- UNNEEDED="afpd amavis arpwatch audit automount autorpm cisco clamav clamav-milter \
- clam-update courier cron emerge exim extreme-networks ftpd-messages ftpd-xferlog \
- imapd identd in.qpopper ipop3d maillog mailscanner mountd named netopia netscreen \
- oidentd pam pam_pwdb pop3 portsentry postfix pound proftpd-messages pureftp \
- pureftpd qmail rt314 saslauthd samba sendmail sendmail-largeboxes shaperd smartd \
- sonicwall stunnel sudo tac_acc up2date vpopmail vsftpd xferlog yum zz-fortune" && \
- for i in $$UNNEEDED ; do \
- rm -f /etc/log.d/{conf,scripts}/services/$$i{,.conf} /etc/log.d/conf/logfiles/$$i.conf; \
- done
- rm -rf /etc/log.d/scripts/logfiles
-
- sed -i 's/df -h/df -h -x rootfs/' /etc/log.d/scripts/services/zz-disk_space
- for i in `find /etc/log.d -type f`; do \
- sed -i 's/perl -w/perl/' $$i; \
- done
- # The httpd log checker script considers any request containing the word
- # null to be an exploit attempt, reverse this behaviour as we have a
- # null.gif
- sed -i -e "/ 'null',/d" /etc/log.d/scripts/services/http
- chmod -R 755 /etc/log.d
+ #UNNEEDED="afpd amavis arpwatch audit automount autorpm cisco \
+ # courier emerge exim extreme-networks ftpd-messages ftpd-xferlog \
+ # identd in.qpopper ipop3d mountd named netopia netscreen \
+ # oidentd pam_pwdb portsentry pound pureftp \
+ # pureftpd qmail rt314 sendmail-largeboxes shaperd smartd \
+ # sonicwall stunnel tac_acc up2date vpopmail vsftpd windows xferlog yum zz-fortune" && \
+ # for i in $$UNNEEDED ; do \
+ # rm -f /etc/log.d/{conf,scripts}/services/$$i{,.conf} /etc/log.d/conf/logfiles/$$i.conf; \
+ # done
+ cp -f $(DIR_SRC)/config/logwatch/dialup /usr/share/logwatch/scripts/services/dialup
+ cp -f $(DIR_SRC)/config/logwatch/dialup.conf /usr/share/logwatch/dist.conf/services/dialup.conf
+
+ -mkdir -p /var/cache/logwatch
+ chmod -v 777 /var/cache/logwatch
+ -mkdir -p /var/log/logwatch
+ chmod -v 755 /var/log/logwatch
+ -rm -rf /etc/logwatch/conf
+ ln -vsf /usr/share/logwatch/default.conf /etc/logwatch/conf
+