00 systemd_redirect
-rwxr-xr-x 1 root root  5488 May 14  2022 xinetd




Mehr Informationen über die Mailingliste Eisfair