[Eisfair] journalctl liefert Fehler, die in /var/log/messages nicht sichtbar sind.
Rolf Bensch
azubi at bensch-net.de
Mi Mai 1 19:53:13 CEST 2024
Hallo Holger,
Am 01.05.24 um 18:07 schrieb Holger Bruenjes:
> ...
>> Das soll vermutlich ein Wink mit dem Zaunpfahl sein. Ich finde den Zaunpfahl aber nicht :-()
>
> noee, ich wollte nur wissen, ob an der Installation was faul ist, ist es aber nicht.
>
> was vielleicht zu Erkenntnissen fuehren koennte
>
> grep -R 'grep ' /etc/init.d/*
das erzeugt ziemlich viel Output. Auffallend hierbei, dass in /etc/init.d 3 Dateien liegen, die auf "~" enden und recht alt sind. Dabei machen "brute_force_blocking~" und "mail~" regen Gebrauch von grep. Sind das Altlasten? Können die weg?
Grüße
Rolf
# grep -R 'grep ' /etc/init.d/*
/etc/init.d/block_complete_networks: if grep -q "AccountID 999999" /etc/GeoIP/GeoIP.conf
/etc/init.d/block_complete_networks: POSITION=`$IPTABLES -nL INPUT |grep -n BFBBLOCK | awk -F":" '{print $1}'|tail -1`
/etc/init.d/block_complete_networks: POSITION=`$IP6TABLES -nL INPUT |grep -n BFBBLOCK | awk -F":" '{print $1}'|tail -1`
/etc/init.d/block_complete_networks: if iptables-save | grep -q geoip
/etc/init.d/brute_force_blocking~: echo 'if ! $NFT list ruleset ip | grep -q "chain BFBBLOCK"'
/etc/init.d/brute_force_blocking~: echo 'if ! $NFT list ruleset ip | grep -q "chain BFBSCAN"'
/etc/init.d/brute_force_blocking~: echo 'if ! $NFT list ruleset ip | grep -q "chain BOTBLOCK" >/dev/null'
/etc/init.d/brute_force_blocking~: mount | grep -qs "^ *$ramdev *on */${bfbhome##*/} *type *$fs" && umount /${bfbhome##*/} >/dev/null 2>&1
/etc/init.d/brute_force_blocking~: oldspace=`df | grep $bfbhome | awk {'print $2'} | tail -1`
/etc/init.d/brute_force_blocking~:DYNDNSUPDATE=`ps ax | grep [b]rute_force_blocking | grep /bin/bash | grep -Ev "/etc/rc|init|edit|eisman|deinstall|config|checkchecker|menu" | grep dyndnsupdate.sh`
/etc/init.d/brute_force_blocking~:echo `ps ax | grep [b]rute_force_blocking | grep /bin/bash | grep -Ev "/etc/rc|init|edit|eisman|deinstall|config|checkchecker|menu" | awk '{print $1}' | head -1`
/etc/init.d/brute_force_blocking~: for handle in `$NFT -a list chain ip filter INPUT 2>/dev/null | grep -E "BFB|BOTBLOCK" | awk -F"handle " {'print $2'}`
/etc/init.d/brute_force_blocking~: for handle in `$NFT -a list chain ip6 filter INPUT 2>/dev/null | grep -E "BFB|BOTBLOCK" | awk -F"handle " {'print $2'}`
/etc/init.d/brute_force_blocking~: rn=(`$IPTABLES -w -nL INPUT 2>/dev/null --line-numbers|grep -E "(BFB|BOTBLOCK)"|awk '{print $1}'`)
/etc/init.d/brute_force_blocking~: if $IPTABLES -nL FORWARD | grep -qs recent
/etc/init.d/brute_force_blocking~: if $IPTABLES -nL INPUT 2>/dev/null | grep -s BFBBLOCK >/dev/null
/etc/init.d/brute_force_blocking~: if $IPTABLES -nL 2>/dev/null | grep -ws BFBBLOCK >/dev/null
/etc/init.d/brute_force_blocking~: if $IPTABLES -nL 2>/dev/null | grep -ws BFBSCAN >/dev/null
/etc/init.d/brute_force_blocking~: if $IPTABLES -nL 2>/dev/null | grep -ws BOTBLOCK >/dev/null
/etc/init.d/brute_force_blocking~: if $IPTABLES -nL 2>/dev/null | grep -ws BFBATMA >/dev/null
/etc/init.d/brute_force_blocking~: rn=(`ip6tables -w -nL INPUT 2>/dev/null --line-numbers|grep -E "(BFB|BOTBLOCK)"|awk '{print $1}'`)
/etc/init.d/brute_force_blocking~: if $IP6TABLES -nL FORWARD | grep -qs recent
/etc/init.d/brute_force_blocking~: if $IP6TABLES -nL INPUT 2>/dev/null | grep -s BFBBLOCK >/dev/null
/etc/init.d/brute_force_blocking~: if $IP6TABLES -nL 2>/dev/null | grep -ws BFBBLOCK>/dev/null
/etc/init.d/brute_force_blocking~: if $IP6TABLES -nL 2>/dev/null | grep -ws BFBSCAN >/dev/null
/etc/init.d/brute_force_blocking~: if $IP6TABLES -nL 2>/dev/null | grep -ws BOTBLOCK >/dev/null
/etc/init.d/brute_force_blocking~: if $IP6TABLES -nL 2>/dev/null | grep -ws BFBATMA >/dev/null
/etc/init.d/brute_force_blocking~: if $NFT list ruleset ip | grep -q "ip filter"
/etc/init.d/brute_force_blocking~: VORHANDEN=`$NFT list chain ip filter INPUT 2>/dev/null| grep BFB | wc -l`
/etc/init.d/brute_force_blocking~: if ! $NFT list ruleset ip | grep -q "ip filter"
/etc/init.d/brute_force_blocking~: if ! $NFT list ruleset ip | grep -q "chain BFBSCAN"
/etc/init.d/brute_force_blocking~: if ! $NFT list ruleset ip | grep -q "chain BFBATMA"
/etc/init.d/brute_force_blocking~: if ! $NFT list ruleset ip| grep -q "chain BFBBLOCK"
/etc/init.d/brute_force_blocking~: if ! $NFT list ruleset ip | grep -q "set BFBTIMELISTGREEN"
/etc/init.d/brute_force_blocking~: if ! $NFT list chain ip filter BFBBLOCK | grep -q "@BFBTIMELISTGREEN accept"
/etc/init.d/brute_force_blocking~: if ! $NFT list ruleset ip | grep -wq "set BFBTIMELIST"
/etc/init.d/brute_force_blocking~: if ! $NFT list chain ip filter BFBBLOCK | grep -q "@BFBTIMELIST drop"
/etc/init.d/brute_force_blocking~: if ! $NFT list ruleset ip | grep -q "chain BFBBLOCK"
/etc/init.d/brute_force_blocking~: if ! $NFT list ruleset ip | grep -q "chain BOTBLOCK"
/etc/init.d/brute_force_blocking~: if ! $NFT list ruleset ip | grep -q "chain BFBRECENT"
/etc/init.d/brute_force_blocking~: if ! nft list chain ip filter BFBBLOCK | grep -q BFBRECENT
/etc/init.d/brute_force_blocking~: if ! $NFT list chain ip filter BFBBLOCK | grep -q BFBAGGRS
/etc/init.d/brute_force_blocking~: if ! $NFT list chain ip filter BFBBLOCK | grep -q BFBLONG
/etc/init.d/brute_force_blocking~: VORHANDEN=`$IPTABLES -nL INPUT 2>/dev/null | grep -s BFB | wc -l` >/dev/null 2>&1
/etc/init.d/brute_force_blocking~: if ! $IPTABLES -nL BFBBLOCK |grep -q BFBAGGRS >/dev/null 2>&1
/etc/init.d/brute_force_blocking~: if ! [[ `$IPTABLES -nL BFBBLOCK 2>/dev/null | grep BFBLONG` ]]
/etc/init.d/brute_force_blocking~: if ! $NFT list ruleset ip6 | grep -q "ip6 filter"
/etc/init.d/brute_force_blocking~: if ! $NFT list ruleset ip6 | grep -q "chain BFBSCAN"
/etc/init.d/brute_force_blocking~: if ! $NFT list ruleset ip6 | grep -q "chain BFBATMAN"
/etc/init.d/brute_force_blocking~: if ! $NFT list ruleset ip6 | grep -q "chain BFBBLOCK"
/etc/init.d/brute_force_blocking~: if ! $NFT list ruleset ip6 | grep -q "set BFBTIMELISTGREEN"
/etc/init.d/brute_force_blocking~: if ! $NFT list chain ip6 filter BFBBLOCK | grep -q "@BFBTIMELISTGREEN accept"
/etc/init.d/brute_force_blocking~: if ! $NFT list ruleset ip6 | grep -wq "set BFBTIMELIST"
/etc/init.d/brute_force_blocking~: if ! $NFT list chain ip6 filter BFBBLOCK | grep -q "@BFBTIMELIST drop"
/etc/init.d/brute_force_blocking~: if ! $NFT list ruleset ip6 | grep -q "chain BFBBLOCK"
/etc/init.d/brute_force_blocking~: if ! $NFT list ruleset ip6 | grep -q "chain BOTBLOCK"
/etc/init.d/brute_force_blocking~: if ! $NFT list ruleset ip6 | grep -q "chain BFBRECENT"
/etc/init.d/brute_force_blocking~: if ! $NFT list chain ip6 filter BFBBLOCK | grep -q BFBRECENT
/etc/init.d/brute_force_blocking~: if ! $NFT list chain ip6 filter BFBBLOCK | grep -q BFBAGGRS
/etc/init.d/brute_force_blocking~: if ! $NFT list chain ip6 filter BFBBLOCK | grep -q BFBLONG
/etc/init.d/brute_force_blocking~: VORHANDEN=`$IP6TABLES -nL INPUT 2>/dev/null | grep -s BFB | wc -l` >/dev/null 2>&1
/etc/init.d/brute_force_blocking~: if ! $IP6TABLES -nL BFBBLOCK |grep -q BFBAGGRS >/dev/null 2>&1
/etc/init.d/brute_force_blocking~: if ! [[ `$IP6TABLES -nL BFBBLOCK 2>/dev/null | grep BFBLONG6` ]]
/etc/init.d/brute_force_blocking~: $bfbhome/bfb-db.sh display anzahllong |grep -Eo '([0-9\.]+\.+)+[0-9]+' |while read IP
/etc/init.d/brute_force_blocking~: $bfbhome/bfb-db.sh display anzahllong |grep -Eo '([a-f0-9:]+:+)+[a-f0-9]+' |while read IP6
/etc/init.d/brute_force_blocking~: $bfbhome/bfb-db.sh display anzahllong |grep -Eo '([0-9\.]+\.+)+[0-9]+' |while read IP
/etc/init.d/brute_force_blocking~: if ! [[ `$IP6TABLES -nL BFBBLOCK 2>/dev/null | grep BFBLONG6` ]]
/etc/init.d/brute_force_blocking~: $bfbhome/bfb-db.sh display anzahllong |grep -Eo '([a-f0-9:]+:+)+[a-f0-9]+' |while read IP6
/etc/init.d/brute_force_blocking~: grep FREE /etc/config.d/brute_force_blocking >/usr/local/brute_force_blocking/freeoldstat
/etc/init.d/brute_force_blocking~: apache_packetversion=`grep "<version>" /var/install/packages/apache2 | sed 's#</*version>##g' | sed s"/\.//"g`
/etc/init.d/brute_force_blocking~: PID=`ps -ef | grep brute_force_blocking | grep bash | grep -Ev "install|menu|grep|init" | head -1 |awk '{print $2}'`
/etc/init.d/brute_force_blocking~: PID=`ps -ef | grep brute_force_blocking | grep bash | grep -Ev "install|menu|grep" | head -1|awk '{print $2}'`
/etc/init.d/brute_force_blocking~: grep FREE /etc/config.d/brute_force_blocking >/usr/local/brute_force_blocking/freestat
/etc/init.d/brute_force_blocking~: if [ ! `$bfbhome/bfb-db.sh print | grep free | tail -1` ]
/etc/init.d/brute_force_blocking~: #grep FREE /etc/config.d/brute_force_blocking >/usr/local/brute_force_blocking/freeoldstat
/etc/init.d/brute_force_blocking~: if [ ! `$bfbhome/bfb-db.sh print | grep free | tail -1` ]
/etc/init.d/brute_force_blocking~: echo 'for handle in `$NFT -a list chain filter BFBBLOCK | grep -E "$ip" | awk -F"handle" {'"'print \$2'"'}`'
/etc/init.d/brute_force_blocking~: echo 'for handle in `$NFT -a list chain filter BFBATMA | grep -E "$ip" | awk -F"handle" {'"'print \$2'"
/etc/init.d/brute_force_blocking~: for handle in `$NFT -a list chain filter BFBBLOCK | grep -E "$ip" | awk -F"handle" {'print $2'}`
/etc/init.d/brute_force_blocking~: for handle in `$NFT -a list chain ip6 filter BFBBLOCK | grep -E "$ip" | awk -F"handle" {'print $2'}`
/etc/init.d/brute_force_blocking~: for handle in `$NFT -a list chain filter BFBATMA | grep -E "$ip" | awk -F"handle" {'print $2'}`
/etc/init.d/brute_force_blocking~: for handle in `$NFT -a list chain ip6 filter BFBATMA | grep -E "$ip" | awk -F"handle" {'print $2'}`
/etc/init.d/brute_force_blocking~: if $NFT list set ip filter BFBLONG |grep -w "${ip}" >/dev/null
/etc/init.d/brute_force_blocking~: if $NFT list set ip6 filter BFBLONG |grep -w "${ip}" >/dev/null
/etc/init.d/brute_force_blocking~: if ! grep -q "[a-zA-Z]" <<< $ip
/etc/init.d/brute_force_blocking~: if $IPTABLES -nL BFBATMA | grep -qF $ip
/etc/init.d/brute_force_blocking~: if $IPTABLES -nL BFBATMA | grep -qF $ip
/etc/init.d/brute_force_blocking~: if $IPTABLES -nL BFBATMA | grep -qF $ip
/etc/init.d/brute_force_blocking~: if ! grep -q "[a-zA-Z]" <<< $ip
/etc/init.d/brute_force_blocking~: if ipset list BFBLONG | grep -w "${ip}" >/dev/null
/etc/init.d/brute_force_blocking~: if grep -q "[a-zA-Z]" <<< $ip
/etc/init.d/brute_force_blocking~: if grep -q "[a-zA-Z]" <<< $ip
/etc/init.d/brute_force_blocking~: if ipset list BFBLONG6 | grep -w "${ip}" >/dev/null
/etc/init.d/eisgraph: ramfs=`findmnt | grep eisgraph`
/etc/init.d/eisgraph_traffic_port: check=`cat /srv/eisgraph/sic/iptables.save | grep EISGRAPH_PORT`
/etc/init.d/eisgraph_traffic_port: cat /srv/eisgraph/sic/iptables0.save | grep "EISGRAPH_PORT"
/etc/init.d/functions:# - grep for counting string length.
/etc/init.d/ip-eth: if echo "${net_devices}" | /usr/bin/grep -q -Ew "${eth_name}"
/etc/init.d/ip-eth: name=$(echo "${net_devices}" | /usr/bin/grep -Ew '(enp[1-9]?[0-9]s[1-9]?[0-9][fu]?[1-9]?[0-9]?u?[1-9]?[0-9]?)|(en[os][1-9]?[0-9])|(enx[[:alnum:]]{12})')
/etc/init.d/ip-eth: if echo "${name}" | /usr/bin/grep -q ':'
/etc/init.d/ip-eth: while /usr/sbin/ip link show ${name} | /usr/bin/grep -i -q 'state DOWN'
/etc/init.d/mail~: PIDLIST=`ps -Ae -o cmd,pid | grep "^[a-z/]*${PROCNAME}" | rev | cut -d' ' -f1 | rev`
/etc/init.d/mail~: echo ":${_cp_listen_port}:" | grep -E -q "${_cp_port_list}"
/etc/init.d/mail~: grep -q 'disable[ \t]*=[ \t]yes' ${xinet_pop3file}
/etc/init.d/mail~: grep -q 'disable[ \t]*=[ \t]no' ${xinet_pop3file}
/etc/init.d/mail~: grep 'disable[ \t]*=[ \t]no' /etc/xinetd.d/pop3 >/dev/null 2>&1
/etc/init.d/mail~: grep -q 'disable[ \t]*=[ \t]yes' ${xinet_imapfile}
/etc/init.d/mail~: grep -q 'disable[ \t]*=[ \t]no' ${xinet_imapfile}
/etc/init.d/mail~: grep 'disable[ \t]*=[ \t]no' /etc/xinetd.d/imap >/dev/null 2>&1
/etc/init.d/ntp: grep -i -q "File expires on:" ${ntp_leapfile}
/etc/init.d/ntp: expiry_date=`grep -i "File expires on:" ${ntp_leapfile} | sed 's/^.*File expires on: *//i'`
/etc/init.d/ntp: NTP_SERVER_OPTIONS=`echo "${NTP_SERVER_OPTIONS}" | sed 's/ *-/\n-/g' | grep -E -v "^ *$|^\-[uclp]" | tr '\n' ' '`
/etc/init.d/ntp:ntp_leapfile=`grep "^leapfile" ${ntp_conffile} | sed 's/^[^ ]* *//'`
/etc/init.d/redis: pid=`ps -fC "redis-server" | tr -s ' ' ':' | cut -d: -f2 | grep -v 'PID' 2>/dev/null`
/etc/init.d/smartmon: smartd_ps=`ps -A | grep 'smartd'`
/etc/init.d/xinetd: if grep -q -s "${b_line}" ${service}
(init.d)# ls -l
total 240
-rwxr-xr-x 1 root root 2667 Aug 19 2022 addhost
-rwxr-xr-x 1 root root 12259 Aug 31 2021 block_complete_networks
drwxr-xr-x 2 root root 4096 Mar 14 15:57 boot.d
-rwxr-xr-x 1 root root 861 Apr 1 2020 boot.local
-rwxr-xr-x 1 root root 75982 May 9 2022 brute_force_blocking~
-rwxr-x--- 1 root root 6721 Jan 15 12:00 certs_dehydrated
-rwxr-x--- 1 root root 1695 Jun 30 2020 eisgraph
-rwx------ 1 root root 3092 Jun 2 2022 eisgraph_traffic_port
-rw-r--r-- 1 root root 20718 Mar 20 16:00 functions
-rwxr-xr-x 1 root root 4054 Mar 20 16:00 ip-eth
-rwxr-xr-x 1 root root 1238 Mar 20 16:00 lo
-rwxr-xr-x 1 root root 632 Jul 20 2003 local~
-rwxr-xr-x 1 root root 28845 Apr 2 2020 mail~
-rwxr-xr-x 1 root root 2499 Apr 17 21:24 minidlna
-rwxr-xr-x 1 root root 2355 Jun 22 2021 netdate
-rwxr-xr-x 1 root root 6711 Jun 22 2021 ntp
-rwxr-xr-x 1 root root 3350 Jun 3 2021 power_button
-rwxr-xr-x 1 root root 9573 Mar 31 2022 redis
-rwxr-xr-x 1 root root 1245 Mar 20 16:00 resolv
-rwxr-xr-x 1 root root 2272 Mar 20 16:00 route
-rwxr-xr-x 1 root root 3634 Oct 19 2017 smartmon
-rw-r--r-- 1 root root 3629 Mar 20 16:00 systemd_redirect
-rwxr-xr-x 1 root root 5488 May 14 2022 xinetd
Mehr Informationen über die Mailingliste Eisfair